Ports Search

Results 15,23115,240 of 19,819 for %22HTTP Server%22.(0.01 seconds)
security/yara-editor-0.1.5 (Score: 9.2878623E-4)
Editor for yara rules
Editor for yara rules
security/tclsasl-1.0 (Score: 9.2878623E-4)
Tcl interface to the Cyrus SASLv2 library
Tcl SASL provides a Tcl interface to the Cyrus SASLv2 library.
security/tpmmanager-0.8.1 (Score: 9.2878623E-4)
TPM Manager
TPM Manager is an open source TPM management software providing an easy-to-use graphical user interface.
security/pgpgpg-0.13 (Score: 9.2878623E-4)
Wrapper for GnuPG to simulate PGP 2.6.x
pgpgpg is a wrapper around Gnu Privacy Guard which takes PGP 2.6 command line options, translates them, and calls GnuPG (Gnu Privacy Guard) to perform the desired action.
security/xml-security-1.5.5 (Score: 9.2878623E-4)
Java library for XML Signature and Encryption
The Apache-XML-Security-J supports XML-Signature Syntax and Processing, W3C Recommendation 12 February 2002 and XML Encryption Syntax and Processing, W3C Recommendation 10 December 2002. The Java library supports the standard Java API JSR-105: XML Digital Signature APIs for creating and validating XML Signatures. A standard Java API for XML Encryption JSR-106: XML Digital Encryption APIs is in progress and is not final, so this API is not yet supported.
security/xorsearch-1.2.0 (Score: 9.2878623E-4)
Search for a given string in an XOR or ROL encoded binary file
XORSearch is a program to search for a given string in an XOR or ROL encoded binary file. An XOR encoded binary file is a file where some (or all) bytes have been XORed with a constant value (the key). A ROL (or ROR) encoded file has it bytes rotated by a certain number of bits (the key). XOR and ROL/ROR encoding is used by malware programmers to obfuscate strings like URLs. XORSearch will try all XOR keys (0 to 255) and ROL keys (1 to 7) when searching. I programmed XORSearch to include key 0, because this allows to search in an unencoded binary file (X XOR 0 equals X). If the search string is found, XORSearch will print it until the 0 (byte zero) is encountered or until 50 characters have been printed, which ever comes first. 50 is the default value, it can be changed with option -l. Unprintable characters are replaced by a dot.
security/yapet-1.0 (Score: 9.2878623E-4)
Curses based password manager
YAPET is a curses based password manager using the Blowfish encryption algorithm to store passwords encrypted on disk.
security/stegdetect-0.6 (Score: 9.2878623E-4)
Automated tool for detecting steganographic content in JPEGs
Stegdetect is an automated tool for detecting steganographic content in images. It is capable of detecting several different steganographic methods to embed hidden information in JPEG images. Currently, the detectable schemes are: * jsteg * jphide (Unix and Windows) * invisible secrets * outguess 01.3b * F5 * appendX and camouflage
security/zebedee-2.5.3 (Score: 9.2878623E-4)
Encrypted, secure compressed TCP tunnel
Zebedee is a simple program to establish an encrypted, compressed TCP/IP "tunnel" between two systems. This allows TCP-based traffic such as telnet, ftp and X to be protected from snooping as well as potentially gaining performance over low-bandwidth networks from compression.
security/whatweb-0.4.8.f467.a2 (Score: 9.2878623E-4)
Tool to fingerprint web site components
WhatWeb can be used to detect the software packages that are used for a website. It can detect content management systems (CMS), blogging platforms, stats/analytics packages, javascript libraries, servers, etc.