This is a collection of simple PIN or passphrase entry dialogs which
utilize the Assuan protocol as described by the aegypten project.
Pixiewps is a tool written in C used to bruteforce offline the WPS pin
exploiting the low or non-existing entropy of some APs (pixie dust attack).
It is meant for educational purposes only.
All credits for the research go to Dominique Bongard.
This package implements an algorithm for breaking the PkZip cipher that was
devised by Eli Biham and Paul Kocher.
This program applies a known plaintext attack to an encrypted file.
A known-plaintext-attack recovers a password using the encrypted file and
(part of) the unencrypted file.
Please note that cryptographers use the word 'plaintext' for any kind of
unencrypted data - not necessarily readable ASCII text.
Before you ask why somebody may want to know the password when he already knows
the plaintext think of the following situations:
- Usually there's a large number of files in a ZIP-archive. Usually all these
files are encrypted using the same password. So if you know one of the files,
you can recover the password and decrypt the other files.
- You need to know only a part of the plaintext (at least 13 bytes). Many files
have commonly known headers, like DOS .EXE-files. Knowing a reasonably long
header you can recover the password and decrypt the entire file.
mbed TLS is a lightweight, portable, fully featured and standards compliant
SSL/TLS and cryptography library.
Welcome to the Proactive Abuse Reporting System.
In an effort to be proactive in doing my part to stop the massive
quantities of internet traffic probing for open ports or more
specifically the probing for known ports that Windows spy ware,
Trojans, and what ever other Windows ports are commonly probed
which result in increasing my bandwidth usage changes, I wrote this
perl application for reporting that abuse to the senders ISP, with
the hopes they will monitor the abuser and terminate the abuser's
internet account and or take legal action.
Script is installed into /usr/local/sbin where you can edit the
defaults to meet your requirements. Issue rehash command to enable.
Run abuse.Reporting.system.pl script for complete overview description
of system.
6/1/2004 Author: Joe Barbish, I bequeath these perl scripts to public
domain. It can be copied and distributed for free by anyone to anyone
by any manner.
Joe Barbish
fbsd_user@a1poweruser.com
This module implements the password-based key derivation function,
PBKDF2, specified in RSA PKCS#5 v2.0.
A Python library for parsing PGP packets
ProFTPD module mod_clamav
pulledpork is a Perl script which helps to update your Snort 2.9+ rules.
-= Features and Capabilities =-
* Automated downloading, parsing, state modification and rule
modification for all of your snort rulesets.
* Checksum verification for all major rule downloads
* Automatic generation of updated sid-msg.map file
* Capability to include your local.rules in sid-msg.map file
* Capability to pull rules tarballs from custom urls
* Complete Shared Object support
* Complete IP Reputation List support
* Capability to download multiple disparate rulesets at once
* Maintains accurate changelog
* Capability to HUP processes after rules download
* Aids in tuning of rulesets
* Verbose output so that you know EXACTLY what is happening
* Minimal Perl Module dependencies
* A sweet smokey flavor throughout the pork!
PuTTY is a client program for the SSH, Telnet and Rlogin network protocols.
These protocols are all used to run a remote session on a computer,
over a network. PuTTY implements the client end of that session:
the end at which the session is displayed, rather than the end
at which it runs.