Displaying 1 to 20 from 24 results

SoftEther VPN - Cross-platform Multi-protocol VPN Program

  •    C

SoftEther VPN is a ?Cross-platform Multi-protocol VPN Program. It supports SSL-VPN protocol to penetrate any kinds of firewalls. Ultra-optimized SSL-VPN Protocol of SoftEther VPN has very fast throughput, low latency and firewall resistance. Virtualization of Ethernet devices is the key of the SoftEther VPN architecture. It virtualizes Ethernet devices in order to realize a flexible virtual private network for both remote-access VPN and site-to-site VPN.

OpenVAS - Vulnerability Scanner and Manager

  •    C

OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. It is designed to search for networked devices and computers, discover accessible ports and services, and to test for vulnerabilities on any such ports; plugins allow for further expansion.

strongSwan - IPsec-based VPN Solution

  •    C

strongSwan is an OpenSource IPsec implementation. IPSec is an encryption and authentication standard that can be used to build secure Virtual Private Networks (VPNs). It has powerful IPsec policies supporting large and complex VPN networks. It implements both the IKEv1 and IKEv2 (RFC 7296) key exchange protocols.

w3af - Web Application Attack and Audit Framework

  •    Python

w3af is a Web Application Attack and Audit Framework. The project’s goal is to create a framework to help you secure your web applications by finding and exploiting all web application vulnerabilities. It can find Cross site scripting, SQL Injection and lot more. The framework implements web and proxy servers which are easy to integrate into your code in order to identify and exploit vulnerabilities.




PolarSSL library - Crypto and SSL made easy

  •    C

Download PolarSSL PolarSSL is an SSL library written in ANSI C. PolarSSL makes it easy for developers to include cryptographic and SSL/TLS capabilities in their (embedded) products with as little hassle as possible. It is designed to be readable, documented, tested, loosely coupled and portable. It supports Symmetric encryption algorithms, hash algorithms, RSA with PKCS and X.509 certificate, SSL and TLS.

AiEngine - Packet Inspection Engine

  •    C++

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. AIEngine helps network/security profesionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on or use them on the engine automatically.

Suricata IDS - Network threat detection engine

  •    C

The Suricata engine is capable of real time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM) and offline pcap processing. Suricata inspects the network traffic using a powerful and extensive rules and signature language, and has powerful Lua scripting support for detection of complex threats.

Notebook PEA - Text Editor with Password Encryption

  •    Java

Password encryption tool with built-in text editor, to protect private notes. The program offers some styling and editing functionality for the text, a password generator, a password-strength meter and a virtual keyboard. The text is protected using authenticated encryption.


File Lock PEA - Filesystem-Level Encryption

  •    Java

The File Lock PEA (PEA = Password Encrypting Archive) encrypts data at the filesystem level and offers the possibility to decrypt single files or whole directories temporarily.

Wireguard - Fast, Modern, Secure, VPN Tunnel

  •    C

WireGuard is an extremely simple yet fast and modern VPN that utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPSec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances.

Remote Access Monitor

  •    

This application monitors your machine and alerts you when a remote process is detected. This means you can keep an eye on people accessing your machine using applications such as Remote Desktop, Terminal Services or a management console.

Site Security Management Utility

  •    

The Site Security Management Utility strives to ease the SharePoint security burden on site owners and farm administrators by providing a simple user interface combined with bulk editing capabilities.

crashme

  •    C

Crashme is a very simple program that tests the operating environment's robustness by invoking random data as if it were a procedure. First posted to comp.sources.unix in 1991.

Thales Simulator Library

  •    

The Thales Simulator Library is an implementation of a software emulation of the Thales (formerly Zaxus, formerly Racal) RG7000 Hardware Security Module cryptographic device.

Proactive Investigator: advanced analytics for threat detection

  •    CSharp

Proactive Investigator is a solution created for information security threat detection. It is an end-to-end solution, currently built on SQL Server 2008

Pwdhash Sharp

  •    DotNet

A variety of frontends for the PwdHash web-application. Using a domain name and "master password", PwdHash Sharp automatically create a hashed password that is strong, and cannot be used to reverse-engineer the master password.

Web Based Web Site Administration Tool (WSAT)

  •    ASPNET

This project allows the functionality of Microsoft's built in Web Site Administration Tool (WSAT) to be accessed from a regular old web page. This separates the need for Visual Studio to administer your web site. The Web Based WSAT tool allows you to create/manage users and roles

RegSecEdit

  •    

set registry security from command line, or batch file.

System.Common

  •    DotNet

A .Net library that provides methods, properties and more that the .Net Framework doesn't provide.

OpenWIPS-ng - Wireless Intrusion Prevention System

  •    C

OpenWIPS-ng is an open source and modular Wireless IPS (Intrusion Prevention System). It is composed of three parts: Sensor(s): "Dumb" devices that capture wireless traffic and sends it to the server for analysis. Also responds to attacks. Server: Aggregates the data from all sensors, analyzes it and responds to attacks. It also logs and alerts in case of an attack. Interface: GUI manages the server and displays information about the threats on your wireless network(s).