Contact us Category listing - security (List all)
((V)irtual = Package is only listed here)
Previous | Query returned 601 packages, results 501 to 600 | Next

ruby-net-sftp Secure FTP for Ruby
ruby-net-ssh Secure shell for Ruby
ruby-net-ssh-gateway Simple way to connect to servers behind a firewall or NAT
ruby-net-ssh-multi SSH connection multiplexing
ruby-nexpose Rapid7 Nexpose API client library written in Ruby
ruby-oauth OAuth Core Ruby implementation
ruby-openid OpenID support for Ruby
ruby-openssl-ccm Ruby Gem for RFC 3610 - Counter with CBC-MAC (CCM)
ruby-openvas-omp Ruby library for communication with OpenVAS manager
ruby-password Suite of password handling methods for Ruby
ruby-rack-openid Provides a more HTTPish API around the ruby-openid library
ruby-rbnacl Ruby binding to the Networking and Cryptography library
ruby-rc4 Pure Ruby implementation of the RC4 algorithm
ruby-rex-arch Rex Library which contains architecture specific information
ruby-rex-bin_tools Ruby Exploitation Library for binary manipulation
ruby-rex-core Core libraries required for the Ruby Exploitation Suite
ruby-rex-encoder Polymorphic encoders that Metasploit uses for payload encoding
ruby-rex-exploitation Rex library for various exploitation helpers
ruby-rex-java Ruby Exploitation library for parsing Java serialized streams
ruby-rex-mime Rex Library for creating and parsing MIME messages
ruby-rex-nop Rex library for dynamic generation of x86 multi-byte NOPs
ruby-rex-ole Rex Library for reading/writing OLE files and streams
ruby-rex-powershell Ruby Exploitation library for generating Powershell scripts
ruby-rex-random_identifier Ruby Exploitation library for generating random identifiers
ruby-rex-registry Ruby Exploitation library for parsing Windows registry files
ruby-rex-rop_builder Ruby Exploitation Library for building ROP chains
ruby-rex-socket Rex socket abstraction library
ruby-rex-sslscan Rex socket abstraction library
ruby-rex-struct2 Ruby Exploitation library for generating C-style structs
ruby-rex-text Ruby Exploitation methods for text manipulation
ruby-rex-zip Ruby Exploitation library for working with zip files
ruby-ruby-openid Library for consuming and serving OpenID identities
ruby-rubyntlm Message creator and parser for the NTLM authentication
ruby-shadow Access to shadow passwords on Linux and Solaris
ruby-simple_oauth Simple builds and verifies OAuth headers
ruby-sshkey Pure Ruby SSH key generator
ruby-sshkit Makes it easy to write structured, testable SSH commands
ruby-tcpwrap TCP wrappers library for Ruby
ruby-twitter_oauth Ruby client for the Twitter API using OAuth
sbd HMAC & one-time pad-based remote login program
scanssh SSH remote version scanner
scrypt Encrypt and decrypt files
seahorse GnuPG front end and bonobo component for GNOME
seahorse-plugins Plugins for the GnuPG front end and bonobo component for GNOME
seccure SECCURE Elliptic Curve Crypto Utility for Reliable Encryption
secpanel GUI front-end for SSH
sfs Secure, global, self-certifying network file system
sign File signing and signature verification utility
skey Port of OpenBSD s/key implementation
sks Self Replicating PGP Key Server
sleuthkit The Sleuth Kit (TSK) opensource forensic toolkit
smaSHeM System V shared memory segment manipulator
smtpd Store and forward SMTP proxy
sniff Program to sniff logins and passwords
snoopy Log every executed command to syslog
snortsnarf Generate HTML report summaries from snort incident alerts
snow Whitespace steganography program
softhsm Cryptographic store accessible through a PKCS#11 interface
spiped Tool for creating symmetrically encrypted and authenticated pipes
sqlmap Automatic SQL injection and database takeover tool
srm Secure replacement for rm(1)
srp_client Client programs using Secure Remote Password protocol
ssdeep Program computing context triggered piecewise hashes (CTPH)
ssh-askpass X11-based passphrase dialog for OpenSSH
ssh-ip-tunnel Simple VPN system using pppd over ssh
sshfp Print ssh host key fingerprint resource records
sshguard Protect networked hosts from brute force attacks
sshpass Non-interactive ssh password auth
ssldump SSLv3/TLS network protocol analyzer
sslproxy Small SSL proxy
sslsplit Transparent and scalable SSL/TLS interception
sslwrap Simple SSL wrapper
ssss Shamir's Secret Sharing Scheme
starttls Simple wrapper program for STARTTLS on emacsen
steghide Hides data (steganography) in audio or graphics files
stegtunnel Provides a covert channel in the IPID and sequence number
stud Scalable TLS Unwrapping Daemon
stunnel Universal SSL tunnel
sudo Allow others to run commands as root
tacshell RSA ACE/Server sdshell workalike, using TACACS+
tcl-tls TLS (aka SSL) Channel for the Tcl language
tcp_wrappers Monitor and filter incoming requests for network services
tct Programs to aid post-mortem after a break-in
tkpasman Username and password manager that uses the Tk toolkit
tor-browser Tor Browser based on Firefox
tripwire File and directory integrity checker
TweetNaCl World's first auditable high-security cryptographic library
uvscan Evaluation version of a DOS/Windows file virus scanner
validns Validns, a high performance DNS/DNSSEC zone validator
vault Tool for managing secrets
volatility Advanced memory forensics framework
whisker (V) URL scanner used to search for known vulnerable CGIs on websites
xml-security-c XML Digital Signature specification implementation
xmlsec1 XML signature and encryption library
yafic File integrity checker
yara Pattern matching swiss knife for malware researchers
ykclient Libraries for online validation of Yubikey OTPs
ykpers Yubico's YubiKey re-programming toolkit
zebedee Simple tunneling program for TCP or UDP with encryption
zkt DNSSEC Zone Key Tool