Haval is a variable-length, variable-round one-way hash function designed by
Yuliang Zheng, Josef Pieprzyk, and Jennifer Seberry. The number of rounds can
be 3, 4, or 5, while the hash length can be 128, 160, 192, 224, or 256 bits.
Thus, there are a total of 15 different outputs. For better security, however,
this module implements the 5-round, 256-bit output.
This module implements a interface to the information contained in an nmap
scan. It is implemented by parsing the xml scan data that is generated by
nmap. This will enable anyone who utilizes nmap to quickly create fast and
robust security scripts that utilize the powerful port scanning abilities of
nmap.
pdfcrack is a simple tool for recovering passwords (both owner and
user ones) from pdf-documents. It should be able to handle all
pdfs that uses the standard security handler but the pdf-parsing
routines are a bit of a quick hack so you might stumble across some
pdfs where the parser needs to be fixed to handle.
Cerealizer is a secure pickle-like module.
It support basic types (int, string, unicode, tuple, list, dict,
set...), old and new-style classes (you need to register the class
for security), object cycles, and it can be extended to support
C-defined type.
Cerealizer is available under the GNU GPL licence.
TUF (The Update Framework) helps developers secure their new or existing
software update systems.
Software update systems are vulnerable to many known attacks, including
those that can result in clients being compromised or crashed. TUF helps
solve this problem by providing a flexible security framework that can
be added to software updaters.
PortSentry is part of the Abacus Project suite of security tools.
It is a program designed to detect and respond to port scans against
a target host in real-time. There are other port scan detectors that
perform similar detection of scans, but PortSentry has some unique
features that may make it worth looking into.
Pond is not email. Pond is forward secure, asynchronous messaging for the
discerning. Pond messages are asynchronous, but are not a record; they expire
automatically a week after they are received. Pond seeks to prevent leaking
traffic information against everyone except a global passive attacker.
Pond is experimental software! DO NOT USE IT FOR ANYTHING REAL!!!
Use security/gnupg instead.
"racoon2" is a system to exchange and to install security parameters
for the IPsec.
Currently the system supports the following specification:
Internet Key Exchange (IKEv2) Protocol
draft-ietf-ipsec-ikev2-17.txt
Kerberized Internet Negotiation of Keys (KINK)
draft-ietf-kink-kink-06.txt
PF_KEY Key Management API, Version 2
RFC2367
The Internet Key Exchange (IKE)
RFC2409
Secure rm (srm) is a command-line utility compatible with rm(1) which destroys
file contents before unlinking. The goal is to provide drop-in security for
users who wish to prevent command-line recovery of deleted information, even if
the machine is compromised.
libsodium is a library for network communication, encryption,
decryption, signatures, etc.
libsodium is a portable, cross-compilable, installable,
packageable, API-compatible version of NaCl(security/nacl).
NaCl's goal is to provide all of the core operations needed
to build higher-level cryptographic tools.