|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIRST <<< | PREV < | Showing items 346 to 360 | > NEXT | >>> LAST |
| SW Name | Home page | Downloaded |
|---|---|---|
| Stunnel | http://www.stunnel.org/ | 2084x |
| Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. | ||
|
|
Impost | http://impost.sourceforge.net/ | 2081x |
| Impost is a network security auditing tool designed to analyze the forensics behind compromised and/or vulnerable daemons. There are two different kinds of operating modes; it can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients, or it can operate as a packet sniffer and monitor incoming data to specified destination port. | ||
|
|
KWoodhammer | http://kwoodhammer.sourceforge.net/ | 2080x |
| KWoodhammer is the all-in-one solution for traditional encryption methods as you know from Enigma, the Pope or the Russian Secret Service (KGB). | ||
|
|
yersinia | http://yersinia.sourceforge.net/ | 2076x |
| Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. | ||
|
|
Secure back door | http://sbd.sourceforge.net/ | 2076x |
| Secure Back Door (SBD) is a tool that provides ultra-secure and minimal access to a computer, which allows you to run a single command based on a one time key. | ||
|
|
HTun | http://htun.runslinux.net/ | 2075x |
| HTun is a tool to allow you to create a fully bidirectional IP VPN over an HTTP proxy or just over port 80, allowing you to bypass restrictive firewalls and use any service you desire. HTun creates an point-to-point virtual IP network over HTTP by encapsulating IP traffic into valid HTTP requests. The HTun server runs on a host with an unrestricted Internet connection. It listens on a common webserver port (80 or 443) and accepts HTun client connections. The HTun client daemon runs from within a restrictive network environment, communicating with the HTun server over an HTTP proxy. | ||
|
|
SINUS Firewall | http://www.ifi.unizh.ch/[..]NUS/firewall/ | 2074x |
| One of the goals in the SINUS project is to assess the potential of security without obscurity. The SINUS Firewall is a TCP/IP packet filter for the Linux operating system. | ||
|
|
Yin Yang | http://yinyang.sourceforge.net/ | 2074x |
| Yin Yang is a real-time Linux file scanner that is activated whenever a file is accessed. When a file opening system call is detected, it will send the full pathname of the file to a network daemon. The network daemon will then pass the pathname of the file to a file scanner, such as an anti-virus scanner, and return the status. | ||
|
|
Network Security Analysis Tool | http://nsat.sourceforge.net/ | 2069x |
| nsat is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine, and much more. | ||
|
|
cryptoswap | http://www.flyn.org/[..]ap/index.html | 2068x |
| The cryptoswap package supports building an encrypted swap partition when a system boots. This may be necessary on systems that use encrypted filesystems because plaintext secrets may be written to disk when memory is swapped to disk. | ||
|
|
Fire-Waller | http://www.saunalahti.fi/[..]/fire-waller/ | 2066x |
| Fire-Waller reads your syslog against packet filter rows and creates HTML output of the found rows. | ||
|
|
GNU Privacy Assistant | http://www.gnupg.org/[..]software/gpa/ | 2066x |
| The GNU Privacy Assistant (GPA) is a graphical user interface for the GnuPG (GNU Privacy Guard). | ||
|
|
Firepass | http://gray-world.net/[..]irepass.shtml | 2064x |
| Firepass is a tunneling tool allowing users bypass firewall restrictions and encapsulate data flows inside legal ones that use HTTP POST requests. TCP or UDP based protocols may be tunneled with Firepass. | ||
|
|
Wolverine Firewall | http://webworxmedia.com/Wolverine/ | 2061x |
| Wolverine Firewall, for the easy configuration of IPTables. | ||
|
|
pixiliate | http://winfingerprint.sourceforge.net/pixilate.php | 2060x |
| Pixilate is a commandline packet generation utility that reads Cisco PIX 6.2x or Cisco IOS ACLs as input and generates the appropriate packets. | ||
|
|
||
| FIRST <<< | PREV < | Showing items 346 to 360 | > NEXT | >>> LAST |
| 1. |
Pacman linux Download: 5591x |
| 2. |
FreeBSD Download: 9817x |
| 3. |
PCLinuxOS-2010 Download: 9308x |
| 4. |
alcolix Download: 11791x |
| 5. |
Onebase Linux Download: 10477x |
| 6. |
Novell Linux Desktop Download: 0x |
| 7. |
KateOS Download: 6967x |
| 1. |
xinetd Download: 3085x |
| 2. |
RDGS Download: 937x |
| 3. |
spkg Download: 6034x |
| 4. |
LinPacker Download: 11248x |
| 5. |
VFU File Manager Download: 3801x |
| 6. |
LeftHand Mała Księgowość Download: 8053x |
| 7. |
MISU pyFotoResize Download: 3511x |
| 8. |
Lefthand CRM Download: 4306x |
| 9. |
MetadataExtractor Download: 0x |
| 10. |
RCP100 Download: 3817x |
| 11. |
Predaj softveru Download: 0x |
| 12. |
MSH Free Autoresponder Download: 0x |
linuxsoft.cz
| Design: www.megadesign.cz