Statseeker is a powerful network performance monitoring solution for businesses
Using just a single server or virtual machine, Statseeker can be up and running within minutes, and discovering your entire network in less than an hour, without any significant effect on your bandwidth availability.
Learn More
Regpack: All-in-One Online Registration and Payment Software
Regpack is a powerful onboarding, registration, and payments platform trusted by thousands of organizations worldwide. Our mission is simple: to give you the tools to automate busywork, streamline your processes, and keep your focus where it belongs, on growing your programs and serving your clients.
Tattoo will provide a set of command-line scripts for analyzing raw tcpdump files or ASCII hexadecimal representations of network traffic to identify format, function, and communication model.
A Python/Gtk application to manage groups of users stored in an LDAP database, using data from X509 certificates imported from files or LDAP servers maintained by certificate authorities. These groups are used to create grid-map files used by the Globus
Java class file encryption. Class Encrypt is a program that can encrypt a developer's class files and package them into an executable jar file for deployment. The program uses modules for implementing different encryptions.
Open Source Stenography engine usable from the command line. Uses various techniques for hiding and retriving stenographic information. Includes a small image analysis suite for detecting stenographic images.
*PassGuard suite provides a series of application used to manage your numerous passwords in an encrypted file. Additionally, a C++ framework is provided to create password management applications. Plugins system managed different encryption methods.
The Secure Remote Log Monitor (SRLM) project provides client and server
utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.
NetDraw is a general purpose net mapper. It will map local network and display it graphically.
To achive this many techniques will be used from ICMP ping to raw sniffing.
The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
The all-in-one solution built to help you stay organised and get more bookings with thousands of connections to online travel agencies (OTAs), resellers and suppliers.
CryptoPy is a pure python implmentation of cryptographic algorithms and applications. The algorithms are developed for readability more than speed. The collection now includes IEEE 802.11i specific algorithms that generated the test vectors for 802.11i.
keystory, by analyzing email history, gathers data on the usage of OpenPGP signatures, and provides information to imperfectly, but practically complement the web of trust, answering questions such as "What keys has foo@bar.baz.com used, where and when?"
Automated Computer Auditing Daemon - Keep a track of what's going on with your systems: suid, sgid, world writable, hidden and unowned files monitoring as well as important file's md5sums management audits sent to your mailbox on a regular basis.
Secure locate provides a secure way to index and quickly search for files on your system. It will also check file permissions and ownership so that users will not see files they do not have access to.
Security proxy to clean up all unallowed constructions from HTTP requests, detect intruders and filter outgoing HTTP traffic against leaking classified data.
Knowngoods Report Generator is a set of shell scripts and a Makefile which generate plain text reports about modified files on your system. It does this by the use of checksum reference files which can be found at http://www.knowngoods.org/download.html f
Regular Expression, Arbitrary Protocol, Opensource Filtering Firewall (Reapoff) is a regular expression enabled TCP/IP plug proxy.
The proxy operates on data using a pair of simple rule based configuration files defining the testing and actions on th
Wonder who deleted that important file on your Linux box? Did your database files "mysteriously" disappear from that super-secure Linux database server and you don't know how? Now your system logs will tell who, what, when, and how with Auditunlink
ThorsenCode is a client-server system, that allows you and your buddies to share files in a safe way. It features encrypted filetransfers and encrypted chatrooms.
This very simple perl script parses you iptables log files and produces a report in text format with a summary based on the prefix of the log ( --log-prefix option of iptables ).
Prefix description is allowed.
Hardware-ID is a small Linux module providing
a program by program assignment of certain hardware
specific values. Useful for preparing master
hard drives, hardware independend backup/restore
and some exotic hardware.
bcrypt is a lightweight blowfish file encryption utility which aims for cross-platform portability of not only the actual code, but the encrypted files as well. In addition to providing 448-bit encryption, bcrypt overwrites input files with random garbage
...Has many features which are non-existant in other OTP programs, and includes 5 programs (plus an uninstaller) which allow the user to create keys, create fake keys, encrypt, and decrypt files.
ProSum is a terminal based program that protects your files, sys_call_table and IDT like tripwire way (All in user space, without kernel modules) In addition, database with files etc. could be encrypted with Blowfish algorythm and more.