SW Name |
Home page |
Downloaded |
Secure back door |
http://sbd.sourceforge.net/ |
1505x |
Secure Back Door (SBD) is a tool that provides ultra-secure and minimal access to a computer, which allows you to run a single command based on a one time key.
|
|
ElyCA |
http://elyca.eurodev.net/ |
1503x |
ElyCA yet another CA written in python which uses MySQL to storage a database of all certicates issued by the CA.
|
|
eics |
http://eics.sourceforge.net/ |
1501x |
EICS (Easy Integrity Check System) is the fast and easy to use utility for controlling filesystem integrity.
|
|
KWoodhammer |
http://kwoodhammer.sourceforge.net/ |
1500x |
KWoodhammer is the all-in-one solution for traditional encryption methods as you know from Enigma, the Pope or the Russian Secret Service (KGB).
|
|
Sentinel |
http://zurk.sourceforge.net/zfile.html |
1498x |
Sentinel is a fast file scanner similar to Tripwire or Viper with built in authentication using the RIPEMD 160 bit MAC hashing function. It uses a single database similar to Tripwire, maintains file integrity using the RIPEMD algorithm and also produces secure, signed logfiles.
|
|
ProSum |
http://prosum.sourceforge.net/ |
1498x |
ProSum is a terminal based program that protects your files, sys_call_table and IDT like tripwire way (All in user space, without kernel modules) In addition, database with files etc. could be encrypted with Blowfish algorythm and more.
|
|
Invisible IRC Project |
http://www.invisiblenet.net/ |
1496x |
IIP (Invisible IRC Project) is Internet Relay Chat privacy software designed for anonymity and security. It acts as an advanced proxy between your IRC client and servers by utilizing an encrypted mixnet with fake traffic and 3- layered (user, relay, and broadcast) protection.
|
|
KRad |
http://ss7.ca/krad/ |
1494x |
The K Rapid Acoustic Dialer is a flexible tonedialer for KDE 2.0.
|
|
pixiliate |
http://winfingerprint.sourceforge.net/pixilate.php |
1488x |
Pixilate is a commandline packet generation utility that reads Cisco PIX 6.2x or Cisco IOS ACLs as input and generates the appropriate packets.
|
|
Yavipind |
http://yavipin.sourceforge.net/ |
1484x |
Yavipind is a secure tunnel aka 2 peers securely forwarding packets toward each other.
|
|
sud |
http://sud.sourceforge.net/ |
1480x |
sud (superuser daemon) permits a user to switch to root privileges and to use a suid program in a nosuid environment.
|
|
AESCrypt |
http://aescrypt.sourceforge.net/ |
1479x |
Small stream encryption program for Unix
|
|
psad |
http://www.cipherdyne.com/psad/ |
1478x |
Psad is a collection of three lightweight system daemons (two main daemons and one helper daemon) that run on Linux machines and analyze iptables log messages to detect port scans and other suspicious traffic.
|
|
File system investigator |
http://www.rossi.com/[..]ls/intro.html |
1477x |
File system investigator is a forensic tool for viewing filesystems. It is written entirely in Java, so it is platform independent. It allowsviewing of ReiserFS and EXT2/3.
|
|
rsyncrypto |
http://sourceforge.net/[..]ts/rsyncrypto |
1476x |
Rsyncrypto allows you to encrypt a file or a directory structure such that they can later be synchronized to another machine using rsync.
|
|