SW Name |
Home page |
Downloaded |
NewPKI |
http://sourceforge.net/[..]jects/newpki/ |
4841x |
NewPKI is a PKI based on the OpenSSL low-level API, all the datas are handled through a database, which provides a much more flexible PKI than with OpenSSL, such as seeking a certificate with a search engine.
|
|
Dropbear |
http://matt.ucc.asn.au/[..]dropbear.html |
4664x |
Dropbear - A small SSH server.
|
|
QNmap |
http://qnmap.sourceforge.net/ |
3964x |
QNmap is just another X nmap frontend. The main difference, as far as I know, is that it can be run as a non-root user with some functionality It will eventually incorporate all of nmap's documented features and will be updated to reflect newer versions.
|
|
KDE Network Mapper |
http://knetmap.sourceforge.net/ |
3847x |
KNetnap is a network discovery, scanning, and probing tool for KDE.
|
|
TrinityOS |
http://www.ecst.csuchico.edu/[..]tml#trinityos |
3816x |
TrinityOS is a step-by-step, example-driven HOWTO on building a very functional Linux box with strong security in mind. TrinityOS is well known for its strong packet firewall ruleset, Chrooted and Split DNS (v9 and v8), secured Sendmail (8.x), Linux PPTP, Serial consoles and Reverse TELNET, DHCPd, SSHd, UPSes, system performance tuning, the automated TrinityOS-Security implementation scripts, and much more.
|
|
srm |
http://srm.sourceforge.net/ |
3695x |
Srm (secure rm) is a command-line compatible rm(1) which destroys file contents before unlinking.
|
|
Cyan Secure Web |
http://www.cyan-networks.com/ |
3506x |
Cyan Secure Web Proxy Server is a carrier grade, high performance filtering proxy server for Linux. It includes scalable (user/group/host) Web filter and virus scan utilities for blocking malicious applications at the gateway. It has an advanced URL database, authentication support (LDAP and Active Directory), easy deployment, and remote administration.
|
|
GEXEC |
http://www.theether.org/gexec/ |
3486x |
GEXEC is a scalable cluster remote execution system which provides fast, RSA authenticated remote execution of parallel and distributed jobs
|
|
conspy |
http://adsl-brisbane.lubemobile.com.au/ras/conspy/ |
3391x |
Conspy allows a (possibly remote) user to see what is displayed on a Linux virtual console, and send keystrokes to it.
|
|
Throughput |
http://home.uninet.ee/[..]hput_monitor/ |
3274x |
Throughput monitor is a log analyzer. In general notation it is a event counter per timeframe - in short frquency monitor. If it detects too high event rate, utility notifies about it. If rate drops below predefined value, also notify with statistics gathered meanwhile. It can analyze past logs or realtime logs. Events are distinguished per observation object.
|
|
xca |
http://www.hohnstaedt.de/xca.html |
3263x |
This application is a graphical user interface to OpenSSL, RSA public keys, certificates, signing requests and revokation lists.
|
|
Lando |
http://www.moonglade.com/lando/ |
3261x |
Lando is a command execution system for UNIX. It allows you to create a set of commands which may be executed from another machine on your LAN without actually having to log in via a telnet session. The output of the command (if any) is returned to the client for display in a window.
|
|
Demarc PureSecure |
http://demarc.com/products/ |
3253x |
Demarc PureSecure is a Total Intrusion Detection System (TIDS) that combines all major aspects of network security into one powerful security suite.
|
|
Geheimnis |
http://geheimnis.sourceforge.net/ |
3182x |
Geheimnis is no longer maintained (use of kpgp is now recommended). Geheimnis was an application for UNIX/KDE that "wraped" around encryption programs and their irksome command-line interface, making it easier for users to use these programs.
|
|
grsecurity 2.0.1 |
http://www.grsecurity.org |
3173x |
Grsecurity is an innovative approach to security utilizing a multi-layered detection, prevention, and containment model. It is licensed under the GPL.
# It offers among many other features: An intelligent and robust Role-Based Access Control (RBAC) system that can generate least privilege policies for your entire system with no configuration
# Change root (chroot) hardening
# /tmp race prevention
# Extensive auditing
# Prevention of entire classes of exploits related to address space bugs (from the PaX project)
# Additional randomness in the TCP/IP stack
# A restriction that allows a user to only view his/her processes
# Every security alert or audit contains the IP address of the person that caused the event
|
|