|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| FIRST <<< | PREV < | Showing items 451 to 465 | > NEXT | >>> LAST |
| SW Name | Home page | Downloaded |
|---|---|---|
| Keychain | http://www.gentoo.org/[..]ain/index.xml | 2015x |
| The keychain script makes handling RSA and DSA keys both convenient and secure. | ||
|
|
THC-Rut | http://www.thc.org | 2015x |
| THC-RUT (aRe yoU There, pronouced as root) is your first knife on foreign network. It gathers informations from local and remote networks. It offers a wide range of network discovery tools: arp lookup on an IP range, spoofed DHCP request, RARP, BOOTP, ICMP-ping, ICMP address mask request, OS fingerprintings, high-speed host discovery, ... The tool is capable of discovering a Class B network within 10 minutes. | ||
|
|
THC-WarDrive | http://www.thc.org | 2014x |
| The major focus of THC is to investigate and analyze common security solutions and propose concepts for circumventing security mechanisms. | ||
|
|
TEA Total | http://www.linuxhacker.org/tea-total/ | 2013x |
| TEA Total is a very small 128 bit private key based encryption/decryption system which uses the block variant of TEA (Tiny Encryption Algorithm) | ||
|
|
fcatalog | http://fcatalog.lupine.org/ | 2013x |
| fcatalog is a program for identifying the origins of files. Though its operation is similar to the operation of file-checksum-checking security utilities (like tripwire), its purpose and methodology is different. | ||
|
|
PGP | http://www.pgpi.org/ | 2013x |
| Tool for secure datas - mainly e-mail communication. Basic version free. | ||
|
|
Strobe | http://fr3dy.meanmachine.ch/strobe.html | 2010x |
| Strobe is a fast TCP Port Scanner. | ||
|
|
authd_ | http://69.56.132.179/~ury/ | 2004x |
| authd_ is an auth daemon for Linux. It operates without using the SUID bit on executables, and it supports the PAM and NSS interfaces, /etc/passwd, /etc/shadow, and MySQL for storing user information. | ||
|
|
CODEX | http://www.umiacs.umd.edu/[..]mmarsh/CODEX/ | 2004x |
| CODEX is designed for applications with a moderate number of clients (tens or hundreds) requesting keys that change often but not continuously (on the scale of minutes to hours). | ||
|
|
THC-Probe | http://www.thc.org | 2003x |
| The ultimate host scanner compilation for Linux, featuring nmap, snmpscan, netbios auditing tool and super-cool vh shell script. | ||
|
|
Tunnel Vision | http://open.nit.ca/[..]=TunnelVision | 2002x |
| TunnelVision creates an encrypted VirtualPrivateNetwork, or VPN, between two Tunnel Vision-capable sites on the Internet. | ||
|
|
THC-Vmap | http://www.thc.org | 2001x |
| Vmap stands for version mapper. It allows you to find out the version of a daemon by fingerprinting the features and replys of bogus commands. It's a great addition to the other *map tools. | ||
|
|
Horatio: Authenticated Network Access | http://www.cs.utexas.edu/[..]ware/horatio/ | 2001x |
| The Horatio system is a firewall authentication tool. The premise: legitimate users want to attach laptops and other mobile hosts to the network, but security demands that illegitimate users be prevented from accessing the internal, secure network and from abusing the general Internet. The approach taken by Horatio is to provide a separate, untrusted network that only connects to the internal network (and thus to the Internet) through a firewall that by default does not pass any traffic. The user must point a Web browser at the Horatio web server, which runs on the firewall machine, and provide a username and password. | ||
|
|
NuFW | http://www.nufw.org/[..].php3?lang=en | 2001x |
| NuFW is an enterprise grade firewall that performs an authentication of every single connection passing through the IP filter, by transparently requesting user’s credentials before any filtering decision is taken. | ||
|
|
THC-Grenzgaenger | http://www.thc.org | 1998x |
|
|
||
| FIRST <<< | PREV < | Showing items 451 to 465 | > NEXT | >>> LAST |
| 1. |
Pacman linux Download: 5893x |
| 2. |
FreeBSD Download: 10112x |
| 3. |
PCLinuxOS-2010 Download: 9594x |
| 4. |
alcolix Download: 12220x |
| 5. |
Onebase Linux Download: 10978x |
| 6. |
Novell Linux Desktop Download: 0x |
| 7. |
KateOS Download: 7337x |
| 1. |
xinetd Download: 3555x |
| 2. |
RDGS Download: 937x |
| 3. |
spkg Download: 6609x |
| 4. |
LinPacker Download: 11836x |
| 5. |
VFU File Manager Download: 4041x |
| 6. |
LeftHand Mała Księgowość Download: 8415x |
| 7. |
MISU pyFotoResize Download: 3766x |
| 8. |
Lefthand CRM Download: 4581x |
| 9. |
MetadataExtractor Download: 0x |
| 10. |
RCP100 Download: 4142x |
| 11. |
Predaj softveru Download: 0x |
| 12. |
MSH Free Autoresponder Download: 0x |
linuxsoft.cz
| Design: www.megadesign.cz