The Yubico PIV tool is used for interacting with the Privilege and
Identification Card (PIV) application on a YubiKey.
With it you may generate keys on the device, importing keys and
certificates, and create certificate requests, and other operations. A
shared library and a command-line tool is included.
YubiKey PIV Manager
Tool for configuring your PIV-enabled YubiKey.
Open, free and uncensorable websites, using Bitcoin cryptography
and BitTorrent network.
Features:
* Real-time updated sites
* Namecoin .bit domains support
* Easy to setup: unpack & run
* Clone websites in one click
* Password-less BIP32 based authorization: Your account is protected
by the same cryptography as your Bitcoin wallet
* Built-in SQL server with P2P data synchronization: Allows easier site
development and faster page load times
* Anonymity: Full Tor network support with .onion hidden services instead
of IPv4 addresses
* TLS encrypted connections
* Automatic uPnP port opening
* Plugin for multiuser (openproxy) support
* Works with any browser/OS
tmux-cssh is simple POSIX shell script, which synchronizes interactive shell
commands over tmux sessions, making it useful for working on cluster nodes. It
offers similar functionality to ClusterSSH, but without depending on X11.
TrouSerS is an CPL (Common Public License) licensed Trusted Computing
Software Stack. It is mostly compliant with the TSS 1.2 specification.
TrueCrack is a brute-force password cracker for TrueCrypt (Copyright) volume
files. It works on Linux and it is optimized with Nvidia Cuda technology.
It works with cripted volumes with the following algorithms:
- PBKDF2 (defined in PKCS5 v2.0) based on RIPEMD160 Key derivation function.
- XTS block cipher mode of operation used for hard disk encryption based on
AES.
TrueCrack can work in two different modes of use:
- Dictionary attack: read the passwords from a file of words (one password
for line).
- Charset attack: generate the passwords from a charset of symbols defined
by the user (for example: all possible strings of n characters from the
charset "abc" ).
VNCcrack is a fast offline password cracker for VNC passwords.
By sniffing a VNC challenge-response sequence off the network
(typically when VNC is used without a decent cryptographic
wrapper like SSH or SSL), you can recover the password fairly
easily and quickly by letting VNCcrack pound on it.
Webfwlog is a flexible web-based analysis and reporting tool for firewall
logs. It supports log files in standard ipfilter or ipfw format.
With Webfwlog you can design reports to use on your firewall logs in whatever
configuration you desire. Included are example reports as a starting
point. You can sort a report with a single click, "drill-down" on the reports
all the way to the packet level, and save your reports for later use. You can
also create a link directly to any saved report.
Webfwlog requires a web server with PHP support and a MySQL or PostgresSQL
database server.
wpa_supplicant is a client (supplicant) with support for WPA and WPA2
(IEEE 802.11i / RSN). It is suitable for both desktop/laptop computers and
embedded systems. Supplicant is the IEEE 802.1X/WPA component that is used
in the client stations. It implements key negotiation with a WPA
Authenticator and it controls the roaming and IEEE 802.11 authentication/
association of the wlan driver.
wpa_supplicant is designed to be a "daemon" program that runs in the
background and acts as the backend component controlling the wireless
connection. wpa_supplicant supports separate frontend programs and a
text-based frontend (wpa_cli) and a GUI (wpa_gui) are included with
wpa_supplicant.
Xinetd is a replacement for inetd, the internet services daemon.
Xinetd is not just an inetd replacement. Anybody can use it to
start servers that don't require privileged ports because xinetd
does not require that the services in its configuration file be
listed in /etc/services.
Its configuration file has a different format than inetd's one
and it understands different signals. However the signal-to-action
assignment can be changed.