Ports Search

Results 7,9617,970 of 17,773 for comment.zh_CN%3A%E6%8E%A7%E5%88%B6%E5%8F%B0.(0.013 seconds)
security/Crypt-GOST_PP-1.10 (Score: 2.1584389E-4)
Perl extension for GOST Encryption Algorithm in pure Perl
Crypt::GOST_PP is a pure perl implementation of GOST, a 64-bit symmetrical block cipher with a 256-bit key from the former Soviet Union. Please read the Pod documentation contained in the module itself for additional information, including the rationale behind the writing of this module.
security/Crypt-RHash-0.91 (Score: 2.1584389E-4)
Compute hash sums and magnet links
Crypt::Rhash module is an object-oriented interface to the LibRHash library, allowing simultaneous calculation of several hash functions for a file or a text message. Resulting hash digest can be obtained in hexadecimal, BASE32, BASE64, raw binary format or as a magnet link.
security/Heimdal-Kadm5-0.08 (Score: 2.1584389E-4)
Perl extension for Heimdal administrative client library
Heimdal::Kadm5 is a Perl XS wrapper around the Heimdal Kerberos administrative client library (libkadm5clnt). Heimdal is a free slightly less export challenged implementation of Kerberos5 by Assar Westerlund and Johan Danielsson. This module exposes the API used to administer a Kerberos realm: add, remove, and list principals, create keytabs, change keys, and similar operations.
security/Snort-Rule-1.07 (Score: 2.1584389E-4)
Perl5 extension for dynamically building snort rules
This is a very simple snort rule object. It was developed to allow for scripted dynamic rule creation. Ideally you could dynamically take a list of bad hosts and build an array of snort rule objects from that list. Then write that list using the string() method to a snort rules file.
security/pdfcrack-0.15 (Score: 2.1584389E-4)
Cracking tool for password-protected PDF-files
pdfcrack is a simple tool for recovering passwords (both owner and user ones) from pdf-documents. It should be able to handle all pdfs that uses the standard security handler but the pdf-parsing routines are a bit of a quick hack so you might stumble across some pdfs where the parser needs to be fixed to handle.
security/pond-20150830 (Score: 2.1584389E-4)
Forward secure, asynchronous messenger
Pond is not email. Pond is forward secure, asynchronous messaging for the discerning. Pond messages are asynchronous, but are not a record; they expire automatically a week after they are received. Pond seeks to prevent leaking traffic information against everyone except a global passive attacker. Pond is experimental software! DO NOT USE IT FOR ANYTHING REAL!!! Use security/gnupg instead.
security/kerberos-1.2.4 (Score: 2.1584389E-4)
Kerberos bindings for python
This Python package is a high-level wrapper for Kerberos (GSSAPI) operations. The goal is to avoid having to build a module that wraps the entire Kerberos.framework, and instead offer a limited set of functions that do what is needed for client/server Kerberos authentication based on <http://www.ietf.org/rfc/rfc4559.txt>.
security/pysaml2-4.0.2 (Score: 2.1584389E-4)
Python implementation of SAML Version 2
PySAML2 is a pure python implementation of SAML2. It contains all necessary pieces for building a SAML2 service provider or an identity provider. The distribution contains examples of both. Originally written to work in a WSGI environment there are extensions that allow you to use it with other frameworks.
security/sslstrip-0.9 (Score: 2.1584389E-4)
Python program for SSL stripping
It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. It also supports modes for supplying a favicon which looks like a lock icon, selective logging, and session denial.
security/yara-3.5.0 (Score: 2.1584389E-4)
Python bindings for yara
The python bindings for yara. "YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns contained on samples of those families. Each description consists of a set of strings and a Boolean expression which determines its logic."