Stem is a python controller library for Tor. Like its predecessor, TorCtl, it
uses Tor's control protocol to help developers program against the Tor process,
enabling them to build things similar to Vidalia and arm.
The Volatility Framework is a completely open collection of tools, implemented
in Python under the GNU General Public License, for the extraction of digital
artifacts from volatile memory (RAM) samples.
Hydra is a parallized login hacker utility. Hydra can brute force attack on
FTP, POP3, IMAP, Telnet, HTTP Auth, NNTP, VNC, ICQ, Socks5, PCNFS and more
services within SSL support.
Simple HTTP Scanner is a creation made for web site pen testing. You can
check for directories and files on the remote web server and get some
server information like the webserver running.
ssdeep is a tool for computing context triggered piecewise hashes.
Unlike other hash calculators such as md5, it supports partial match between
the original file and modified/truncated files. It can also compute the
degree of similarity between files.
This is a OmniAuth 1.0 compatible port of the previously available OmniAuth CAS
strategy that was bundled with OmniAuth 0.3. This strategy haas also been
updated for CAS protocol version 3.0 and patched to deal with namespace issues.
SecPanel serves as a GUI for managing and running SSH (Secure Shell)
and SCP (Secure Copy) connections. Nearly all connection-parameters
are adjusted by one mouseclick (compression, port-forwarding, etc.).
It also manages the SSH-agent.
This is the sectok tool from citi.umich.edu. Originally targeted
for OpenBSD. This is a quick port of the basic application; it relies
upon the libsectok library for ISO 7816 Smart Card device communication.
Argon2 is a password-hashing function that summarizes the state of the
art in the design of memory-hard functions and can be used to hash
passwords for credential storage, key derivation, or other
applications.
This program filters the tcpump raw packet data looking for logins and
passwords on the most commonly used TCP ports (FTP, telnet, POP3 ...).
It dumps sniffed data to a file named sniff.log.