MacTech Network:   MacForge.net  |  Computer Memory  |  Register Domains  |  Printer Supplies  |  Cables  |  iPod Deals  |  Mac Deals

  MacTech Magazine

sponsored by MacTech Magazine

 
 

Browse By:
Database Environment
Development Status
Intended Audience
License
Operating System
Programming Language
Topic
Translations
User Interface

   Topic
      Security
         Anti-Malware (10 projects)
         Anti-Spam (7 projects)
         Anti-Virus (7 projects)
         Cryptography (620 projects)
         Password manager (13 projects)
Mac Projects  Mac/nix Projects
Extended View
Projects Per Page: 10 20 50 100
Sort By:

1675 projects in result set. Projects sorted by: Ranking (Top Ranked First)
Select a page:   1   2   5   10   15   20   25   30   34   Next


1. .deobfuscate - Deobscufates .NET assemblies, primarily by rearranging IL code (basic block reordering) and removing junk. Designed to be modular, it is built from reusable pieces.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

2. 20G Hashgen - Java based Portable hashing application capable of multiple individual file signatures or proprietary group signatures (1 signature for a folder and all its contents). GUI and command line in the same executable. -sha1 -sha256 -sha51 -md5 -crc32

Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

3. 21st Century Crypto - This ain't your daddy's crypto! We provide a set of C libs and utilities to perform cypherpunk style crypto functions, using your existing OpenPGP keys. Ring signatures; credentials; mental poker; timelines; zero knowledge proofs. Cool stuff!

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

4. A Bit Secure Editor Eclipse Plugin - A text editor which saves data encrypted with strong cryptography (AES, Blowfish..)

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

5. A fine-grained Qt login system - Grained Login is a fine-grained login system for Qt applications. It uses SHA1 hashed passwords to retrieve user rights from a SQLite database. An administration dialog handles the maintenance of the users, the roles, the rights and the password history.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

6. A free penetration testing toolkit - Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

7. A simple SSO - A simple SSO (Single SignOn) written in JEE.

Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

8. ABCrypt - A C++/Qt program for use in encrypting and decrypting simple substitution cyphers. These cyphers are often found in newspapers and various puzzle books.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

9. ABKey - The ABKey plugin for Apple's Address Book allows you to quickly view GPG key information for contacts as well as specify per-contact preferences for how GPGMail (the Apple Mail plugin for GPG) handles encrypting and signing of emails.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

10. ACAD - Automated Computer Auditing Daemon - Keep a track of what's going on with your systems: suid, sgid, world writable, hidden and unowned files monitoring as well as important file's md5sums management audits sent to your mailbox on a regular basis.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

11. Access Control Designer - Access Control Designer is a universal modular tool for visually designing access control policies.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

12. Access Point Utilites for Unix - Access Point Utilites for Unix - it's a set of utilites to configure and monitor Wireless Access Points under Unix using SNMP protocol. Utilites knownly compiles and run under Linux, FreeBSD, NetBSD, OpenBSD, MacOS-X, AIX, QNX.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

13. AccesStream - Accesstream is an open source, embeddable identity, access management (IAM), security and auditing platform.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

14. Account Lockout Realm for Tomcat - Adds account lockout after multiple failed authentications in Tomcat's container managed security

Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

15. Acegi Security System for Spring - Spring Security (formerly Acegi Security) is now hosted on the Spring Framework website: http://www.springframework.org/spring-security/

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

16. acl-trend - IDS via ACL log management, including basic reporting via PHP

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

17. ACryptoHash.Net - Pure managed C# implementation of well-known cryptographic hash functions such as SHA-family (SHA0, SHA1, SHA2), MD-family (MD2, MD4, MD5), RIPEMD, Tiger, Haval, Snefru and others.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

18. ActionCrypt - A Flash Encryption Library - A secure, optimized and modular encryption class written in Flash's ActionScript scripting language.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

19. Ada Cryptographic Framework (ACF) - The Ada Cryptographic Framework (ACF) is a set of Ada packages that implement the most popular cryptographic algorithms. The main goal of the proyect is to implement a complete set of cryptographic primitives entirely in Ada 95

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

20. ADAM: Active Defense Algorithm and Model - ADAM is the Active Defense Algorithm and Model. It is a formally defined process of determining appropriate active response actions in the event of an attack. This implementation shows that active defense can be a legitimate and responsible security tool

Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

21. Admin Secure - Admin Secure is an add-on script for PHP-Nuke web portal system. This add-on gives you additional protection schemes from common hacking activities. Admin Secure is an alternate protection for your PHP-Nuke based website.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

22. Advisor - Advisor aims to be a comprehensive and widely available, free vulnerability database and management system.

Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

23. Advisory Check - Advisory Check is a tool for monitoring the security of installed software. It gathers security advisories using RSS/RDF/XML feeds, compares them against a list of known software, and alerts you if you're vulnerable. Let advchk read advisories for you!

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

24. AdvWebFuzzer - a powerfull extensible and modular multiplataform tool to research security bugs in http pages automatically.

Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

25. AES x86 - Algorithms in Assembly - A package of Rijndael, Twofish and Serpent encryption algorithms implemented in x86 assembly. Meant to learn basics of assembly, learn about the algorithms or to be used in a C program.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

26. AfterLife - USB based memory acquisition tool targeting "warm boot" machines with 4GB of RAM or less. The software requires the use of USB portable media and is built on top of the syslinux platform.

Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

27. AgaresSecurity - AgaresSecurity is a set of PHP scripts designed to scan websites and web applications for security vulnerablities, including XSS, RFI, and SQL injections exploits. Licensed under the GPL.

Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

28. aircash - An application to provide a worldwide mobile secure/confidential payment system over the internet and other kinds of insecure/unreliable networks

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

29. AIVIS - A.I. security app. Development ceased.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

30. Alarmas - Yet another alarms program with features as file modification alarm (maybe useful for security auditories), alarms file saving possibility and of course time and date alarms. This time written in java.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

31. Aleph Access Control List API - The Aleph project is a simple Web API for using an access control list composed of OpenIDs.

Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

32. Alfresco Encryption plugin - Encryption plugin for Alfresco. Enables the user to crypt and decrypt (it handles the 'pkcs5' MIME-type). This is a component of the IDX-eDOC project (OpenTrust suite), contributed by IDEALX

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

33. Algebraic Toy Cipher - The Algebraic Toy Cipher is a toy cipher for algebraic research. It is scalable in the number of bits and in the number of rounds. Works over two fields GF(2)/P, being one for the s-box invertion and the other for the mixing layer linear transformation.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

34. algorizmi - An open-source configurable virtual testbed (based on the Eucalyptus cloud platform) for Intrusion Detection System Evaluation.

Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

35. Alist System Inventory Software - Alist is a program that collects hardware and software information about systems and stores it in a database for users to browse and search via a Web interface. The program consists of three parts: a client portion that collects the information, a daemon

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

36. Alpaka Project - Alpaka Project is an attempt to provide the community with an elegant, modern, bug free, easy-to-use vulnerability assessment platform. It's main mission is to be scalable and fast.

Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

37. alr-encrypt - alr-encrypt has moved to http://sourceforge.net/projects/encrypt

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

38. Alt-N Technologies DKIM Project - This project is a C++ library which allows incorporating DKIM into an existing MTA or other application. It provides full support for signing, verifying, and SSP. It is compliant with RFC 4871.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

39. alt.anonymous.messages fetcher - aamFetch is a utility for fetching your anonymous esub nym messages from the alt.anonymous.messages newsgroup (or other newsgroups). It allows multiple encrypt-subjects to scan, multiple "destination files" to save messages to and random chaff downloads.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

40. amas - AMAS stands for Ants Mobile Authentication System and it permits to use one time passwords (OTP) to authenticate users and user groups. The user asks for tokens using a cellular phone call, an SMS, or a SOAP interface.

Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

41. AMaViS - A Mail Virus Scanner - AMaViS is a script that interfaces a mail transport agent (MTA) with virus scanners.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

42. Amavisd-new Maintenance - AmavisAdmin is a tool to maintain SPAMs, Viruses and blocked mails written to an SQL database by Amavisd-new. Mails can be removed automatically or manually, or they can be released to be send to the recipients.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

43. Amnesia. - Amnesia is a design-rich 'host-proof' web application that encrypts and remembers all sorts of personal information from passwords to private notes. All data is encrypted in the client, meaning no passwords or secure data are passed over the network.

Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

44. Anacon - A security analysts console designed to correlate and access events from multiple sources in a single web-based interface. Allows for searching and reporting across numerous event stores.

Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

45. Analysis Console for Intrusion Databases - ACID is a PHP-based analysis engine to search and process a database of security incidents generated by security-related software such as IDSes and firewalls (e.g. Snort, ipchains).

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

46. ANDURAS SurfProtect - ANDURAS SurfProtect is a PHP application that can be used for virus-scanning withing the application-layer (ISO/OSI) Either http and ftp protocols are already supported within the beta version.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

47. Anesma - A simple AES encryption library for C++.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

48. Angry IP Scanner - Angry IP scanner is fast and friendly network scanner for Windows, Linux, and Mac. It is very extensible, allowing it to be used for very wide range of purposes, with the primary goal of being useful to network administrators.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

49. Ano - Ano (Anonymous Network Overlay) is a decentralized IP router based on relaying principle. In Ano all IP traffic is anonymized, including TCP, UDP, ICMP and DNS protocols. Each node acts as a relay and NAT for external traffic.

Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

50. Anomos - Anomos is an anonymous, encrypted multi-P2P file sharing protocol, originally based on BitTorrent. See our homepage for more details.

Click here to download.  
Rank/Activity Percentile
0 / 0.00%

Registered/Updated
N/A / N/A

Downloads
0

1675 projects in result set. Projects sorted by: Ranking (Top Ranked First)
Select a page:   1   2   5   10   15   20   25   30   34   Next

-->
Click on the cover to
see this month's issue!

TRIAL SUBSCRIPTION
Get a RISK-FREE subscription to the only technical Mac magazine!

Today's Deal


 


©1984-2009 MacTech Magazine. www.mactech.com
Toll Free 877-MACTECH, Outside US/Canada: 805-494-9797

MacTech and MacTutor are registered trademarks of MacTech Magazine. The MacTech logo, the MacForge logo, MacForge,
MacForge.net, Explain It, MacDev-1, THINK Reference, NetProfessional, JavaTech, WebTech, BeTech, LinuxTech, MacTech Central
and the MacTutorMan are trademarks or service marks of Xplain Corporation. Other trademarks and copyrights appearing in this
web site, printing or software remain the property of their respective holders.