Brute
TCP Knocking provides a port knocking implementation. Often a secure system needs a port open so that only authorized persons can access a particular service and also the service should not exposed to attackers and worms that may use vulnerabilities that exist in the listening server. Port...
Platforms: *nix
License: Freeware | Size: 5.12 KB | Download (99): TCP Knocking Download |
Pure FTP Server is a fast, production quality, standards-conformant FTP server based on Troll-FTPd. Pure FTP Server has no known vulnerability, it is trivial to set up, and it is especially designed for modern kernels. Features include PAM support, IPv6, chroot()ed home directories, virtual...
Platforms: *nix
License: Freeware | Size: 552.96 KB | Download (111): Pure FTP Server Download |
BlockSSHD is a Perl script based on BruteForceBlocker v1.2.3 that dynamically adds IPTables rules for Linux and pf firewall rules for BSD that block SSH brute force attacks. It can also detect ProFTPd login failures. BlockSSHD checks a log file you specify, for example /var/log/secure on a Red...
Platforms: *nix
License: Freeware | Size: 10.24 KB | Download (95): BlockSSHD Download |
Keyring is a program lets you securely store digital secret keys on your Palm handheld computer. This information might include computer account passwords, credit card or banking numbers, GnuPG passphrases, or OPIE pads. (Previously "GNU Keyring for PalmOS".) Many people use Keyring for PalmOS...
Platforms: *nix
License: Freeware | Size: 44.03 KB | Download (102): GNU Keyring Download |
Kojoney project is a low level interaction honeypot that emulates an SSH server. The daemon is written in Python using the Twisted Conch libraries. Kojoney is a mix of the spanish word cojon (s/c/k/) and honey. In the spanish language the sentence "estar hasta los cojones" is used to express...
Platforms: *nix
License: Freeware | Size: 3.1 MB | Download (94): Kojoney Download |
BanFromLog is a shell script that examines your /var/log/auth.log and searches for the IP addresses of login attempts which use non-existent user names. BanFromLog is configured for use with sqlite or MySQL. Well is truth that if you have only an user, you dont need this but, when you have...
Platforms: *nix
License: Freeware | Size: 5.12 KB | Download (93): BanFromLog Download |
DJohn is a distributed John the Ripper.With Distributed John (DJohn) you can crack passwords using several machines to get passwords sooner than using a single machine. The cracking in itself is done by John The Ripper and djohns server (djohnd) divides the work in work packets and coordinates...
Platforms: *nix
License: Freeware | Size: 49.15 KB | Download (100): DJohn Download |
The bastard disassembler is a disassembler written for x86 ELF targets on Linux. Other file formats/CPUs can be plugged in. It has a command-line interface and is meant to be used as a backend or engine. Support for controlling the disassembler via pipes is provided. Note that this disassembler...
Platforms: *nix
License: Freeware | Size: 2.35 MB | Download (240): The bastard disassembler Download |
ShellTer is an iptables-based firewall. What sets it apart from the rest is that it has built-in SSH brute force protection. ShellTer project is easy to configure and has an interactive CLI installer. To install ShellTer, simply execute the "installer" file in this directory. Enjoy and feel...
Platforms: *nix
License: Freeware | Size: 10.24 KB | Download (93): ShellTer Download |
sud is a daemon to execute interactive and non-interactive processes with special (and customizable) privileges in a nosuid environment. Some advantages of the program are: you can switch to root privileges on a remote machine and keep its disks mounted with nosuid flag your client will be...
Platforms: *nix
License: Freeware | Size: 112.64 KB | Download (90): sud Download |
Games::Mastermind::Solver::BruteForce is a Master Mind puzzle solver. SYNOPSIS # See Games::Mastermind::Solver Games::Mastermind::Solver::BruteForce uses the classical brute-force algorithm for solving Master Mind puzzles. METHODS remaining $number = $player->remaining; The number...
Platforms: *nix
License: Freeware | Size: 4.1 KB | Download (208): Games::Mastermind::Solver::BruteForce Download |
Sudoku Susser is a free program that helps you play Sudoku. If youve been living under a rock and dont know what a Sudoku puzzle is, the London Daily Mail has a good introduction to the puzzles and basic solving techniques. Sudoku Susser project makes it easy to make your selections as you...
Platforms: *nix
License: Freeware | Size: 2 MB | Download (105): Sudoku Susser Download |
Acovea implements a genetic algorithm for finding the "best" options for compiling programs with the GCC C and C++ compilers. ACOVEA (Analysis of Compiler Options via Evolutionary Algorithm) implements a genetic algorithm to find the "best" options for compiling programs with the GNU Compiler...
Platforms: *nix
License: Freeware | Size: 399.36 KB | Download (96): Acovea Download |
PHAT is a browser-based network management solution with a heavy lean toward switches, routers, and other traffic handlers which can be used to control either a single node, subnet, or vlan. As you can probably see if youre reading this, PHAT is not the worlds most useful tool... yet. The...
Platforms: *nix
License: Freeware | Size: 235.52 KB | Download (97): PHAT Download |
Algorithm::Munkres is a Perl extension for Munkres solution to classical Assignment problem for square and rectangular matrices. This module extends the solution of Assignment problem for square matrices to rectangular matrices by padding zeros. Thus a rectangular matrix is converted to square...
Platforms: *nix
License: Freeware | Size: 9.22 KB | Download (100): Algorithm::Munkres Download |
Nuhe is a rule based log monitoring system, which is capable of action when rules are matched againsts log(s) activity. Default Nuhe mode is to run on background (daemon), but it can also be used in foreground and log analyzer mode. Log analyzer mode just analyzes given logs and prints results to...
Platforms: *nix
License: Freeware | Size: 112.64 KB | Download (92): Nuhe Download |
CryptNET Password Candidate Generator is a password generator. It generates a list of password candidates for the user to choose from by mapping operating system sources of pseudorandomness into printable character arrays using a mod operation. It is capable of generating passwords composed of...
Platforms: *nix
License: Freeware | Size: 59.39 KB | Download (98): CryptNET Password Candidate Generator Download |
Xyzzy is a pronounceable password generator. It is useful for network or server administrators that find themselves creating new user accounts on a regular basis and need to come up with passwords for them.The reasons to use a pronounceable password generator such as xyzzy are simply because...
Platforms: Mac
License: Freeware | Download (120): Haxial xyzzy Download |
MacKrack is a password hash brute forcer, supporting the Crypt, MD5 SHA-1, and Salted SHA-1 algorithms. It has two modes: dictionary and keyspace brute force. The brute force mode supports the lowercase alphabet, entire alphabet, and alphanumeric cracking, with a variable maximum password length...
Platforms: Mac
License: Freeware | Download (597): MacKrack Download |
PINoptic Secured Storage uses the patented security access control called a One Time Visual Probablistic password (OTP) combined with industrial and military grade encryption to keep your private content private to you or those you choose to share your PINoptic Passcode with. Different types of...
Platforms: Windows
License: Freeware | Size: 1.3 MB | Download (109): PINoptic Secure Storage Download |