|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIRST <<< | PREV < | Showing items 106 to 120 | > NEXT | >>> LAST |
| SW Name | Home page | Downloaded |
|---|---|---|
| HTun | http://htun.runslinux.net/ | 2272x |
| HTun is a tool to allow you to create a fully bidirectional IP VPN over an HTTP proxy or just over port 80, allowing you to bypass restrictive firewalls and use any service you desire. HTun creates an point-to-point virtual IP network over HTTP by encapsulating IP traffic into valid HTTP requests. The HTun server runs on a host with an unrestricted Internet connection. It listens on a common webserver port (80 or 443) and accepts HTun client connections. The HTun client daemon runs from within a restrictive network environment, communicating with the HTun server over an HTTP proxy. | ||
|
|
AESCrypt | http://aescrypt.sourceforge.net/ | 2270x |
| Small stream encryption program for Unix | ||
|
|
Bash Port Knocking | http://www.phantomcode.com/[..]portknocking/ | 2269x |
| Bash Port Knocking is a set of scripts that use standard Linux tools to acheive a port knocking system. A Web page is used to open ports, and an email is sent each time the port knocking sequence is successfully achieved. | ||
|
|
Lutz | http://www.codewear.org/[..]s.php?id=lutz | 2268x |
| Lutz is a fast and small port scanner, similar to nmap. It has the most popular scanning options (SYN, FIN, XMAS Scan, PROTO Scan, etc.) and simple OS detection. | ||
|
|
Yin Yang | http://yinyang.sourceforge.net/ | 2260x |
| Yin Yang is a real-time Linux file scanner that is activated whenever a file is accessed. When a file opening system call is detected, it will send the full pathname of the file to a network daemon. The network daemon will then pass the pathname of the file to a file scanner, such as an anti-virus scanner, and return the status. | ||
|
|
Impost | http://impost.sourceforge.net/ | 2259x |
| Impost is a network security auditing tool designed to analyze the forensics behind compromised and/or vulnerable daemons. There are two different kinds of operating modes; it can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients, or it can operate as a packet sniffer and monitor incoming data to specified destination port. | ||
|
|
Secure back door | http://sbd.sourceforge.net/ | 2259x |
| Secure Back Door (SBD) is a tool that provides ultra-secure and minimal access to a computer, which allows you to run a single command based on a one time key. | ||
|
|
Stunnel | http://www.stunnel.org/ | 2251x |
| Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. | ||
|
|
md5mon | http://www.geocities.com/[..]1/md5mon.html | 2251x |
| It checks that certain system files have not been modified and it uses "md5sum" to compute checksums of files, reporting any differences from previously recorded checksums. Optionally, a somewhat more secure, but slower, "shasum" can be used instead of "md5sum". | ||
|
|
KWoodhammer | http://kwoodhammer.sourceforge.net/ | 2249x |
| KWoodhammer is the all-in-one solution for traditional encryption methods as you know from Enigma, the Pope or the Russian Secret Service (KGB). | ||
|
|
Panoptis | http://sourceforge.net/[..]ects/panoptis | 2243x |
| Panoptis plans to create a network security tool (N-IDS) to detect and block DoS and DDoS attacks. The programming language is C++, and the input is being provided by routers. | ||
|
|
yersinia | http://yersinia.sourceforge.net/ | 2242x |
| Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. | ||
|
|
GNU Privacy Assistant | http://www.gnupg.org/[..]software/gpa/ | 2240x |
| The GNU Privacy Assistant (GPA) is a graphical user interface for the GnuPG (GNU Privacy Guard). | ||
|
|
fEncH | http://serbianc.sourceforge.net/[..]rojects/fEncH | 2238x |
| This is a fast and simple, yet hard to crack encryption program. It uses XOR encryption with variable key, based on the password that user inputs to the program, it rumbles bits in the bytes, etc. | ||
|
|
Ciphire Mail | http://www.ciphire.com/ | 2232x |
| Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. | ||
|
|
||
| FIRST <<< | PREV < | Showing items 106 to 120 | > NEXT | >>> LAST |
| 1. |
Pacman linux Download: 5879x |
| 2. |
FreeBSD Download: 10100x |
| 3. |
PCLinuxOS-2010 Download: 9582x |
| 4. |
alcolix Download: 12199x |
| 5. |
Onebase Linux Download: 10952x |
| 6. |
Novell Linux Desktop Download: 0x |
| 7. |
KateOS Download: 7325x |
| 1. |
xinetd Download: 3538x |
| 2. |
RDGS Download: 937x |
| 3. |
spkg Download: 6579x |
| 4. |
LinPacker Download: 11814x |
| 5. |
VFU File Manager Download: 4028x |
| 6. |
LeftHand Mała Księgowość Download: 8402x |
| 7. |
MISU pyFotoResize Download: 3757x |
| 8. |
Lefthand CRM Download: 4571x |
| 9. |
MetadataExtractor Download: 0x |
| 10. |
RCP100 Download: 4132x |
| 11. |
Predaj softveru Download: 0x |
| 12. |
MSH Free Autoresponder Download: 0x |
linuxsoft.cz
| Design: www.megadesign.cz