| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
| |
Package description:
Tftpy is a TFTP library for the Python programming language. It
includes client and server classes, with sample implementations.
Hooks are included for easy inclusion in a UI for populating
progress indicators.
http://tftpy.sourceforge.net/
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
Fabric is a Python (2.5 or higher) library and command-line
tool for streamlining the use of SSH for application deployment
or systems administration tasks.
It provides a basic suite of operations for executing local or
remote shell commands (normally or via sudo) and uploading/
downloading files, as well as auxiliary functionality such as
prompting the running user for input, or aborting execution.
http://www.fabfile.org
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Package desscription:
paramiko is a module for python 2.2 (or higher) that implements the
SSH2 protocol for secure (encrypted and authenticated) connections
to remote machines. unlike SSL (aka TLS), SSH2 protocol does not
require heirarchical certificates signed by a powerful central
authority. you may know SSH2 as the protocol that replaced telnet
and rsh for secure access to remote shells, but the protocol also
includes the ability to open arbitrary channels to remote services
across the encrypted tunnel -- this is how sftp works, for example.
http://www.lag.net/paramiko/
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
This module gives access to the extended attributes present in some
operating systems/filesystems. You can list attributes, get, set and
remove them.
The module exposes two sets of functions:
- the 'old' listxattr, getxattr, setxattr, removexattr functions
which are deprecated since version 0.4
- the new list, get, get_all, set, remove functions which expose
a namespace-aware API and simplify a bit the calling model by
using keyword arguments
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
This module provides support for manipulating POSIX.1e ACLS
Depending on the operating system support for POSIX.1e, the ACL
type will have more or less capabilities:
- level 1, only basic support, you can create ACLs from files and
text descriptions; once created, the type is immutable
- level 2, complete support, you can alter the ACL once it is created
Also, in level 2, more types are available, corresponding to
acl_entry_t (the Entry type), acl_permset_t (the Permset type).
The existence of level 2 support and other extensions can be checked
by the constants:
- HAS_ACL_ENTRY for level 2 and the Entry/Permset classes
- HAS_ACL_FROM_MODE for ACL(mode=...) usage
- HAS_ACL_CHECK for the ACL().check function
- HAS_EXTENDED_CHECK for the module-level has_extended function
- HAS_EQUIV_MODE for the ACL().equiv_mode method
|
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
M2Crypto is the most complete Python wrapper for OpenSSL featuring
RSA, DSA, DH, HMACs, message digests, symmetric ciphers (including
AES); SSL functionality to implement clients and servers; HTTPS
extensions to Python's httplib, urllib, and xmlrpclib; unforgeable
HMAC'ing AuthCookies for web session management; FTP/TLS client
and server; S/MIME; ZServerSSL: A HTTPS server for Zope and
ZSmime: An S/MIME messenger for Zope. M2Crypto can also be used to
provide SSL for Twisted.
|
|
|
|
|
| |
Package description:
Python bindings for YAML
|
|
|
|
|
|
|
| |
Package description:
YAML is a data serialization format designed for human readability and
interaction with scripting languages. LibYAML is a YAML parser and
emitter written in C.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
Package description:
AA-lib is a low level gfx library just as many other libraries
are. The main difference is that AA-lib does not require graphics
device. In fact, there is no graphical output possible. AA-lib
replaces those old-fashioned output methods with powerful ascii-
art renderer.
|
|
|
|
|
|
| |
Package description:
mytop is a console-based (non-gui) tool for monitoring the
threads and overall performance of a MySQL server.
|
|
|
|
|
|
| |
Conflicts:
testing/wput/APKBUILD
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
httpry is a specialized packet sniffer designed for displaying
and logging HTTP traffic. It is not intended to perform analysis
itself, but to capture, parse, and log the traffic for later
analysis. It can be run in real-time displaying the traffic as
it is parsed, or as a daemon process that logs to an output file.
It is written to be as lightweight and flexible as possible, so
that it can be easily adaptable to different applications.
|
|
|
|
|
|
|
|
| |
Package description:
mac-robber is a digital investigation tool that collects data
from allocated files in a mounted file system. This is useful
during incident response when analyzing a live system or when
analyzing a dead system in a lab.
|
|
|
|
| |
Package description:
|
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
Ncrack is a high-speed network authentication cracking tool. It was
built to help companies secure their networks by proactively testing
all their hosts and networking devices for poor passwords. Security
professionals also rely on Ncrack when auditing their clients. Ncrack
was designed using a modular approach, a command-line syntax similar to
Nmap and a dynamic engine that can adapt its behaviour based on network
feedback. It allows for rapid, yet reliable large-scale auditing of
multiple hosts.
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
ArpON (ARP handler inspection) is a portable handler daemon that
make ARP protocol secure in order to avoid the Man In The Middle
(MITM) attack through ARP Spoofing, ARP Cache Poisoning, ARP Poison
Routing (APR) attacks. It blocks also the derived attacks by it,
which Sniffing, Hijacking, Injection, Filtering & co attacks for
more complex derived attacks, as: DNS Spoofing, WEB Spoofing,
Session Hijacking and SSL/TLS Hijacking & co attacks.
|
| |
|