Ports Search

Results 9911,000 of 1,385 for /security/.(0.002 seconds)
security/trustedpickle-0.02 (Score: 0.08339406)
TrustedPickle is a Python (de)Pickler with a way to verify the data
TrustedPickle is a Python module that can save most any arbitrary Python object in a signed pickle file. There are two big differences between this module and the standard pickle module. First, TrustedPickle can pickle a module, but the standard pickle module cannot. Second, TrustedPickle includes a signature that can verify the data's origin before the data is unpickled.
security/twistedConch-15.2.1 (Score: 0.08339406)
SSH and SFTP protocol implementation with clients and servers
Twisted Conch is an SSHv2 implementation written in Python. SSH is a protocol designed to allow remote access to shells and commands, but it is generic enough to allow everything from TCP forwarding to generic filesystem access. Since conch is written in Python, it interfaces well with other Python projects, such as Imagination. Conch also includes a implementations of the telnet and vt102 protocols, as well as support for rudamentary line editing behaviors. A new implementation of Twisted's Manhole application is also included, featuring server-side input history and interactive syntax coloring.
security/twofish-0.7 (Score: 0.08339406)
Twofish cryptographic module for Python
A pure python implementation of the Rijndael encryption algorithm. Useful for quick string encryption in python programs but probably is not fast enough for anything too big.
security/volatility-2.5 (Score: 0.08339406)
Advanced memory forensics framework
The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples.
security/vulndb-0.0.19 (Score: 0.08339406)
Provides access to the vulndb information in Python
Python SDK to access the vulnerability database: https://github.com/vulndb/data
security/hydra-8.3 (Score: 0.08339406)
Brute force attack utility working on multiple network services
Hydra is a parallized login hacker utility. Hydra can brute force attack on FTP, POP3, IMAP, Telnet, HTTP Auth, NNTP, VNC, ICQ, Socks5, PCNFS and more services within SSL support.
security/pad-1.0.4 (Score: 0.08339406)
Command-line utility to encrypt files
This is a small command-line utility for encryption and decryption using the principle of one-time pads (OTPs). One or more data files given to pad are XORd with each other and with RNG output, resulting in two or more output files. The output files are indistinguishable from random noise, except that when the pad utility is used to XOR them together again, the original data files may be recovered. Jason Harris <jharris@widomaker.com>
security/gag-2.9 (Score: 0.08339406)
Stacheldraht (DOS attack) agent detector
"gag" is a program to scan for "stacheldraht" agents, which are part of an active "stacheldraht" network. It will not detect trinoo, the original Tribe Flood Network (TFN), or TFN2K agents. For methods of detecting trinoo and Tribe Flood Network, see: http://staff.washington.edu/dittrich/misc/trinoo.analysis http://staff.washington.edu/dittrich/misc/tfn.analysis (Why "gag"? Its supposed to be a running joke I started in the trinoo analysis. trinoo/trinot, "tribe"/civilize, gag/sicken&gesundheit!. Read the ddos trilogy to find out!)
Principals and groups management for the pluggable authentication
Principals and groups management for the pluggable authentication utility.
Bootstrap subscriber and browser menu item for zope.principalannotation
Bootstrap subscriber and browser menu item for zope.principalannotation.