Ports Search

Results 14,85114,860 of 18,669 for descr.zh_CN%3A%E9%81%8F%E5%88%B6%E5%9E%83%E5%9C%BE.(0.019 seconds)
security/Digest-MD2-2.04 (Score: 3.7481335E-5)
Perl5 interface to the MD2 message digest algorithm
The Digest::MD2 module allows you to use the RSA Data Security Inc. MD2 Message Digest algorithm from within Perl programs. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. The Digest::MD2 programming interface is identical to the interface of Digest::MD5. MD2 is described in RFC 1115.
security/Digest-SHA-5.96 (Score: 3.7481335E-5)
Perl extension for SHA-1/224/256/384/512
Digest::SHA is a complete implementation of the NIST Secure Hash Standard. It gives Perl programmers a convenient way to calculate SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512 message digests. The module can handle all types of input, including partial-byte data.
security/Digest-JHash-0.09 (Score: 3.7481335E-5)
Perl extension for JHash hash algorithm
The Digest::JHash module allows you to use the fast JHash hashing algorithm developed by Bob Jenkins from within Perl programs. The algorithm takes as input a message of arbitrary length and produces as output a 32-bit "message digest" of the input in the form of an unsigned long integer. See http://burtleburtle.net/bob/hash/doobs.html for more information.
security/dradis-2.6.1 (Score: 3.7481335E-5)
Opensource framework to enable effective information gathering
dradis is an open source framework to enable effective information sharing. dradis is a self-contained web application that provides a centralised repository of information to keep track of what has been done so far, and what is still ahead. Features include: * Easy report generation. * Support for attachments. * Integration with existing systems and tools through server plugins. * Platform independent.
security/paperkey-1.3 (Score: 3.7481335E-5)
Extract just the secret information out of OpenPGP secret keys
From the paperkey README file: A reasonable way to achieve a long term backup of OpenPGP (GnuPG, PGP, etc) keys is to print them out on paper. Paper and ink have amazingly long retention qualities - far longer than the magnetic or optical means that are generally used to back up computer data.
security/pysha3-1.0.b1 (Score: 3.7481335E-5)
SHA-3 (Keccak) for Python
sha3 wrapper (keccak) for Python. The package is a wrapper around the optimized reference implementation from http://keccak.noekeon.org/ . Only the optimizations for 32 and 64bit platforms are used. The optimized SSE and ARM assembly variants are ignored for now. The module is a standalone version of the SHA-3 implemention of Python 3.4 (currently under development).
security/portsentry-1.2 (Score: 3.7481335E-5)
Port scan detection and active defense
PortSentry is part of the Abacus Project suite of security tools. It is a program designed to detect and respond to port scans against a target host in real-time. There are other port scan detectors that perform similar detection of scans, but PortSentry has some unique features that may make it worth looking into.
security/YubiOTP-0.2.1 (Score: 3.7481335E-5)
Library for verifying YubiKey OTP tokens
This is a library for verifying YubiKey OTP tokens. It includes both the low-level implementation for verifying tokens locally and clients for multiple versions of the Yubico validation web service. The primary audience is developers who wish to verify YubiKey tokens in their applications, presumably as part of a multi-factor authentication scheme.
security/rifiuti2-0.6.1 (Score: 3.7481335E-5)
Tool for analyzing Windows recycle bin
rifiuti2 is a rewrite of rifiuti, a great tool from Foundstone folks for analyzing Windows Recycle Bin INFO2 file. But since rifiuti (last updated 2004) is restricted to English version of Windows (fail to analyze any non-latin character), thus this rewrite.
security/doas-5.9p5 (Score: 3.7481335E-5)
Simple sudo alternative to run commands as another user
This is the FreeBSD port of the OpenBSD "doas" command. The doas program allows a regular user to run commands as another user (usually root). The doas command is a simplified (hopefully more secure) version of the "sudo" command and offers an easier to read/modify configuration.