Ports Search

Results 9,7319,740 of 17,773 for comment.zh_CN%3A%E6%8E%A7%E5%88%B6%E5%8F%B0.(0.011 seconds)
security/oauth2client-2.2.0 (Score: 1.869263E-4)
OAuth 2.0 client library
oauth2client is a Python module for client-side oauth2 authentication. It works with Google's oauth2 service by default, and is compatible with any oauth2 service.
security/quantis-v13.11.08 (Score: 1.869263E-4)
Kernel driver for Quantis PCI/PCIe random number generator
Quantis is a physical random number generator exploiting an elementary quantum optics process. This port contains the kernel driver to access Quantis PCI and PCIe devices.
security/pycrypto-2.6.1 (Score: 1.869263E-4)
Python Cryptography Toolkit
Python Cryptography Toolkit (pycrypto) This is a collection of both secure hash functions (such as MD5 and SHA), and various encryption algorithms (AES, DES, ElGamal, etc.) for Python.
security/gwee-1.36 (Score: 1.869263E-4)
Tool to exploit command execution vulnerabilities in web scripts
gwee (Generic Web Exploitation Engine) is a small program written in C designed to exploit input validation vulnerabilities in web scripts, such as Perl CGIs, PHP, etc.
security/rsa-3.3 (Score: 1.869263E-4)
Pure-Python RSA implementation
Python-RSA is a pure-Python RSA implementation. It supports encryption and decryption, signing and verifying signatures, and key generation according to PKCS#1 version 1.5.
security/signedjson-1.0.0 (Score: 1.869263E-4)
Sign JSON with Ed25519 signatures
python-signedjson allows more than one entity to sign an object, can sign with more than one key and replace ED25519 with a different algorithm.
security/rhash-1.3.3 (Score: 1.869263E-4)
Utility and library for computing and checking of file hashes
RHash is a console utility and library for computing and verifying hash sums of files. It supports CRC32, MD4, MD5, SHA1, SHA256, SHA512, SHA3, Tiger, TTH, Torrent BTIH, AICH, ED2K, GOST R 34.11-94, RIPEMD-160, HAS-160, EDON-R 256/512, Whirlpool, and Snefru-128/256 hash sums. Its features are: * Can calculate Magnet links * Output in a predefined (SFV, BSD-like) or a user-defined format * Ability to process directories recursively * Updating existing hash-files (adding hash sums of files missing in a hash-file) * Portable, written in pure C, small in size, open source (MIT license) Perl wrapper is available as `security/p5-Crypt-RHash' port.
security/camellia-1.2 (Score: 1.869263E-4)
Ruby extension library which implements Camellia encryption
This is a Camellia package for Ruby. Camellia engine is implemented in "C". Supported key length : 128bit/192bit/256bit Supported modes of operation : ECB/CFB/CBC
security/twofish-0.7 (Score: 1.869263E-4)
Twofish cryptographic module for Python
A pure python implementation of the Rijndael encryption algorithm. Useful for quick string encryption in python programs but probably is not fast enough for anything too big.
security/sancp-1.6.1 (Score: 1.869263E-4)
Network connection profiler
Sancp is a network security tool designed to collect statistical information regarding network traffic, as well as, collect the traffic itself in pcap format, all for the purpose of: auditing, historical analysis, and network activity discovery. Rules can be used to distinguish normal from abnormal traffic and support tagging connections with: rule id, node id, and status id. From an intrusion detection standpoint, every connection is an event that must be validated through some means. Sancp uses rules to identify, record, and tag traffic of interest. 'Tagging' a connection is a new feature since v1.4.0 Connections ('stats') can be loaded into a database for further analysis.