Crypt::LE provides the functionality necessary to use Let's Encrypt
API and generate free SSL certificates for your domains. It can
also be used to generate RSA keys and Certificate Signing Requests
or to revoke previously issued certificates. Crypt::LE is shipped
with a self-sufficient client for obtaining SSL certificates -
le.pl.
The client supports 'http' and 'dns' domain verification out of the box.
mac-robber is a Forensics & Incident Response tool used to collect
the Modified, Access, and Change (MAC) times from allocated files.
It recursively reads MAC times of files and directories and prints
them in 'time machine' format to STDOUT. This format is the same
that the mactime tool from The Coroners Toolkit (TCT) reads.
mac-robber is based on the grave-robber tool from The Coroners
Toolkit (TCT) when using the '-m' flag, except it does not require
Perl!
NaCl (pronounced "salt") is a new easy-to-use high-speed software
library for network communication, encryption, decryption, signatures,
etc. NaCl's goal is to provide all of the core operations needed to
build higher-level cryptographic tools.
Of course, other libraries already exist for these core operations.
NaCl advances the state of the art by improving security, by improving
usability, and by improving speed.
OpenSC provides a set of libraries and utilities to
access smart cards. Its main focus is on cards that
support cryptographic operations, and facilitate their
use in security applications such as mail encryption,
authentication, and digital signature.
OpenSC implements the PKCS#11 API so applications
supporting this API such as Mozilla Firefox and
Thunderbird can use it.
OpenSC implements the PKCS#15 standard and aims to be
compatible with every software that does so, too.
from the README:
OutGuess is a universal steganographic tool that allows the insertion
of hidden information into the redundant bits of data sources. The
nature of the data source is irrelevant to the core of OutGuess. The
program relies on data specific handlers that will extract redundant
bits and write them back after modification. In this version the PNM
and JPEG image formats are supported.
The histogram utility is not installed by this port/package because
it crashes.
Decrypt the output from the yubikey token
The hardware can be found at
http://www.yubico.com/home/index/
The decryption module does only one thing - decrypt the AES encrypted
OTP from the Yubikey. To this, it requires the OTP, and the AES
key.
Please note - this module does not perform authentication - it is
a required component to decrypt the token first before authentication
can be performed.
A small command line utility for parsing PKCS#10 certificate signing
requests to perl data structure and provides accessor methods to
supported elements.
It is based on the generic ASN.1 module by Graham Barr and on the
x509decode example by Norbert Klasen. It is also based upon the
works of Duncan Segrests Crypt-X509-CRL module. The module parses
common fields and extensions. Some fields might be missing.
Authforce is an HTTP authentication brute forcer. Using various methods,
it attempts brute force username and password pairs for a site. It has
the ability to try common username and passwords, username derivations,
and common username/password pairs. It is used to both test the security
of your site and to prove the insecurity of HTTP authentication based on
the fact that users just don't pick good passwords.
Cisco-torch is a mass Cisco Vulnerability Scanner.
The main feature that makes Cisco-torch different from similar
tools is the extensive use of forking to launch multiple scanning
processes on the background for maximum scanning efficiency. Also,
it uses several methods of application layer fingerprinting simultaneously,
if needed. We wanted something fast to discover remote Cisco hosts running
Telnet, SSH, Web, NTP and SNMP services and launch dictionary attacks
against the services discovered.
Digest::Pearson is an implementation of Peter K. Pearson's hash algorithm
presented in "Fast Hashing of Variable Length Text Strings" - ACM 1990. This
hashing technique yields good distribution of hashed results for variable
length input strings on the range 0-255, and thus, it is well suited for
data load balancing.
The implementation is in C, so it is fast. If you prefer a pure Perl version
and can tolerate slower speed, you might want to consider
Digest::Pearson::PurePerl instead.