Ports Search

Results 6,7016,710 of 19,819 for %22HTTP Server%22.(0.009 seconds)
security/xca-1.3.2 (Score: 0.0012383816)
Graphical certification authority
Graphical certification authority is an interface for managing RSA keys and certificates, and the creation and signing of PKCS#10 requests. It uses the OpenSSL library and a Berkeley DB for key and certificate storage. It supports importing and exporting keys and PEM DER PKCS8 certificates, signing and revoking of PEM DER PKCS12, and selection of x509v3 extensions. A tree view of certificates is presented.
security/smap-0.5.0 (Score: 0.0012383816)
SIP scanner and identifier
smap is a simple scanner for SIP enabled devices smap sends off various SIP requests awaiting responses from SIP enabled DSL router, proxies and user agents. It could be considered a mashup of nmap and sipsak ;)
security/ssdeep-2.13 (Score: 0.0012383816)
Tool for computing context triggered piecewise hashes
ssdeep is a tool for computing context triggered piecewise hashes. Unlike other hash calculators such as md5, it supports partial match between the original file and modified/truncated files. It can also compute the degree of similarity between files.
security/libressl-2.4.3 (Score: 0.0012383816)
Free version of the SSL/TLS protocol forked from OpenSSL
LibreSSL is an open-source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. It was forked from the OpenSSL cryptographic software library in April 2014 as a response by OpenBSD developers to the Heartbleed security vulnerability in OpenSSL, with the aim of refactoring the OpenSSL code so as to provide a more secure implementation. LibreSSL was forked from the OpenSSL library starting with the 1.0.1g branch and will follow the security guidelines used elsewhere in the OpenBSD project.
security/metasploit-4.12.28 (Score: 0.0012383816)
Exploit-Framework for Penetration-Testing
The Metasploit Framework The Metasploit Framework is an open source platform that supports vulnerability research, exploit development, and the creation of custom security tools. The goal is to provide useful information to people who perform penetration testing, IDS signature development, and exploit research. This site was created to fill the gaps in the information publicly available on various exploitation techniques and to create a useful resource for exploit developers. The tools and information on this site are provided for legal penetration testing and research purposes only.
security/pam_ssh_agent_auth-0.10.2 (Score: 0.0012383816)
PAM module which permits authentication via ssh-agent
PAM module which permits authentication for arbitrary services via ssh-agent. Written with sudo in mind, but like any auth PAM module, can be used for many purposes.
security/nmap-parser-0.3.5 (Score: 0.0012383816)
Ruby interface to Nmap scan data
The Nmap::Parser library provides a Ruby interface to Nmap's scan data. It can run Nmap and parse its XML output directly from the scan, parse a file containing the XML data from a separate scan, parse a String of XML data from a scan, or parse XML data from an object via its read() method. This information is presented in an easy-to-use and intuitive fashion for storage and manipulation.
security/razorback-scriptNugget-0.5.0 (Score: 0.0012383816)
Framework for an intelligence driven security - Script Nugget Ruby
Razorback is a framework for an intelligence driven security solution. It consists of a Dispatcher at the core of the system, surrounded by Nuggets of varying types.
security/scanlogd-2.2.7 (Score: 0.0012383816)
TCP port scan detection tool
scanlogd is a TCP port scan detection tool, originally designed to illustrate various attacks an IDS developer has to deal with. Unlike some of the other port scan detection tools out there, scanlogd is designed to be totally safe to use. -Roman Bogorodskiy <bogorodskiy@inbox.ru>
security/secpanel-0.6.1 (Score: 0.0012383816)
GUI for managing and running ssh and related utilities
SecPanel serves as a GUI for managing and running SSH (Secure Shell) and SCP (Secure Copy) connections. Nearly all connection-parameters are adjusted by one mouseclick (compression, port-forwarding, etc.). It also manages the SSH-agent.