This package provides an interface to the cracklib (libcrack) libraries that
come standard on most Unix-like distributions. This allows you to check
passwords against dictionaries of words to ensure some minimal level of
password security.
From the cracklib README
CrackLib makes literally hundreds of tests to determine whether you've
chosen a bad password.
* It tries to generate words from your username and gecos entry to tries
to match them against what you've chosen.
* It checks for simplistic patterns.
* It then tries to reverse-engineer your password into a dictionary
word, and searches for it in your dictionary.
- after all that, it's PROBABLY a safe(-ish) password. 8-)
Python-mcrypt is a comprehensive Python interface to the mcrypt library,
which provides a uniform interface to several symmetric encryption algorithms.
TrustedPickle is a Python module that can save most any arbitrary Python object
in a signed pickle file. There are two big differences between this module and
the standard pickle module. First, TrustedPickle can pickle a module, but the
standard pickle module cannot. Second, TrustedPickle includes a signature that
can verify the data's origin before the data is unpickled.
A pure python implementation of the Rijndael encryption algorithm. Useful for
quick string encryption in python programs but probably is not fast enough for
anything too big.
The PEAR Text_Password package allows one to create pronounceable and
unpronounceable passwords.
This extension provides methods to PHP interact with gnupg.
A simple, low-level PHP extension for libsodium.
pecl-pam provides PAM (Pluggable Authentication Modules) integration.
PAM is a system of libraries that handle the authentication tasks of
applications and services. The library provides a stable API for
applications to defer to for authentication tasks.
Sancp is a network security tool designed to collect
statistical information regarding network traffic, as
well as, collect the traffic itself in pcap format, all
for the purpose of: auditing, historical analysis, and
network activity discovery. Rules can be used to distinguish
normal from abnormal traffic and support tagging connections
with: rule id, node id, and status id. From an intrusion
detection standpoint, every connection is an event that must
be validated through some means. Sancp uses rules to identify,
record, and tag traffic of interest. 'Tagging' a connection
is a new feature since v1.4.0 Connections ('stats') can be
loaded into a database for further analysis.
Tcl SASL provides a Tcl interface to the Cyrus SASLv2 library.