Crank is short for "CRyptANalysis toolKit", and its overall purpose is to
provide a powerful and extensible environment for solving classical
(pen-and-paper) ciphers, providing as much automation as possible. Classical
ciphers include common schemes like monoalphabetic substitutions, where each
letter of the alphabet is mapped to another (usually different) letter
consistently through the text. The first version of Crank is restricting
itself to these special ciphers. Other algorithms forever devoid of Crank's
attentions include Enigma, RSA, DES, MurkelFish, or anything else invented
after 1900. They're hard(er).
Sshguard 通过服务的日志活动来监视服务。它通过本地防火墙阻断源地址来对危险活动做出响应。
Sshguard 采用一种巧妙的解析器,可以透明地识别多种日志格式
(syslog、syslog-ng、metalog、multilog、raw messages),
且支持多种服务,包括 SSH、FreeBSD 的 ftpd 和 dovecot。它可以操作所有主流防火墙系统,
包括PF、netfilter/iptables、IPFIREWALL/ipfw、IPFILTER。
Sshguard 包含多种相关特性,如 IPv6 支持、白名单、暂停、日志消息认证。它可靠、
易于安装且仅要求很少的系统资源。
Digest:: HMAC
---------------------------------
This package provide modules which calculate HMAC digests.
To build the extensions, unpack this distribution somewhere, create
the Makefile by running 'perl Makefile.PL' and do a 'make', 'make
test', and if successful 'make install'.
You will need perl version 5.004 or better to install these modules.
Further documentation is embedded in the individual modules.
Copyright 1998-1999 Gisle Aas.
Copyright 1998 Graham Barr.
Copyright 1997 Uwe Hollerbach.
Copyright 1995-1996 Neil Winton.
Copyright 1990-1992 RSA Data Security, Inc.
This library is free software; you can redistribute it and/or
modify it under the same terms as Perl itself.
This perl module provides support for the https protocol
under LWP, so that a LWP::UserAgent can make https GET &
HEAD & POST requests. Please see perldoc LWP for more
information on POST requests.
The Crypt::SSLeay package contains Net::SSL, which is
automatically loaded by LWP::Protocol::https on https
requests, and provides the necessary SSL glue for that
module to work via these deprecated modules:
Crypt::SSLeay::CTX
Crypt::SSLeay::Conn
Crypt::SSLeay::X509
Work on Crypt::SSLeay has been continued only to provide
https support for the LWP - libwww perl libraries. If you
want access to the OpenSSL API via perl, check out Sampo's
Net::SSLeay.
BruteForceBlocker is a perl script, that works along with pf - OpenBSD's
firewall (Which is also available on FreeBSD since version 5.2 is out).
It's main purpose is to block SSH bruteforce attacks via firewall.
When this script is running, it checks sshd logs from syslog and looks
for Failed Login attempts - mostly some annoying script attacks, and
counts number of such attempts. When given IP reaches configured limit
of fails, script puts this IP to the pf's table and blocks any further
traffic to the that box from given IP (This also depends on
configuration done in pf.conf).
cfv is a utility to both test and create .sfv, .csv and md5sum files. These
files are commonly used to ensure the correct retrieval or storage of data.
Features:
- supports .sfv, .csv(2, 3, and 4 field variants), md5sum, BSD md5
sha1sum, .torrent and (test-only) .par, .par2 file formats
- automatic checksum file naming ability in create mode
- recursive operation
- show unverified files option
- ignore case and fix path separator options for cross platform use
- transparent gzip support for checksum files
- configurable renaming of bad files (with testing against previous bad
files, to save only unique differing copies)
The Metasploit Framework
The Metasploit Framework is an open source platform that supports
vulnerability research, exploit development, and the creation of
custom security tools. The goal is to provide useful information
to people who perform penetration testing, IDS signature development,
and exploit research. This site was created to fill the gaps in the
information publicly available on various exploitation techniques
and to create a useful resource for exploit developers. The tools
and information on this site are provided for legal penetration
testing and research purposes only.
Unhide is a forensic tool to find hidden processes and TCP/UDP ports by
rootkits / LKMs or by another hidden technique. It consists of two
programs: unhide and unhide-tcp.
unhide detects hidden processes through:
* Comparison of /proc vs /bin/ps output.
* Comparison of info gathered from /bin/ps with info gathered from.
* Syscalls (syscall scanning).
* Full PIDs space ocupation (PIDs bruteforcing).
unhide-tcp identifies TCP/UDP ports that are listening but not listed in
/bin/netstat by doing brute forcing of all TCP/UDP ports availables.
Vinetto extracts the thumbnails and associated metadata from the Thumbs.db
files.
The Windows systems (98, ME, 2000, XP and 2003 Server) can store thumbnails
and metadata of the picture files contained in the directories of its FAT32
or NTFS filesystems.
The thumbnails and associated metadata are stored in Thumbs.db files.
The Thumbs.db files are undocumented OLE structured files.
Once a picture file has been deleted from the filesystem, the related thumbnail
and associated metada remain stored in the Thumbs.db file. So, the data
contained in those Thumbs.db files are an helpful source of information
for the forensics investigator.
BSDploy is a comprehensive tool to provision, configure and maintain
FreeBSD jail hosts and jails.
Its main design goal is to lower the barrier to repeatable jail setups.
* Modular provisioning with plugins for VirtualBox, Amazon EC2 and
an achitecture to support more.
* Bootstrap complete jail hosts from scratch.
* Declarative configuration: All hosts and their properties defined
in ploy.conf are automatically exposed to Ansible.
* Imperative maintenance: Run Fabric scripts with ploy do JAILNAME
TASKNAME and have all of the hosts and their variables in fab.env.
* Configure ZFS pools and filesystems with whole-disk-encryption.