Ports Search

Results 1,1711,180 of 1,385 for /security/.(0.002 seconds)
security/rex-core-0.1.2 (Score: 0.08339406)
Core libraries required for the Ruby Exploitation(Rex) Suite
The Ruby Exploitation(rex) Core Gem contains the odds and ends of code that so many other pieces of Rex rely upon, but that are too small to be put into their own seperate gems. This include some of the ruby cross-platform compatibility and file utility code.
security/rex-encoder-0.1.0 (Score: 0.08339406)
Ruby Exploitation(Rex) library for various polymorphic encoders
This library provides the basis for all of the polymorphic encoders that Metasploit uses for payload encoding. Encoders are used to try and create a version of a payload that is free of bad characters as defined by the exploit.
security/libgcrypt-1.4.4 (Score: 0.08339406)
General purpose crypto library based on code used in GnuPG
security/pgpgpg-0.13 (Score: 0.08339406)
Wrapper for GnuPG to simulate PGP 2.6.x
pgpgpg is a wrapper around Gnu Privacy Guard which takes PGP 2.6 command line options, translates them, and calls GnuPG (Gnu Privacy Guard) to perform the desired action.
security/webscarab-20090427 (Score: 0.08339406)
Framework for analysing HTTP and HTTPS web application traffic
WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. In its most common usage, WebScarab operates as an intercepting proxy, allowing the user to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser.
security/webshag-1.10 (Score: 0.08339406)
Multi-threaded, multi-platform web server audit tool
Webshag is a multi-threaded, multi-platform web server audit tool. Written in Python, it gathers commonly useful functionalities for web server auditing like website crawling, URL scanning or file fuzzing.
security/wipe-2.3.1 (Score: 0.08339406)
File and block device wiping utility
Wipe is a file and block device wiping utility.
security/snort2pfcd-0.8 (Score: 0.08339406)
Snort alert to pf blocker
Analyzes snort alert output and blocks ip addresses using pf for a specified period of time. A whitelist is specified in CIDR format to exclude local and trusted ip address from being blocked.
security/sslsniffer-1.21 (Score: 0.08339406)
SSLv3/TLS and SSLv2 sniffer
A SSLv3/TLS and SSLv2 proxy server that sniffs SSL/TLS packets and prints out the contents of packets in stdout. It can also serve as a (not very efficient) proxy server. Note that this tool does not decrypt or even attempt to decrypt the traffic that is routed through it.
security/xorsearch-1.2.0 (Score: 0.08339406)
Search for a given string in an XOR or ROL encoded binary file
XORSearch is a program to search for a given string in an XOR or ROL encoded binary file. An XOR encoded binary file is a file where some (or all) bytes have been XORed with a constant value (the key). A ROL (or ROR) encoded file has it bytes rotated by a certain number of bits (the key). XOR and ROL/ROR encoding is used by malware programmers to obfuscate strings like URLs. XORSearch will try all XOR keys (0 to 255) and ROL keys (1 to 7) when searching. I programmed XORSearch to include key 0, because this allows to search in an unencoded binary file (X XOR 0 equals X). If the search string is found, XORSearch will print it until the 0 (byte zero) is encountered or until 50 characters have been printed, which ever comes first. 50 is the default value, it can be changed with option -l. Unprintable characters are replaced by a dot.