A small command line utility for parsing PKCS#10 certificate signing
requests to perl data structure and provides accessor methods to
supported elements.
It is based on the generic ASN.1 module by Graham Barr and on the
x509decode example by Norbert Klasen. It is also based upon the
works of Duncan Segrests Crypt-X509-CRL module. The module parses
common fields and extensions. Some fields might be missing.
Authforce is an HTTP authentication brute forcer. Using various methods,
it attempts brute force username and password pairs for a site. It has
the ability to try common username and passwords, username derivations,
and common username/password pairs. It is used to both test the security
of your site and to prove the insecurity of HTTP authentication based on
the fact that users just don't pick good passwords.
Cisco-torch is a mass Cisco Vulnerability Scanner.
The main feature that makes Cisco-torch different from similar
tools is the extensive use of forking to launch multiple scanning
processes on the background for maximum scanning efficiency. Also,
it uses several methods of application layer fingerprinting simultaneously,
if needed. We wanted something fast to discover remote Cisco hosts running
Telnet, SSH, Web, NTP and SNMP services and launch dictionary attacks
against the services discovered.
Digest::Pearson is an implementation of Peter K. Pearson's hash algorithm
presented in "Fast Hashing of Variable Length Text Strings" - ACM 1990. This
hashing technique yields good distribution of hashed results for variable
length input strings on the range 0-255, and thus, it is well suited for
data load balancing.
The implementation is in C, so it is fast. If you prefer a pure Perl version
and can tolerate slower speed, you might want to consider
Digest::Pearson::PurePerl instead.
John the Ripper is a fast password cracker, currently available for many
flavors of Unix (eleven are officially supported, not counting different
architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to
detect weak Unix passwords. Besides several crypt(3) password hash types
most commonly found on various Unix flavors, supported out of the box are
Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with
contributed patches (over 40 of additional hash and cipher types).
BSDsfv is a flexible and highly compatible SFV checksum utility.
Features:
- create SFV files, verify downloaded single files or whole releases
- add banners to your SFV files
- very flexible and compatible with all other SFV tools currently known,
including SFVNIX compatibility mode concerning SFV files created
- easy to console application
- plug & play support for glFTPd and other demons including
count-missing-files feature for race scripts
The SHA module allows you to use the NIST SHA message digest algorithm
from within Perl programs.
The final message digest value is returned by the digest operation as
a 20-byte binary string. This operation delivers the result of
operations since the last new or reset operation. Once the operation
has been performed, the context must be reset before being used to
calculate another digest value.
M2Crypto is the most complete Python wrapper for OpenSSL featuring RSA, DSA, DH,
HMACs, message digests, symmetric ciphers (including AES); SSL functionality to
implement clients and servers; HTTPS extensions to Python's httplib, urllib, and
xmlrpclib; unforgeable HMAC'ing AuthCookies for web session management; FTP/TLS
client and server; S/MIME; ZServerSSL: A HTTPS server for Zope and ZSmime: An
S/MIME messenger for Zope.
Duo provides simple two-factor authentication as a service via:
1. Phone callback
2. SMS-delivered one-time passcodes
3. Duo mobile app to generate one-time passcodes
4. Duo mobile app for smartphone push authentication
5. Duo hardware token to generate one-time passcodes
This package allows an admin (or ordinary user) to quickly add Duo
authentication to any Unix login without setting up secondary user
accounts, directory synchronization, servers, or hardware.
This is a small command-line utility for encryption and decryption
using the principle of one-time pads (OTPs). One or more data files
given to pad are XORd with each other and with RNG output, resulting
in two or more output files. The output files are indistinguishable
from random noise, except that when the pad utility is used to XOR
them together again, the original data files may be recovered.
Jason Harris <jharris@widomaker.com>