Ports Search

Results 3,7513,760 of 5,161 for /ports-mgmt/.(0.003 seconds)
security/fakebo-0.4.2.1 (Score: 0.006224396)
Fake BackOrifice client emulator
FakeBO emulates a BackOrifice client (a trojan which can be used to covertly monitor and alter Windows machines remotely), and can log attempted commands and packets, as well as providing configurable responses. Useful for catching script kiddies trying to find a hackable Windows box, for providing evidence to their sysadmin, etc.
security/fiked-0.0.5 (Score: 0.006224396)
Fake IKE PSK+XAUTH daemon based on VPNC
This is a fake IKE daemon supporting just enough of the standards and Cisco extensions to attack commonly found insecure Cisco PSK+XAUTH VPN setups. If you know the pre-shared key, also known as shared secret or group password, you can impersonate the VPN gateway in IKE phase 1, and learn XAUTH user credentials in phase 2.
security/chroot_safe-1.4 (Score: 0.006224396)
Tool to chroot softwares easily
chroot_safe, a tool to chroot any application in a sane manner without requring binaries, shared libraries etc within the chroot or any support from the application. Works with any dynamically linked application.
security/fl0p-0.0.2.b (Score: 0.006224396)
Passive L7 flow fingerprinting tool
The tool is a simple flow-analyzing passive L7 fingerprinter. It examines the sequence of client-server exchanges, their relative layer 7 payload sizes, and transmission intervals (as opposed to inspecting the contents, which is what most passive fingerprinters and "smart" sniffers would do to analyze transmissions). This is then matched against a database of traffic pattern signatures to infer some interesting facts about the traffic.
security/fragroute-1.2 (Score: 0.006224396)
Tool for intercepting, modifying, and rewriting egress traffic
"Fragroute intercepts, modifies, and rewrites egress traffic destined for a specified host, implementing most of the attacks described in the Secure Networks "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection" paper of January 1998. It features a simple ruleset language to delay, duplicate, drop, fragment, overlap, print, reorder, segment, source-route, or otherwise monkey with all outbound packets destined for a target host, with minimal support for randomized or probabilistic behaviour. This tool was written in good faith to aid in the testing of network intrusion detection systems, firewalls, and basic TCP/IP stack behaviour. Please do not abuse this software."
security/fswatch-0.02.b5 (Score: 0.006224396)
File system checksum checker
fswatch: - is a utility to guard changes in a file system. - is composed of three simple programs: fswbuild, fswcmp, fswshow. fswbuild builds a file system information database. fswcmp compares two database files and returns what changes a in file system have been introduced. fswshow shows contents of database file. a file information database is platform independent. - can collect the following information about files (and directories): inode, links, uid, gid, mode, size, flags, ctime, checksum (sha1) ; and can show which files were added, deleted or changed. - is one of many similar utilities. the main difference is the configuration. you can define different settings for every directory in a directory tree. moreover, it is very small and fast.
security/fuzzdb-1.09 (Score: 0.006224396)
Comprehensive set of fuzzing patterns
Fuzzdb is a comprehensive set of fuzzing patterns that can be used during discovery or security testing of web applications.
security/fwipe-0.36 (Score: 0.006224396)
djb-style file wiping utility
Fwipe is a secure file erasing program. fwipe0, which actually erases your files, is immune to filenames containing spaces, carriage returns, dashes, or any other special characters. You can use it in place of rm in cron jobs, together with "find ... -print0". The output of fwipe0 is specially designed to be parsed easily by machine, so it can be embedded in other applications which need secure file erasure.
security/gcipher-1.1 (Score: 0.006224396)
Simple encryption tool
This is a simple encryption tool to work with home-grown encryption algorithms. It can run as either a GUI, a command-line application, or a network proxy.
security/gnome-keyring-sharp-1.0.2 (Score: 0.006224396)
Fully managed implementation of gnome-keyring
gnome-keyring-sharp is a fully managed implementation of libgnome-keyring. When the gnome-keyring-daemon is running, you can use this to retrieve/store confidential information such as passwords, notes or network services user information.