ClamTk is a GUI front-end for ClamAV using gtk2-perl. It is designed to
be an easy-to-use frontend for Unix systems.
ClusterSSH controls a number of xterm windows via a single graphical
console window to allow commands to be interactively run on multiple
servers over an ssh connection.
Google's Certificate Transparency project is an open framework for monitoring
and auditing SSL certificates in nearly real time. It makes it possible
to detect SSL certificates that have been mistakenly issued by a certificate
authority or maliciously acquired from an otherwise unimpeachable certificate
authority. It also makes it possible to identify certificate authorities
that have gone rogue and are maliciously issuing certificates.
Cops is a set of programs to check how secure your system is. It
checks file and directory privileges, SUID programs, etc. It has
support for checking passwords, but this port doesn't include it
as it is DES based. This port installs cops in a single directory
area. The directory has no non-user privileges and cops is meant
to be run locally to that directory. The perl version of cops is
also included in a subdirectory.
"hmap" is a tool for fingerprinting web servers. Basically, it collects
a number of characteristics and compares them with known profiles to find
a closest match. The closest match is its best guess for the identity of
the server.
The Courier Authentication Library is a generic authentication API used
for two purposes:
1. Read the name of a mail account. Determine the local account's home
directory, and system userid and groupid.
2. Read an account name, and a password. If valid, determine the
account's home directory, system userid, and groupid.
This program can convert your Checkpoint FW1 rulesets into
XML files which can then be processed by Firewall Builder.
DES, Blowfish, AES, TEA, SHA1, MD5, RSA, BubbleBabble, Hexdump, Support for
Word128, Word192 and Word256 and Beyond, PKCS5 Padding, Various Encryption
Modes e.g. Cipher Block Chaining all in one package, with HUnit and
QuickCheck tests, and examples.
Cryptographically secure RNGs.