Security Tools
OpenSign is a java applet for signing text in a webbrowser using PKCS-12 key-files or keys accessible through Microsoft CryptoAPI CSPs in a Win32 environment. The applet is based on code kindly provided by IT-Practice and everyone is encouraged to submit code, suggestions or bugfixes through...
Platforms: Linux
Keyword: Java, Miscellaneous, Opensign, Security, Signing, Using
License: Freeware | Size: 419.84 KB | Download (109): OpenSign Download |
THC-Amap is a next-generation tool for assistingnetwork penetration testing. It performs fast and reliable application protocol detection, independant on the TCP/UDP port they are being bound to. THC-Amap is a next-generation scanning tool for pentesters. It attempts to identify applications...
Platforms: Linux
Keyword: Miscellaneous, Next-generation, Penetration, Security, Thc, Thcamap, Tool
License: Freeware | Size: 266.24 KB | Download (148): THC-Amap Download |
THC-Snooze is a framework for network traffic analysis. THC-Snooze project can be used as a sniffer or a network based intrusion detection system. It will watch the network traffic and invoke small programs ("modules" or "protocol dissectors"), which are easily written in a script language, to...
Platforms: Linux
Keyword: Network Traffic, Thc, Thcsnooze
License: Freeware | Size: 95.23 KB | Download (91): THC-Snooze Download |
THC-Yaotp (Yet Another One-Time Pad) is a tool that implements so called one-time pads and that is useful only to the totally paranoid geek..
Platforms: Linux
Keyword: Key, Miscellaneous, One-time, Paranoid, Security, So Called, Thc, Thcyaotp, Tool, Totally, Useful
License: Freeware | Size: 70.66 KB | Download (105): THC-Yaotp Download |
THC-SecureDelete is the best secure data deletion toolkit! If you overwrite a file for 10+ times, it can still be recovered. Read why and use the programs included (w/src!). These tools can wipe files, free disk space, swap and memory! Changes: Linux LKM for secure file deletion included, small...
Platforms: Linux
Keyword: -f, -l, Data Deletion, File, Filesystem, Miscellaneous, Secure, Secure Data, Secure Data Deletion, Securedelete, Security, Space, Thc, Thcsecuredelete
License: Freeware | Size: 61.44 KB | Download (139): THC-SecureDelete Download |
Welcome to the world of Fuzzy Fingerprinting, a new technique to attack cryptographic key authentication protocols that rely on human verification of key fingerprints. It is important to note that while fuzzy fingerprinting is an attack against a protocol, it is not a cryptographic attack and...
Platforms: Linux
Keyword: Corresponding, Fingerprints, Fuzzy, Fuzzyfingerprint, Key, Miscellaneous, Public, Security, Ssh, Thc, Thcfuzzyfingerprint, Tool
License: Freeware | Size: 204.8 KB | Download (128): THC-FuzzyFingerprint Download |
Grenzgaenger is a Socks like hacker tool for tunneling nmap, netcat and exploits transparently through systems into protected networks. THC-Grenzgaenger tool is in ALPHA state! Please dont use it for anything illegal. Just play around with it, and it would be nice if you would give me...
Platforms: Linux
Keyword: Dmz, Exploits, Gg, Hacker Tool, Miscellaneous, Netcat, Security, Thc, Thcgrenzgaenger, Tool, Transparently, Tunneling
License: Freeware | Size: 14.34 KB | Download (117): THC-Grenzgaenger Download |
THC-Shagg is a modular application to bruteforce check digit algorithms. THC-Shagg project can be used to gain information about serial numbers that use check digit algorithms. Once THC-Shagg has analysed a set of serial numbers and found matching check digit algorithms, it is able to generate...
Platforms: Linux
Keyword: Algorithms, Check, Check Digit, Digit, Dr, Dsr, Modulus, Numbers, Security, Serial, Serial Numbers, Thc, Thcshagg
License: Freeware | Size: 133.12 KB | Download (154): THC-Shagg Download |
Nessus project is the worlds most popular open-source vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications. The "Nessus"...
Platforms: Linux
Keyword: Beta, Checks, Most Popular, Nasl, Nessus, Network Security, Scanner, Security, Security Checks, Security Scanner, Vulnerability, Vulnerability Scanner
License: Freeware | Download (126): Nessus 3.2 Download |
Nessus project is the worlds most popular open-source vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications. The "Nessus"...
Platforms: Linux
Keyword: Checks, Miscellaneous, Most Popular, Nasl, Nessus, Network Security, Organizations, Scanner, Security, Security Checks, Security Scanner, Vulnerability, Vulnerability Scanner
License: Freeware | Download (328): Nessus Download |
TaoCrypt project is a portable, fast, cryptographic library for most needs..
