Veusz is a GUI scientific plotting and graphing package. It
is designed to produce publication-ready Postscript or PDF
output. SVG, EMF and bitmap formats export are also supported.
The program runs under Unix/Linux, Windows or Mac OS X, and
binaries are provided. Data can be read from text, CSV or FITS
files, and data can be manipulated or examined from within the
application.
Fwipe is a secure file erasing program. fwipe0, which actually erases
your files, is immune to filenames containing spaces, carriage returns,
dashes, or any other special characters. You can use it in place of rm
in cron jobs, together with "find ... -print0". The output of fwipe0 is
specially designed to be parsed easily by machine, so it can be embedded
in other applications which need secure file erasure.
hlfl stands for "High Level Firewall Language". It permits writing
firewalling rules using a high level language, and transforms them into
rules for real software, like ipfilter, ipchains or cisco rules.
You could make contact with the developers by subscribing to
<hlfl@hlfl.org>. There is also an announce ML at <hlfl-announce@hlfl.org>.
These lists are managed by majordomo (write to <majordomo@hlfl.org> with
"help" in the body of your mail).
Cipher-aes128 is an implementation of AES and common modes of operation.
It borrows Hanquez's C AES code (see 'cipher-aes') but is unique due to
including compile-time detection of NI compiler support, a slightly more
functional interface for GCM operations, exposure of 'Ptr' based
operations via the .Internal module, and build-in crypto-api support.
Cipher-aes128 was originally developed as "'cipher-aes' plus
trampolines", which has since been adopted into cipher-aes.
Crypt::LE provides the functionality necessary to use Let's Encrypt
API and generate free SSL certificates for your domains. It can
also be used to generate RSA keys and Certificate Signing Requests
or to revoke previously issued certificates. Crypt::LE is shipped
with a self-sufficient client for obtaining SSL certificates -
le.pl.
The client supports 'http' and 'dns' domain verification out of the box.
mac-robber is a Forensics & Incident Response tool used to collect
the Modified, Access, and Change (MAC) times from allocated files.
It recursively reads MAC times of files and directories and prints
them in 'time machine' format to STDOUT. This format is the same
that the mactime tool from The Coroners Toolkit (TCT) reads.
mac-robber is based on the grave-robber tool from The Coroners
Toolkit (TCT) when using the '-m' flag, except it does not require
Perl!
NaCl (pronounced "salt") is a new easy-to-use high-speed software
library for network communication, encryption, decryption, signatures,
etc. NaCl's goal is to provide all of the core operations needed to
build higher-level cryptographic tools.
Of course, other libraries already exist for these core operations.
NaCl advances the state of the art by improving security, by improving
usability, and by improving speed.
OpenSC provides a set of libraries and utilities to
access smart cards. Its main focus is on cards that
support cryptographic operations, and facilitate their
use in security applications such as mail encryption,
authentication, and digital signature.
OpenSC implements the PKCS#11 API so applications
supporting this API such as Mozilla Firefox and
Thunderbird can use it.
OpenSC implements the PKCS#15 standard and aims to be
compatible with every software that does so, too.
from the README:
OutGuess is a universal steganographic tool that allows the insertion
of hidden information into the redundant bits of data sources. The
nature of the data source is irrelevant to the core of OutGuess. The
program relies on data specific handlers that will extract redundant
bits and write them back after modification. In this version the PNM
and JPEG image formats are supported.
The histogram utility is not installed by this port/package because
it crashes.
Decrypt the output from the yubikey token
The hardware can be found at
http://www.yubico.com/home/index/
The decryption module does only one thing - decrypt the AES encrypted
OTP from the Yubikey. To this, it requires the OTP, and the AES
key.
Please note - this module does not perform authentication - it is
a required component to decrypt the token first before authentication
can be performed.