1971 projects tagged "Security"

Download Website Updated 09 Apr 2013 ttyrpld

Pop 106.21
Vit 4.68

ttyrpld is a multi-OS kernel-level tty key and screen logger. Recorded sessions can be followed live or replayed at a later time. Supported platforms are Linux, Solaris, FreeBSD, NetBSD, and OpenBSD.

No download Website Updated 16 Apr 2004 tumbler

Pop 29.15
Vit 1.00

tumbler enables a client to securely tell a server process on a remote machine to execute a predetermined command. It is similar to port knocking, and is designed so that a remote user can securely and stealthily enable server processes, open firewall holes, etc.

Download No website Updated 10 Jun 2003 twocrypt

Pop 47.87
Vit 1.44

twocrypt (2c) is a tool for the ultra-paranoid, providing a traditional crypto, but also an option of deniable (subpoena-proof) encryption. It encrypts one or two files at once. Each file can be recovered with its respective passphrase, but the presence of more than one file cannot be demonstrated, and the presence of this option alone should not be a credible argument for data hiding.

No download No website Updated 30 Jan 2001 twonz

Pop 7.21
Vit 1.00

twonz is a small Perl/TK program which lets you generate and manage the endless quantities of passwords you may need to get anything done online. Rather than making an encrypted database or anything, it just calculates a secure hash of obvious information appended to a user-supplied pad. So you only have to remember the pad, and none of your passwords are actually stored anywhere at all.

No download No website Updated 11 Feb 2014 txtorcon

Pop 59.06
Vit 4.54

txtorcon is a Twisted-based asynchronous Tor control protocol implementation. Twisted is an event-driven networking engine written in Python, and Tor is an onion-routing network designed to improve people’s privacy and security on the Internet. It includes unit-tests with 96%+ coverage, multiple examples, and documentation. There are abstractions to track Tor configuration and state (circuits, streams), launch private instances, support Hidden Service, and more.

Download Website Updated 13 May 2003 ucspi-ipc

Pop 80.38
Vit 2.08

ucspi-ipc implements D. J. Bernstein's UCSPI protocol in the Unix domain, making it trivial to set up clients or servers on Unix sockets. ucspi- ipc comes with utilities using credential passing on Unix sockets, which are designed to act like a fine-grained and efficient sudo without the need for setuid programs.

Download Website Updated 10 Jan 2010 ulock

Pop 35.79
Vit 1.69

ulock locks the entire virtual console system, completely disabling all console access. It gives up these locks when either the password of the user who started ulock or the root password is typed. It is able to invoke any program (i.e. a screen saver), which will be terminated on any keystroke. The idea of the program was taken from Michael K. Johnson's vlock.

Download Website Updated 02 Sep 2001 upgpverify

Pop 18.73
Vit 68.35

upgverify is a wrapper around PGP (versions 2 and 5) and GPG, designed to be used inside .qmail files but also usable outside of qmail. It deals with MIME (RFC 2015) and non-MIME emails, and makes it easy to set up email robots/gateways with PGP authentication.

Download Website Updated 23 Jun 2003 urluminator

Pop 19.29
Vit 1.43

Urluminator uses urlsnarf to capture URLs that traverse the network and log them to a MySQL database. It also includes a CGI script that allows you to view and search the DB. From the CGI you can also write out Excel Spreadsheets of the results.

Download Website Updated 12 Nov 2003 uruk

Pop 14.83
Vit 62.22

Uruk is an iptables firewall script that is useful if you need similar packet filtering configurations on multiple machines. It uses a template file for source addresses and network services.


Project Spotlight


A tool for collecting and viewing data from a Nedap PowerRouter.


Project Spotlight


A mail filtering manager, supporting Sieve, procmail, maildrop and IMAP filters.