Ports Search

Results 7,7717,780 of 8,048 for www%3Atrac.(0.006 seconds)
security/dirbuster-1.0r1 (Score: 0.0034885632)
DirBuster allows file and directory brute forcing on web servers
DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers. Often is the case now of what looks like a web server in a state of default installation is actually not, and has pages and applications hidden within. DirBuster attempts to find these.
security/ipv6toolkit-2.0 (Score: 0.0034885632)
Set of IPv6 security assessment tools
The IPv6 toolkit is a portable IPv6 security assessment suite produced by Fernando Gont on behalf of the UK CPNI.
security/jbrofuzz-2.1 (Score: 0.0034885632)
JBroFuzz is a web application fuzzer
JBroFuzz is a web application fuzzer for requests being made over HTTP or HTTPS. Its purpose is to provide a single, portable application that offers stable web protocol fuzzing capabilities.
security/keychain-2.8.2 (Score: 0.0034885632)
User-friendly front-end to ssh-agent(1)
Keychain is a shell script which acts as a user-friendly front-end to ssh-agent(1), allowing you to have one long-running ssh-agent process per system rather than per login session. Please study the documentation on the keychain website carefully since incorrect usage of this script may have certain security implications.
security/keynote-2.3 (Score: 0.0034885632)
Trust-Management System
KeyNote is a simple and flexible trust-management system designed to work well for a variety of large- and small- scale Internet-based applications. It provides a single, unified language for both local policies and credentials. KeyNote policies and credentials, called `assertions,' contain predicates that describe the trusted actions permitted by the holders of specific public keys. KeyNote assertions are essentially small, highly-structured programs. A signed assertion, which can be sent over an untrusted network, is also called a `credential assertion.' Credential assertions, which also serve the role of certificates, have the same syntax as policy assertions but are also signed by the principal delegating the trust. This is an example implementation of the KeyNote Trust-Management System as specified in IETF draft <draft-blaze-ietf-trustmgt-keynote-02.txt>.
security/luasec-0.5.1 (Score: 0.0034885632)
Lua binding for the OpenSSL library to provide TLS/SSL communication
LuaSec is a binding for OpenSSL library to provide TLS/SSL communication. This version delegates to LuaSocket the TCP connection establishment between the client and server. Then LuaSec uses this connection to start a secure TLS/SSL session.
security/libsectok-20030619 (Score: 0.0034885632)
ISO 7816 Smartcard API Library
This is the libsectok library from citi.umich.edu. Originally targeted for OpenBSD. This is a quick port of the library itself; it contains an API for working with ISO 7816 Smart Card devices.
security/mac-robber-1.02 (Score: 0.0034885632)
Tool for listing Modify, Access, Create timestamps from files
mac-robber is a Forensics & Incident Response tool used to collect the Modified, Access, and Change (MAC) times from allocated files. It recursively reads MAC times of files and directories and prints them in 'time machine' format to STDOUT. This format is the same that the mactime tool from The Coroners Toolkit (TCT) reads. mac-robber is based on the grave-robber tool from The Coroners Toolkit (TCT) when using the '-m' flag, except it does not require Perl!
security/medusa-2.2 (Score: 0.0034885632)
Speedy, massively parallel, modular, login brute-forcer
Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible.
security/obfsproxy-0.2.13 (Score: 0.0034885632)
Pluggable transport proxy
Obfsproxy is a pluggable transport proxy written in Python.