Ports Search

Results 3,6313,640 of 5,886 for /net-im/.(0.004 seconds)
security/base-1.4.5 (Score: 0.0070083328)
Basic Analysis and Security Engine - analyzing Snort alerts
BASE is the Basic Analysis and Security Engine. It is based on the code from the ACID project. This application provides a PHP-based web front-end to query and analyze the alerts coming from a Snort IDS system. BASE is a web interface to perform analysis of intrusions that Snort has detected on your network. It uses a user authentication and role-base system, so that you as the security admin can decide what and how much information each user can see. It also has a simple to use, web-based setup program for people not comfortable with editing files directly.
security/ccrypt-1.10 (Score: 0.0070083328)
Command-line utility for encrypting and decrypting files and streams
ccrypt is a utility for encrypting and decrypting files and streams. It was designed to replace the standard Unix crypt utility, which is notorious for using a very weak encryption algorithm. ccrypt is based on the Rijndael cipher, which is the U.S. government's chosen candidate for the Advanced Encryption Standard (AES, see http://www.nist.gov/aes/). This cipher is believed to provide very strong security. Unlike Unix crypt, the algorithm provided by ccrypt is not symmetric, i.e., one must specify whether to encrypt or decrypt. The most common way to invoke ccrypt is via the commands ccencrypt and ccdecrypt. There is also a ccat command for decrypting a file directly to the terminal, thus reducing the likelihood of leaving temporary plaintext files around. In addition, there is a compatibility mode for decrypting legacy Unix crypt files. Encryption and decryption depends on a keyword (or key phrase) supplied by the user. By default, the user is prompted to enter a keyword from the terminal. Keywords can consist of any number of characters, and all characters are significant (although ccrypt internally hashes the key to 256 bits). Longer keywords provide better security than short ones, since they are less likely to be discovered by exhaustive search.
security/ccsrch-1.0.3 (Score: 0.0070083328)
Is a tool that searches for credit card numbers (PAN) and track data
ccsrch is a tool that searches for and identifies unencrypted and contiguous credit card numbers (PAN) and track data on Windows and UNIX operating systems. It will also identify the location of the PAN data in the files and record MAC times.
security/ckpass-0.2 (Score: 0.0070083328)
Ncurses based password database client
An ncurses based password database client that is compatible with KeePass 1.x format databases.
security/aescrypt-0.7 (Score: 0.0070083328)
Command-line AES encryption/decryption suite
From the aescrypt README.html: This is a program for encrypting/decrypting streams of data using Rijndael and Cipher Block Feedback mode (CFB-128). ... 5. This program was deliberately kept extremely simple. It is not intended to be a full encryption solution, it is intended to be used within scripts as part of a complete solution. Keychain management, public key signatures, etc. are all expected to be done external to this program.
security/blindelephant-1.0 (Score: 0.0070083328)
Fingerprint the web applications used by a web site
The BlindElephant Web Application Fingerprinter attempts to discover the version of a (known) web application by comparing static files at known locations against precomputed hashes for versions of those files in all available releases. The technique is fast, low-bandwidth, non-invasive, generic, and highly automatable.
security/botan-1.10.13 (Score: 0.0070083328)
Portable, easy to use, and efficient C++ crypto library
Botan is a crypto library written in C++. It provides a variety of cryptographic algorithms, including common ones such as AES, MD5, SHA, HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that are more obscure or specialized. It also offers X.509v3 certificates and CRLs, and PKCS #10 certificate requests. A message processing system that uses a filter/pipeline metaphor allows for many common cryptographic tasks to be completed with just a few lines of code. Assembly optimizations for common CPUs, including x86, x86-64, and PowerPC, offers further speedups for critical tasks such as SHA-1 hashing and multiple precision integer operations. Botan is licensed under the same permissive terms as FreeBSD itself.
security/bsdsfv-1.18 (Score: 0.0070083328)
Flexible SFV checksum utility
BSDsfv is a flexible and highly compatible SFV checksum utility. Features: - create SFV files, verify downloaded single files or whole releases - add banners to your SFV files - very flexible and compatible with all other SFV tools currently known, including SFVNIX compatibility mode concerning SFV files created - easy to console application - plug & play support for glFTPd and other demons including count-missing-files feature for race scripts
security/hashcat-3.10 (Score: 0.0070083328)
Advanced CPU-based password recovery utility
Hashcat is an advanced CPU-based password recovery utility for FreeBSD, Windows 7/8/10, Apple OS X, and GNU/Linux, supporting seven unique modes of attack for over 100 optimized hashing algorithms.
security/cfv-1.18.3 (Score: 0.0070083328)
Utility to both test and create .sfv, .csv, and md5sum files
cfv is a utility to both test and create .sfv, .csv and md5sum files. These files are commonly used to ensure the correct retrieval or storage of data. Features: - supports .sfv, .csv(2, 3, and 4 field variants), md5sum, BSD md5 sha1sum, .torrent and (test-only) .par, .par2 file formats - automatic checksum file naming ability in create mode - recursive operation - show unverified files option - ignore case and fix path separator options for cross platform use - transparent gzip support for checksum files - configurable renaming of bad files (with testing against previous bad files, to save only unique differing copies)