Platforms: Linux
Keyword: Cryptographic, Cryptographic Library, Fast, Library, Miscellaneous, Portable, Security, Taocrypt
License: Freeware | Size: 307.2 KB | Download (96): TaoCrypt Download |
Truecrypt mount/unmount scripts contains two .sh files for mounting and unmounting truecrypt partitions with some dialogues. When mounting a password is asked and when unmounting both normal and forced mounting is supported, asking the user what to do in each stage. These are very simple scripts,...
Platforms: Linux
Keyword: Miscellaneous, Mounting, Mountunmount, Partitions, Scripts, Security, Truecrypt, Unmounting
License: Freeware | Size: 4.1 KB | Download (179): Truecrypt mount/unmount scripts Download |
jEnkryptor is a Java swing based, multi-threaded cross-platform encryption application. jEnkryptor project uses the WizCrypt engine..
Platforms: Linux
Keyword: Based, Cross-platform, Encryption, Java, Java Swing, Jenkryptor, Miscellaneous, Multi-threaded, Security, Swing
License: Freeware | Size: 33.79 KB | Download (102): jEnkryptor Download |
Eureka Encryption Global Edition contains file encryption, multiple encryption, merge encryption, multiple file encryption, embedded applications (Crypt Words, Steganographer, Interface) and other tools such as a file shredder and scrambler. Eureka Encryption Global Edition is available for...
Platforms: Linux
Keyword: Edition, Encryption, Eureka, Eureka Encryption Global Edition, File, File Encryption, Global, Global Edition, Miscellaneous, Multiple, Multiple Encryption, Security
License: Freeware | Size: 5.5 MB | Download (128): Eureka Encryption Global Edition Download |
Eureka Public Key was created due to numerous requests for a public key application using our strong encryption techniques. The basic principle for its use is one creates their own public key and distributes the key to whomever they will be transferring encrypted files with. When one receives a...
Platforms: Linux
Keyword: Click, Click On, Due To, Eureka, File, Key, Miscellaneous, Public, Public Key, Security, Select, Strong Encryption, Will Be
License: Freeware | Size: 2.6 MB | Download (94): Eureka Public Key Download |
stephanie is a program for hardening OpenBSD for multiuser environments. Mmmmm, OpenBSD. Functional, secure, free. With an emphasis on security and integrated cryptography, it carries an excellent reputation for plain old "you-just-cant-hack-this-ness". Not perfect, but nothing is, at least...
Platforms: Linux
Keyword: Job, Miscellaneous, Openbsd, Process, Security, Stephanie, Tpe, Trusted, User, Users
License: Freeware | Size: 14.34 KB | Download (95): stephanie Download |
Md4sum generates or checks MD4 checksums applying the algorithm specified in RFC 1320. The project role is to generate and print checksums for all files passed as arguments. The usage is: md4sum [options] [file(s)]... see the manual page for more information. Whats New in This Release: -...
Platforms: Linux
Keyword: Algorithm, Applying, Checks, Checksums, Generates, Miscellaneous, Rfc, Security, Specified
License: Freeware | Size: 26.62 KB | Download (117): Md4sum Download |
Snort project is a "lightweight" intrusion detection technology in comparison to commercially available systems. Snort really isnt very hard to use, but there are a lot of command line options to play with, and its not always obvious which ones go together well. This file aims to make using...
Platforms: Linux
Keyword: Commercially, Detection, Detection Technology, Intrusion, Intrusion Detection, Intrusion Detection Technology, Miscellaneous, Packets, Security, Snort, Technology
License: Freeware | Size: 3.7 MB | Download (152): Snort Download |
pam_passwdqc is a simple password strength checking module for PAM-aware password changing programs, such as passwd. In addition to checking regular passwords, it offers support for passphrases and can provide randomly generated ones. All features are optional and can be (re-)configured without...
Platforms: Linux
Keyword: Ask, Ask For, Character Classes, Characters, Module, Pam, Pampasswdqc, Password, Password Strength, Passwords, Security, Simple Password, Such As, Used, Used To
License: Freeware | Size: 30.72 KB | Download (107): pam_passwdqc Download |
PAM has traditionally assumed that services doing authentication have the ability to interact with the user. Unfortunately, this isnt true for services that implement non-interactive and/or fixed protocols, such as FTP and POP3. This is typically worked around by making the flawed assumption...
Platforms: Linux
Keyword: Binary, Miscellaneous, Pam, Pamuserpass, Password, Prompts, Security, Username, Username And Password, Userpass, Uses
License: Freeware | Size: 5.12 KB | Download (103): pam_userpass Download |