Wipe is a secure file wiping utility. It is based on work by Peter Gutmann.
Read more
The Linux Portal Site
Wipe is a secure file wiping utility. It is based on work by Peter Gutmann.
Read moreODESSA is the Open Digital Evidence Search and Seizure Architecture, a cross-platform framework for performing Computer Forensics and Incident Response.
Read morePoptop is an open source implementation of a PPTP server. PPTP stands for Point to Point Tunneling Protocol.
Read moreNemesis is a command-line network packet crafting and injection utility. The suite is useful for scripting of injected packets from simple shell scripts.
Read moreTiger is a security tool that can be use both as a security audit and intrusion detection system.
Read moreSniffdet is an implementation of a set of tests for remote sniffers detection in TCP/IP network environments.
Read moreOpenSignature is a graphical environment for executing cryptographic operations using several kinds of smart cards. Works with all OpenSC supported cards.
Read moretcptrace is a tool designed for analysis of TCP dump files. It can tell you detailed information about TCP connections by sifting through dump files.
Read moreAFICK (Another File Integrity ChecKer) is a security tool. It is designed to be a portable clone of aide, or Tripwire software.
Read moreYersinia is a framework for performing layer 2 attacks. It is designed to take advantage of some weakness in different network protocols.
Read moreAIM Sniff is a freeware utility for monitoring and archiving AOL Instant Messenger and MSN messages across a network.
Read moreFigaro’s Password Manager (FPM) is a GNOME application that allows you to securely store your passwords
Read moreNixory is an Anti Spyware program. It protects web browsers from dangerous spywares, and harmful cookies.
Read moreFireHOL is a simple yet powerful way to configure stateful iptables firewalls. It can be used to control any number of internal/external/virtual interfaces.
Read moreShellTer is an iptables-based firewall. It supports port forwarding, blacklisting, whitelisting, etc. It has built-in SSH brute force protection.
Read more