Fprintd is a D-Bus daemon that offers libfprint functionality over
the D-Bus interprocess communication bus. By adding this daemon
layer above libfprint, we solve various problems related to multiple
applications simultaneously competing for fingerprint readers.
While it is not very nice to think of a daemon being necessary in
this scenario, fprintd will be launched by D-Bus through the
activation mechanism. This means it is launched only when needed,
and additionally it will shut itself down after a period of inactivity.
(Text copied from link below.)
"Fragroute intercepts, modifies, and rewrites egress traffic destined
for a specified host, implementing most of the attacks described in the
Secure Networks "Insertion, Evasion, and Denial of Service: Eluding
Network Intrusion Detection" paper of January 1998.
It features a simple ruleset language to delay, duplicate, drop,
fragment, overlap, print, reorder, segment, source-route, or otherwise
monkey with all outbound packets destined for a target host, with
minimal support for randomized or probabilistic behaviour.
This tool was written in good faith to aid in the testing of network
intrusion detection systems, firewalls, and basic TCP/IP stack
behaviour. Please do not abuse this software."
KeePass is a free open source password manager, which helps you to manage your
passwords in a secure way. You can put all your passwords in one database, which
is locked with one master key or a key file. So you only have to remember one
single master password or select the key file to unlock the whole database. The
databases are encrypted using the best and most secure encryption algorithms
currently known (AES and Twofish).
This is the official KeePass application, which was originally only available
for Windows, but has now been re-written with .Net and able to be run on BSD,
Linux and Mac OS X with Mono.
A repository of cryptographic primitives.
* Symmetric ciphers: AES, DES, 3DES, Blowfish, Camellia, RC4, Salsa, ChaCha.
* Hash: SHA1, SHA2, SHA3, MD2, MD4, MD5, Kekkak, Skein, Ripemd, Tiger,
Whirlpool
* MAC: HMAC, Poly1305
* Assymmetric crypto: DSA, RSA, DH, ECDH, ECDSA, ECC, Curve25519, Ed25519
* Key Derivation Function: PBKDF2, Scrypt
* Cryptographic Random generation: System Entropy, Deterministic Random
Generator
* Data related: Anti-Forensic
Information Splitter (AFIS) If anything cryptographic related is missing
from here, submit a pull request to have it added. This package strive
to be a cryptographic kitchen sink that provides cryptography for
everyone. Evaluate the security related to your requirements before
using.
Origami is NOT a PDF rendering library. It aims at providing a scripting tool
to generate and analyze malicious PDF files. As well, it can be used to create
on-the-fly customized PDFs, or to inject (evil) code into already existing
documents.
- Create PDF documents from scratch.
- Parse existing documents, modify them and recompile them.
- Explore documents at the object level, going deep into the document
structure, uncompressing PDF object streams and desobfuscating names and
strings.
- High-level operations, such as encryption/decryption, signature, file
attachments...
- A GTK interface to quickly browse into the document contents.
Nessus is a security scanner. That is, it's a program which will scan a
given network and will seek for vulnerabilities which could be exploited
by some remote intruder.
The Nessus Project was originally started by Renaud Deraison
(deraison@worldnet.fr). Many people contributed in many ways to the
project, and the Nessus core team is now made up of Alexis de Bernis
(alexisb@mygale.org), who is the Java specialist, Noam Rathaus
(dolittle@isrealmail.com) who is in charge of the Nessus client for
Windows, and Renaud Deraison who is still here and who is the project
leader.
OpenBSM is an open source implementation of Sun's Basic Security Module (BSM)
Audit API and file format. BSM, the de facto industry standard for Audit,
describes a set of system call and library interfaces for managing audit
records, as well as a token stream file format that permits extensible and
generalized audit trail processing. OpenBSM extends the BSM API and file
format in a number of ways to support features present in the Mac OS X and
FreeBSD operating systems, such as Mach task interfaces, sendfile(), and
Linux system calls present in the FreeBSD Linux emulation layer.
Pairing-based cryptography is a relatively young area of cryptography
that revolves around a certain function with special properties.
The PBC (Pairing-Based Cryptography) library is a free C library
(released under the GNU Public License) built on the GMP library that
performs the mathematical operations underlying pairing-based
cryptosystems.
The PBC library is designed to be the backbone of implementations of
pairing-based cryptosystems, thus speed and portability are important
goals. It provides routines such as elliptic curve generation, elliptic
curve arithmetic and pairing computation. Thanks to the GMP library,
despite being written in C, pairings times are reasonable.
OpenBSM is an open source implementation of Sun's Basic Security Module (BSM)
Audit API and file format. BSM, the de facto industry standard for Audit,
describes a set of system call and library interfaces for managing audit
records, as well as a token stream file format that permits extensible and
generalized audit trail processing. OpenBSM extends the BSM API and file
format in a number of ways to support features present in the Mac OS X and
FreeBSD operating systems, such as Mach task interfaces, sendfile(), and
Linux system calls present in the FreeBSD Linux emulation layer.
OpenVPN is a robust, scalable and highly configurable VPN (Virtual Private
Network) daemon which can be used to securely link two or more private networks
using an encrypted tunnel over the internet. It can operate over UDP or TCP,
can use SSL or a pre-shared secret to authenticate peers, and in SSL mode, one
server can handle many clients.
This development port is updated frequently and is likely NOT STABLE. This is
an untested tar of the source tree. We attempt to omit inoperable states, but
there is a good chance this program will not run.
DO NOT USE IN PRODUCTION WITHOUT CAUTION