Flawfinder searches through source code looking for potential security
flaws. Flawfinder uses an internal database called the ``ruleset''; the
ruleset identifies functions that are common causes of security flaws.
Every potential security flaw found in a given source code file (matching
an entry in the ruleset) is called a ``hit,'' and the set of hits found
during any particular run is called the ``hitlist.''
This port contains the Shrew Soft IKE daemon and client tools. The
software supports IKE V1 communications with an emphasis on client
functionality. It was originally designed to complement a gateway
running the ipsec-tools racoon daemon. The latest version offers a
high level of compatibility with Cisco, Juniper, Zywall, Fortigate
and many other commercial IPsec VPN gateways.
For more information please visit ...
Fragrouter is a program for routing network traffic in such a way as
to elude most network intrusion detection systems.
The attacks implemented correspond to those listed in the Secure
Networks ``Insertion, Evasion, and Denial of Service: Eluding Network
Intrusion Detection'' paper of January, 1998.
OpenSCEP is an open source implementation of the SCEP protocol used by Cisco
routers for certificate enrollment to build VPNs. It implements most of the
draft specification.
OpenSCEP includes a client and a server implementation, as well as some CGI
programs to simplify certificate and revocation list management.
-- ISNprober / Tom Vandepoel (Tom.Vandepoel@ubizen.com) --
ISNprober is a tool that samples TCP Initial Sequence Numbers or IP ID's
and can use that information to determine if a set of IP addresses belong
to the same TCP/IP stack (machine) or not.
Keychain is a shell script which acts as a user-friendly front-end to
ssh-agent(1), allowing you to have one long-running ssh-agent process per
system rather than per login session.
Please study the documentation on the keychain website carefully since
incorrect usage of this script may have certain security implications.
This library implements the RSA encryption and signature algorithms for
arbitrarily-sized ByteStrings. While the implementations work, they are
not necessarily the fastest ones on the planet. Particularly key generation.
The algorithms included are based of RFC 3447, or the Public-Key Cryptography
Standard for RSA, version 2.1 (a.k.a, PKCS#1 v2.1).
American fuzzy lop is a fuzzer that employs a novel type of compile-time
instrumentation and genetic algorithms to automatically discover clean,
interesting test cases that trigger new internal states in the targeted
binary. This substantially improves the functional coverage for the
fuzzed code.
To store passwords securely, they should be salted, then hashed with a
slow hash function. This library uses PBKDF1-SHA256, and handles all the
details. It uses the cryptohash package for speed; if you need a pure
Haskell library, pwstore-purehaskell has the exact same API, but uses
only pure Haskell. It is about 25 times slower than this package, but
still quite usable.
The anonymizing relay monitor (arm) is a terminal status monitor for Tor,
intended for command-line aficionados, ssh connections, and anyone with a tty
terminal. This works much like top does for system usage, providing real time
statistics for:
* bandwidth, cpu, and memory usage
* relay's current configuration
* logged events
* connection details (ip, hostname, fingerprint, and consensus data)
* ... etc