Ports Search

Results 9,8219,830 of 19,819 for %22HTTP Server%22.(0.01 seconds)
security/fiked-0.0.5 (Score: 0.0010835839)
Fake IKE PSK+XAUTH daemon based on VPNC
This is a fake IKE daemon supporting just enough of the standards and Cisco extensions to attack commonly found insecure Cisco PSK+XAUTH VPN setups. If you know the pre-shared key, also known as shared secret or group password, you can impersonate the VPN gateway in IKE phase 1, and learn XAUTH user credentials in phase 2.
security/chroot_safe-1.4 (Score: 0.0010835839)
Tool to chroot softwares easily
chroot_safe, a tool to chroot any application in a sane manner without requring binaries, shared libraries etc within the chroot or any support from the application. Works with any dynamically linked application.
security/firewalk-5.0 (Score: 0.0010835839)
Remote firewall auditing tool
Firewalk is a network auditing tool that attempts to determine what transport protocols a given gateway will pass. Firewalk works by sending out TCP or UDP packets with a TTL one greater than the targeted gateway. If the gateway allows the traffic, it will forward the packets to the next hop where they will expire and elicit an ICMP_TIME_EXCEEDED message. If the gateway host does not allow the traffic, it will likely drop the packets on the floor and we will see no response.
security/cksfv-1.3.14 (Score: 0.0010835839)
Create or manipulate Simple File Verification (SFV) checksum files
The Simple File Verification (SFV) system is a file integrity verification system which is popular on some platforms. A software package may be accompanied by an SFV file (usually with extension .sfv) which contains CRC-32 checksums for all the files that comprise the package. cksfv (Check SFV) can both create simple file verification (SFV) files, and test file integrity against existing SFV files.
security/md5-1.8.5 (Score: 0.0010835839)
Native MD5 implementation in Common Lisp
A native MD5 implementation in Common Lisp.
security/fpm2-0.79 (Score: 0.0010835839)
Program that allows you to securely store the passwords
Figaro's Password Manager 2 is a program that allows you to securely store the passwords using GTK2 interface. Features include: - Passwords are encrypted with the AES-256 algorithm. - Copy passwords or usernames to the clipboard/primary selection. - If the password is for a web site, FPM2 can keep track of the URLs of your login screens and can automatically launch your browser. In this capacity, FPM2 acts as a kind of bookmark manager. - You can teach FPM2 to launch other applications, and optionally pass hostnames, usernames or passwords to the command line. - FPM2 also has a password generator that can choose passwords for you. It allows you to determine how long the password should be, and what types of characters (lower case, upper case, numbers and symbols) should be used. You can even have it avoid ambiguous characters such as a capital O or the number zero. - Auto-minimise and/or auto-locking passwords database after configurable time to the tray icon.
security/ftimes-3.11.0 (Score: 0.0010835839)
System baselining and evidence collection tool
FTimes is a system baselining and evidence collection tool. Its primary purpose is to gather and/or develop topographical information and attributes about specified directories and files in a manner conducive to intrusion and forensic analysis. It was designed to support the following initiatives: content integrity monitoring, incident response, intrusion analysis, and computer forensics.
security/fwanalog-0.6.9 (Score: 0.0010835839)
Firewall log summarizer that uses Analog
fwanalog is a shell script that parses and summarizes firewall logfiles. It uses the excellent log analysis program Analog to create its reports.
security/fwknop-2.6.8 (Score: 0.0010835839)
SPA implementation for Linux and FreeBSD
fwknop, "FireWall KNock OPerator", implements Single Packet Authorization (SPA).
security/fwlogwatch-1.5 (Score: 0.0010835839)
Packet filter and firewall log analyzer
fwlogwatch is a packet filter and firewall log analyzer General features: - Can detect and process log entries in the following formats: - Linux ipchains, Linux netfilter/iptables, Solaris/BSD/Irix/HP-UX ipfilter, BSD ipfw, Cisco IOS, Cisco PIX / FWSM, NetScreen, Windows XP firewall, Elsa Lancom router, Snort IDS - Entries can be parsed from single, multiple and combined log files, the parsers to be used can be selected. - Gzip-compressed logs are supported transparently. - Can separate recent from old entries and detects timewarps in log files. - Can recognize 'last message repeated' entries concerning the firewall. - Integrated resolver for protocols, services and host names. - Can do lookups in the whois database. - Own DNS and whois information cache for faster lookups. - Hosts, networks, ports, chains and branches (targets) can be selected or excluded as needed. - Support for internationalization (available in english, german, portuguese, simplified and traditional chinese, swedish and japanese).