Fakeroot runs a command in an environment were it appears to have
root privileges for file manipulation, by setting LD_PRELOAD to a
library with alternative versions of getuid(), stat(), etc. This
is useful for allowing users to create archives (tar, ar, .deb .rpm
etc.) with files in them with root permissions/ownership.
chroot_safe, a tool to chroot any application in a sane manner without
requring binaries, shared libraries etc within the chroot or any support from
the application. Works with any dynamically linked application.
Firewalk is a network auditing tool that attempts to
determine what transport protocols a given gateway will
pass. Firewalk works by sending out TCP or UDP packets
with a TTL one greater than the targeted gateway. If the
gateway allows the traffic, it will forward the packets to
the next hop where they will expire and elicit an
ICMP_TIME_EXCEEDED message. If the gateway host does not
allow the traffic, it will likely drop the packets on the
floor and we will see no response.
A native MD5 implementation in Common Lisp.
FTimes is a system baselining and evidence collection tool. Its
primary purpose is to gather and/or develop topographical information
and attributes about specified directories and files in a manner
conducive to intrusion and forensic analysis. It was designed to
support the following initiatives: content integrity monitoring,
incident response, intrusion analysis, and computer forensics.
DMitry (Deepmagic Information Gathering Tool) is a UNIX/Linux command line
program coded purely in C with the ability to gather as much information as
possible about a host.
openCryptoki is a PKCS#11 implementation.
ipfwcount reads ipfw(8) logs and extracts the following fields:
rule action proto type shost sport dhost dport dir iface
You can then print lists like 'top <n> blocked ports', 'top <n> blocked hosts',
or 'incoming connections sorted by interface and protocol'.
For more sophisticated lists, you can filter the entries using Perl expressions.
racoon speaks IKE (ISAKMP/Oakley) key management protocol, to
establish security association with other hosts.
This is the IPSec-tools version of racoon.
Enchancements:
- Support of NAT-T and IKE fragmentation.
- Support of many authentication algorithms.
- Tons of bugfixes.
Known issues:
- Non-threaded implementation. Simultaneous key negotiation performance
should be improved.
- Cannot negotiate keys for per-socket policy.
- Cryptic configuration syntax - blame IPsec specification too...
- Needs more documentation.
Design choice, not a bug:
- racoon negotiate IPsec keys only. It does not negotiate policy. Policy must
be configured into the kernel separately from racoon. If you want to
support roaming clients, you may need to have a mechanism to put policy
for the roaming client after phase 1 finishes.
Gnome Password Generator is a GUI based secure password generator. It allows
the user to generate a specified number of random passwords of a specified
length.