Select a tag to browse associated projects and drill deeper into the tag cloud.
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, thus making the attack much faster compared to other WEP cracking tools. In fact ... [More]
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most ... [More]
Anytun is an implementation of the secure anycast tunneling protocol. It uses an easy openvpn style interface and makes it possible to build redundant vpn clusters with load balancing between servers. VPN Servers share a single IP address. Adding and removing VPN Servers is done by the routing ... [More]
A free on-the-fly transparent disk encryption program for MS Windows 2000/XP/Vista/Windows 7 PCs (both 32 and 64 bit) and Windows Mobile 2003/2005 and Windows Mobile 6 PDAs. Supports AES in XTS mode and other encryption standards. Supports LUKS format.
O2 is a safe (encrypted) storage and organizer for personal data. It can be an address book, a password manager or what you want!
A WordPad-like cryptography program. Includes AES, RC4, Skipjack, Twofish, Blowfish, CryptAPI, DES, Gost, XOR, and TEA.
"In Roman mythology, Laverna was a goddess of Thieves, Cheats and the underworld. She was propitiated by libations poured with the left hand. The poet Horace and the playwright Plautus call her a goddess of thieves." Laverna's Brute: An open source hash auditor leveraging the ... [More]
This project is for a collection of simple programs that you might find useful, including a random password generator, a secure vault for storing your many passwords in, etc.
Tamalin PantherPanther is a cryptographic program written in Java and is designed to be secretive. It translates missives or files into ciphertext using the AES (Advanced Encryption Algorithm), so that can be later decrypted by anyone with knowledge of the same password which was used to encrypt it. ... [More]
Copyright © 2013 Black Duck Software, Inc. and its contributors, Some Rights Reserved. Unless otherwise marked, this work is licensed under a Creative Commons Attribution 3.0 Unported License . Ohloh ® and the Ohloh logo are trademarks of Black Duck Software, Inc. in the United States and/or other jurisdictions. All other trademarks are the property of their respective holders.