ruby-jsobfu | | Javascript code obfuscator |
ruby-metasploit_payloads-mettle | | Compiled binaries for Metasploit\'s next-gen Meterpreter |
ruby-metasploit-concern | | Automatically include concern modules |
ruby-metasploit-model | | Models shared between metasploit-framework and metasploit_data_models |
ruby-metasploit-payloads | | Compiled binaries for Metasploit\'s Meterpreter |
ruby-nessus_rest | | Ruby library for Nessus JSON/REST interface |
ruby-net-scp | | Secure copy for Ruby |
ruby-net-sftp | | Secure FTP for Ruby |
ruby-net-ssh | | Secure shell for Ruby |
ruby-net-ssh-gateway | | Simple way to connect to servers behind a firewall or NAT |
ruby-net-ssh-multi | | SSH connection multiplexing |
ruby-nexpose | | Rapid7 Nexpose API client library written in Ruby |
ruby-oauth | | OAuth Core Ruby implementation |
ruby-openid | | OpenID support for Ruby |
ruby-openssl-ccm | | Ruby Gem for RFC 3610 - Counter with CBC-MAC (CCM) |
ruby-openvas-omp | | Ruby library for communication with OpenVAS manager |
ruby-password | | Suite of password handling methods for Ruby |
ruby-rack-openid | | Provides a more HTTPish API around the ruby-openid library |
ruby-rbnacl | | Ruby binding to the Networking and Cryptography library |
ruby-rc4 | | Pure Ruby implementation of the RC4 algorithm |
ruby-rex-arch | | Rex Library which contains architecture specific information |
ruby-rex-bin_tools | | Ruby Exploitation Library for binary manipulation |
ruby-rex-core | | Core libraries required for the Ruby Exploitation Suite |
ruby-rex-encoder | | Polymorphic encoders that Metasploit uses for payload encoding |
ruby-rex-exploitation | | Rex library for various exploitation helpers |
ruby-rex-java | | Ruby Exploitation library for parsing Java serialized streams |
ruby-rex-mime | | Rex Library for creating and parsing MIME messages |
ruby-rex-nop | | Rex library for dynamic generation of x86 multi-byte NOPs |
ruby-rex-ole | | Rex Library for reading/writing OLE files and streams |
ruby-rex-powershell | | Ruby Exploitation library for generating Powershell scripts |
ruby-rex-random_identifier | | Ruby Exploitation library for generating random identifiers |
ruby-rex-registry | | Ruby Exploitation library for parsing Windows registry files |
ruby-rex-rop_builder | | Ruby Exploitation Library for building ROP chains |
ruby-rex-socket | | Rex socket abstraction library |
ruby-rex-sslscan | | Rex socket abstraction library |
ruby-rex-struct2 | | Ruby Exploitation library for generating C-style structs |
ruby-rex-text | | Ruby Exploitation methods for text manipulation |
ruby-rex-zip | | Ruby Exploitation library for working with zip files |
ruby-ruby-openid | | Library for consuming and serving OpenID identities |
ruby-rubyntlm | | Message creator and parser for the NTLM authentication |
ruby-shadow | | Access to shadow passwords on Linux and Solaris |
ruby-simple_oauth | | Simple builds and verifies OAuth headers |
ruby-sshkey | | Pure Ruby SSH key generator |
ruby-sshkit | | Makes it easy to write structured, testable SSH commands |
ruby-tcpwrap | | TCP wrappers library for Ruby |
ruby-twitter_oauth | | Ruby client for the Twitter API using OAuth |
sbd | | HMAC & one-time pad-based remote login program |
scanssh | | SSH remote version scanner |
scm-blackbox | | Safely store secrets in Git/Mercurial/Subversion |
scrypt | | Encrypt and decrypt files |
seahorse | | GnuPG front end and bonobo component for GNOME |
seahorse-plugins | | Plugins for the GnuPG front end and bonobo component for GNOME |
seccure | | SECCURE Elliptic Curve Crypto Utility for Reliable Encryption |
secpanel | | GUI front-end for SSH |
sfs | | Secure, global, self-certifying network file system |
sign | | File signing and signature verification utility |
skey | | Port of OpenBSD s/key implementation |
sks | | Self Replicating PGP Key Server |
sleuthkit | | The Sleuth Kit (TSK) opensource forensic toolkit |
smaSHeM | | System V shared memory segment manipulator |
smtpd | | Store and forward SMTP proxy |
sniff | | Program to sniff logins and passwords |
snoopy | | Log every executed command to syslog |
snortsnarf | | Generate HTML report summaries from snort incident alerts |
snow | | Whitespace steganography program |
softhsm | | Cryptographic store accessible through a PKCS#11 interface |
spiped | | Tool for creating symmetrically encrypted and authenticated pipes |
sqlmap | | Automatic SQL injection and database takeover tool |
srm | | Secure replacement for rm(1) |
srp_client | | Client programs using Secure Remote Password protocol |
ssdeep | | Program computing context triggered piecewise hashes (CTPH) |
ssh-askpass | | X11-based passphrase dialog for OpenSSH |
ssh-ip-tunnel | | Simple VPN system using pppd over ssh |
sshfp | | Print ssh host key fingerprint resource records |
sshguard | | Protect networked hosts from brute force attacks |
sshpass | | Non-interactive ssh password auth |
ssldump | | SSLv3/TLS network protocol analyzer |
sslproxy | | Small SSL proxy |
sslsplit | | Transparent and scalable SSL/TLS interception |
sslwrap | | Simple SSL wrapper |
ssss | | Shamir's Secret Sharing Scheme |
starttls | | Simple wrapper program for STARTTLS on emacsen |
steghide | | Hides data (steganography) in audio or graphics files |
stegtunnel | | Provides a covert channel in the IPID and sequence number |
stud | | Scalable TLS Unwrapping Daemon |
stunnel | | Universal SSL tunnel |
sudo | | Allow others to run commands as root |
tacshell | | RSA ACE/Server sdshell workalike, using TACACS+ |
tcl-tls | | TLS (aka SSL) Channel for the Tcl language |
tcp_wrappers | | Monitor and filter incoming requests for network services |
tct | | Programs to aid post-mortem after a break-in |
tkpasman | | Username and password manager that uses the Tk toolkit |
tor-browser | | Tor Browser based on Firefox |
tripwire | | File and directory integrity checker |
TweetNaCl | | World's first auditable high-security cryptographic library |
uvscan | | Evaluation version of a DOS/Windows file virus scanner |
validns | | Validns, a high performance DNS/DNSSEC zone validator |
vault | | Tool for managing secrets |
volatility | | Advanced memory forensics framework |
whisker (V) | | URL scanner used to search for known vulnerable CGIs on websites |