oauth2client is a Python module for client-side oauth2 authentication. It works
with Google's oauth2 service by default, and is compatible with any oauth2
service.
Quantis is a physical random number generator exploiting
an elementary quantum optics process.
This port contains the kernel driver to access Quantis
PCI and PCIe devices.
Python Cryptography Toolkit (pycrypto)
This is a collection of both secure hash functions (such as MD5 and
SHA), and various encryption algorithms (AES, DES, ElGamal, etc.) for
Python.
gwee (Generic Web Exploitation Engine) is a small program written in C designed
to exploit input validation vulnerabilities in web scripts, such as Perl CGIs,
PHP, etc.
Python-RSA is a pure-Python RSA implementation. It supports encryption and
decryption, signing and verifying signatures, and key generation according to
PKCS#1 version 1.5.
python-signedjson allows more than one entity to sign an object, can sign with
more than one key and replace ED25519 with a different algorithm.
RHash is a console utility and library for computing and verifying hash sums
of files. It supports CRC32, MD4, MD5, SHA1, SHA256, SHA512, SHA3, Tiger,
TTH, Torrent BTIH, AICH, ED2K, GOST R 34.11-94, RIPEMD-160, HAS-160, EDON-R
256/512, Whirlpool, and Snefru-128/256 hash sums. Its features are:
* Can calculate Magnet links
* Output in a predefined (SFV, BSD-like) or a user-defined format
* Ability to process directories recursively
* Updating existing hash-files (adding hash sums of files missing in a
hash-file)
* Portable, written in pure C, small in size, open source (MIT license)
Perl wrapper is available as `security/p5-Crypt-RHash' port.
This is a Camellia package for Ruby. Camellia engine is implemented in "C".
Supported key length : 128bit/192bit/256bit
Supported modes of operation : ECB/CFB/CBC
A pure python implementation of the Rijndael encryption algorithm. Useful for
quick string encryption in python programs but probably is not fast enough for
anything too big.
Sancp is a network security tool designed to collect
statistical information regarding network traffic, as
well as, collect the traffic itself in pcap format, all
for the purpose of: auditing, historical analysis, and
network activity discovery. Rules can be used to distinguish
normal from abnormal traffic and support tagging connections
with: rule id, node id, and status id. From an intrusion
detection standpoint, every connection is an event that must
be validated through some means. Sancp uses rules to identify,
record, and tag traffic of interest. 'Tagging' a connection
is a new feature since v1.4.0 Connections ('stats') can be
loaded into a database for further analysis.