Snort Report is an add-on module for the Snort Intrusion Detection System.
It generates real-time intrusion detection reports in an easy to read format
based on data collected from a MySQL or PostgreSQL database.
This program creates a set of HTML pages to allow you to quickly and
conveniently navigate around output files of the Snort intrusion
detection system (http://www.snort.org/). The reports summarize the
incidents logged in the snort alert file.
Sshpass is a tool for non-interactively performing password authentication
with SSH's so called "interactive keyboard password authentication".
Most user should use SSH's more secure public key authentication instead.
stud is a network proxy that terminates TLS/SSL connections
and forwards the unencrypted traffic to some backend. It's
designed to handle 10s of thousands of connections
efficiently on multicore machines.
Subversion is a version control system designed to be as similar to cvs(1)
as possible, while fixing many outstanding problems with cvs(1).
This port adds Gnome Keyring support to Subversion.
PyOTP is a Python library for generating and verifying one-time passwords. It
can be used to implement two-factor (2FA) or multi-factor (MFA) authentication
methods in web applications and in other systems that require users to log in.
SWATCH - The Simple WATCHer and filter
Swatch is designed to monitor system activity. Swatch
requires a configuration file which contains pattern(s) to
look for and action(s) to do when each pattern is found.
Unicornscan is a new information gathering and correlation engine built
for and by members of the security research and testing communities. It
was designed to provide an engine that is scalable, accurate, flexible,
and efficient.
Webshag is a multi-threaded, multi-platform web server audit tool. Written in
Python, it gathers commonly useful functionalities for web server auditing like
website crawling, URL scanning or file fuzzing.
The YubiKey Personalization Tool is a Qt based Cross-Platform utility designed
to facilitate re-configuration of YubiKeys on Windows, Linux and Mac platforms.
The tool provides a same simple step-by-step approach to make configuration of
YubiKeys easy to follow and understand, while still being powerful enough to
exploit all functionality both of the YubiKey 1 and YubiKey 2 generation of
keys. The tool provides the same functionality and user interface on Windows,
Linux and Mac platforms.
The Cross-Platform YubiKey Personalization Tool provides the following main
functions:
- Programming the YubiKey in "Yubico OTP" mode;
- Programming the YubiKey in "OATH-HOTP" mode;
- Programming the YubiKey in "Static Password" mode;
- Programming the YubiKey in "Challenge-Response" mode;
- Programming the NDEF feature of the YubiKey NEO;
- Testing the challenge-response functionality of a YubiKey;
- Deleting the configuration of a YubiKey;
- Checking type and firmware version of the YubiKey.