SW Name |
Home page |
Downloaded |
scanlogd |
http://www.openwall.com/scanlogd/ |
1507x |
scanlogd is a system daemon which attempts to log all portscans of a host to the syslog, in a secure fashion.
|
|
pam_eps |
http://pameps.sourceforge.net/ |
1505x |
pam_eps is a PAM module that allows you to authenticate users against a remote server with a ssh daemon enabled. If the user exists in local machine, he is allowed entry. But if the user doesn't exist (yet exists in the remote machine and the password supplied is correct), a new user with that pass and logname will be created.
|
|
chkrootkit |
http://www.chkrootkit.org/ |
1491x |
chkrootkit is a tool to locally check for signs of a rootkit. It contains a chkrootkit: shell script that checks system binaries for rootkit modification. The following tests are made: aliens, asp, bindshell, lkm, rexedcs, sniffer, wted, z2, amd, basename, biff, chfn, chsh, cron, date, du, dirname, echo, egrep, env, find, fingerd, gpm, grep, hdparm, su, ifconfig, inetd, inetdconf, identd, killall, login, ls, mail, mingetty, netstat, named, passwd, pidof, pop2, pop3, ps, pstree, rpcinfo, rlogind, rshd, slogin, sendmail, sshd, syslogd, tar, tcpd, top, telnetd, timed, traceroute, and write.
|
|
blaim |
http://www.im-passe.com/phar/ |
1489x |
Strong crypto (2048bit diffie-hellman & 448bit blowfish..take that subspace) for gaim.
|
|
Makejail |
http://www.floc.net/makejail/ |
1484x |
Makejail employs short configuration files to help administrators create and maintain chroot jails.
|
|
ip-masq-log |
http://www.cli.di.unipi.it/[..]zunino/linux/ |
1477x |
This patch can be used on a masquerading firewall (NAT) to keep a log of all the outgoing masqueraded TCP connections.
|
|
trapdoor2 |
http://oss.linbit.com/trapdoor2/ |
1475x |
Trapdoor2 (td2) allows remote users to execute local commands by sending 'magic cookies'. this can e.g. be used to alter local firewalling rules so people can connect to local services after sending the magick cookie.
|
|
TkPGP |
http://packages.debian.org/[..]le/misc/tkpgp |
1470x |
TkPGP intends to completely eliminate need to access command- line interface of PGP for UNIX. Currently most of casual activity such as signing, encrypting and decrypting is done in GUI. Key management remains a domain of command line for the time being.
|
|
Shishi |
http://www.gnu.org/[..]tware/shishi/ |
1470x |
Shishi, a free implementation of the Kerberos 5 network security system.
|
|
GnuPG.pm |
http://indev.insu.com/GnuPG/ |
1462x |
The GnuPG perl module interfaces with the Gnu Privacy Guard using the coprocess hooks provided by gpg.
|
|
Medusa DS9 |
http://medusa.terminus.sk/ |
1457x |
Medusa DS9 is used to increase Linux's security. It consists of two major parts, Linux kernel changes and the user-space daemon.
|
|
rccrypt |
http://www.ricksoft.co.uk/[..]t/rccrypt.htm |
1449x |
RC-Crypt keeps your data safe. It is an easy to use command line program that encrypts your data.
|
|
pyCA |
http://www.pyca.de/ |
1447x |
pyCA tries to make it easier for people to set up and run a organizational certificate authority which fulfills the need for a fairly secure certification processing.
|
|
DNS Flood Detector |
http://www.adotout.com/ |
1442x |
DNS Flood Detector was developed to detect abusive usage levels on high traffic nameservers and to enable quick response in halting (among other things) the use of one's nameserver to facilitate spam.
|
|
KPGPCrypt |
http://members.tripod.com/[..]ssi/index.htm |
1434x |
Key Managment for PGP 5.xx, PGP 6.xx and GPG 1.xx. Supports Add, Delete, Sign, Revoke, Disable Enable keys in graphical environment
|
|