80 projects tagged "Security"

Download No website Updated 14 Jun 2014 WiKID Two-Factor Authentication System

Screenshot
Pop 2,158.61
Vit 414.64

The WiKID Strong Authentication System is a highly scalable, secure, self-hosted two-factor authentication system. It is simple to implement and maintain, allows users to be validated automatically, requires no hardware tokens, has a simple API for application support (via Ruby, PHP, Java, COM, Python, etc.), supports multiple domains, and supports replication for fault tolerance and scalability. It also supports mutual /host and transaction authentication, wireless tokens only domains, locked tokens (to your PC), anti-keystroke logger keypad PIN entry, etc.

Download No website Updated 12 Jun 2014 Lynis

Screenshot
Pop 1,376.12
Vit 170.50

Lynis is an security auditing and hardening tool for Unix derivatives like Linux/BSD/Solaris. It performs an in-depth scan on the system to detect software and security issues. Besides information related to security, it will also scan for general system information, installed packages, and possible configuration mistakes. The software is aimed at assisting automated auditing, configuration management, software patch management, vulnerability detection, and malware scanning of Unix-based systems.

No download Website Updated 14 Feb 2014 Tenable Nessus

Screenshot
Pop 1,155.31
Vit 55.01

Tenable Nessus is a world-leader in active vulnerability scanners. It features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery, and vulnerability analysis of your security posture. Nessus scanners may be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks. It is free of charge for personal use in a non-enterprise environment.

Download Website Updated 15 May 2014 SILC

Screenshot
Pop 1,019.48
Vit 196.14

SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing and chat services. It can be used to send any kind of messages, in addition to normal text messages, including multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, SHA-2, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. The software is delivered as SILC Client for end users, SILC Server for system administrators, and SILC Toolkit for application developers.

Download Website Updated 29 Jan 2011 Nmap Security Scanner

Screenshot
Pop 946.74
Vit 19.17

Nmap ("Network Mapper") is a utility for network exploration, administration, and security auditing. It uses IP packets in novel ways to determine which hosts are available online (host discovery), which TCP/UDP ports are open (port scanning), and what applications and services are listening on each port (version detection). It can also identify remote host OS and device types via TCP/IP fingerprinting. Nmap offers flexible target and port specifications, decoy/stealth scanning for firewall and IDS evasion, and highly optimized timing algorithms for fast scanning.

Download Website Updated 26 Nov 2011 stunnel

Screenshot
Pop 569.12
Vit 17.28

The stunnel program is designed to work as an SSL encryption wrapper between remote client and local (inetd-startable) or remote server. It can be used to add SSL functionality to commonly used inetd daemons like POP2, POP3, and IMAP servers without any changes in the programs' code. It will negotiate an SSL connection using the OpenSSL or SSLeay libraries. It calls the underlying crypto libraries, so stunnel supports whatever cryptographic algorithms you compiled into your crypto package.

Download No website Updated 14 Apr 2014 MatrixSSL

Screenshot
Pop 519.56
Vit 44.37

MatrixSSL is an embedded SSL and TLS implementation designed for small footprint devices and applications requiring low overhead per connection. The library is less than 50Kb on disk with cipher suites. It includes client and server support through TLS 1.2, mutual authentication, session resumption, and implementations of RSA, ECC, AES, 3DES, ARC4, SHA2, SHA1, and MD5. The source is well documented and contains portability layers for additional operating systems, cipher suites, and cryptography providers.

Download Website Updated 16 May 2014 Password Manager Daemon

Screenshot
Pop 347.33
Vit 73.40

Password Manager Daemon serves clients data via a Unix domain socket or over a remote TLS connection. The data is stored in an (optionally) encrypted XML file, and the client must provide the key to modify it. It has the option to use gpg-agent for key management (including smartcards). It is multi-threaded, allowing more than one client to be connected at the same time. Key retrieval may be done via a key file or a pinentry program. A key cache is used, so a client won't need to enter a passphrase each time one is required. It is very configurable. Libpwmd is also available as a separate project and is a library making it easy for applications to use Pwmd.

Download Website Updated 11 Jun 2014 RCDevs OpenOTP

Screenshot
Pop 298.87
Vit 74.45

RCDevs OpenOTP Server provides two-factor authentication with one-time passwords (OTP). It supports OATH RFC-4226 HOTP (Event-based) and TOTP (Time-based), OCRA (Challenge-based), Mobile-OTP, YubiKey Software/Hardware Tokens, SMSOTP, MailOTP, and OTP lists. It provides a SOAP/XML, RADIUS, and OpenID APIs and integrates into your LDAP (OpenLDAP, Novell, ActiveDirectory). It works with Web applications, VPNs, Linux PAM, Microsoft, and more. It is composed of the RCDevs WebADM server application, the OpenOTP SOAP service, the OpenOTP Radius Bridge, the User Self-service Desk, and Token Self-enrollemnt end-user Web application. VMWare appliances and Web demos are available.

Download Website Updated 11 Jun 2014 RCDevs TiQR

Screenshot
Pop 251.94
Vit 27.61

RCDevs TiQR is an innovative way to authenticate yourself to Web applications. Its unique user friendly features include one-click enrollment using QR codes and secure authentication without having to re-type complicated codes by leveraging dynamic QR codes embedded in Web pages. TiQR supports the OCRA suite of authentication protocols. Its security is based on AES 256-bit encryption and the SHA family functions.

Screenshot

Project Spotlight

Lynis

A security audit and hardening tool.

Screenshot

Project Spotlight

RCDevs OpenID Provider

An OpenID 1.1 and 2.0 provider with simple registration and multiple OpenID URL formats.