Meek is a transport that uses HTTP for carrying bytes and TLS for obfuscation.
Traffic is relayed through a third-party server (Google App Engine). It uses a
trick to talk to the third party so that it looks like it is talking to an
unblocked server.
NASL is a scripting language designed for the Nessus security scanner. Its
aim is to allow anyone to write a test for a given security hole in a few
minutes, to allow people to share their tests without having to worry
about their operating system, and to garantee everyone that a NASL script
can not do anything nasty except performing a given security test against
a given target. Thus, NASL allows you to easily forge IP packets, or to
send regular packets. It provides you some convenient functions that will
make the test of web and ftp server more easy to write. NASL
garantees you that a NASL script :
will not send any packet to a host other than the target host
will not execute any commands on your local system
NASL is not a powerful scripting language. Its purpose is to make scripts
that are security tests. So, do not expect to write a third generation web
server in this language, nor a file conversion utility. Use perl, python
or whatever scripting language to do this.
OpenCT is a middleware framework for smart card terminals.
OpenCT implements drivers for several smart card readers.
It comes as driver in ifdhandler format for PC/SC-Lite,
as CT-API driver, or as a small and lean middleware, so
applications can use it with minimal overhead.
OpenCT also has a primitive mechanism to export smart card
readers to remote machines via TCP/IP.
The Open Vulnerability Assessment System (OpenVAS) is a framework of several
services and tools offering a comprehensive and powerful vulnerability
scanning and vulnerability management solution.
This package contains the OpenVAS Scanner which executes Network Vulnerability
Tests (NVTs) provided by the OpenVAS NVT Feed or a commercial feed service.
Provides a way to load and enumerate PKCS#11 modules. Provides a
standard configuration setup for installing PKCS#11 modules in
such a way that they're discoverable.
Also solves problems with coordinating the use of PKCS#11 by
different components or libraries living in the same process.
This module comes with a set of methods to use with htaccess password
files. These files (and htaccess) are used to do Basic Authentication
on a web server.
The password file is a flat-file with login names and their associated
crypted password. You can use this for non-Apache files if you wish,
but it was written specifically for .htaccess style files.
Crypt::GOST_PP is a pure perl implementation of GOST, a 64-bit
symmetrical block cipher with a 256-bit key from the former Soviet
Union. Please read the Pod documentation contained in the module
itself for additional information, including the rationale behind
the writing of this module.
Heimdal::Kadm5 is a Perl XS wrapper around the Heimdal Kerberos
administrative client library (libkadm5clnt). Heimdal is a free slightly
less export challenged implementation of Kerberos5 by Assar Westerlund and
Johan Danielsson. This module exposes the API used to administer a
Kerberos realm: add, remove, and list principals, create keytabs, change
keys, and similar operations.
This is a very simple snort rule object. It was developed to allow for
scripted dynamic rule creation. Ideally you could dynamically take a
list of bad hosts and build an array of snort rule objects from that
list. Then write that list using the string() method to a snort rules
file.
Pond is not email. Pond is forward secure, asynchronous messaging for the
discerning. Pond messages are asynchronous, but are not a record; they expire
automatically a week after they are received. Pond seeks to prevent leaking
traffic information against everyone except a global passive attacker.
Pond is experimental software! DO NOT USE IT FOR ANYTHING REAL!!!
Use security/gnupg instead.