| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
| |
Package description:
Tftpy is a TFTP library for the Python programming language. It
includes client and server classes, with sample implementations.
Hooks are included for easy inclusion in a UI for populating
progress indicators.
http://tftpy.sourceforge.net/
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
Fabric is a Python (2.5 or higher) library and command-line
tool for streamlining the use of SSH for application deployment
or systems administration tasks.
It provides a basic suite of operations for executing local or
remote shell commands (normally or via sudo) and uploading/
downloading files, as well as auxiliary functionality such as
prompting the running user for input, or aborting execution.
http://www.fabfile.org
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Package desscription:
paramiko is a module for python 2.2 (or higher) that implements the
SSH2 protocol for secure (encrypted and authenticated) connections
to remote machines. unlike SSL (aka TLS), SSH2 protocol does not
require heirarchical certificates signed by a powerful central
authority. you may know SSH2 as the protocol that replaced telnet
and rsh for secure access to remote shells, but the protocol also
includes the ability to open arbitrary channels to remote services
across the encrypted tunnel -- this is how sftp works, for example.
http://www.lag.net/paramiko/
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
This module gives access to the extended attributes present in some
operating systems/filesystems. You can list attributes, get, set and
remove them.
The module exposes two sets of functions:
- the 'old' listxattr, getxattr, setxattr, removexattr functions
which are deprecated since version 0.4
- the new list, get, get_all, set, remove functions which expose
a namespace-aware API and simplify a bit the calling model by
using keyword arguments
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
This module provides support for manipulating POSIX.1e ACLS
Depending on the operating system support for POSIX.1e, the ACL
type will have more or less capabilities:
- level 1, only basic support, you can create ACLs from files and
text descriptions; once created, the type is immutable
- level 2, complete support, you can alter the ACL once it is created
Also, in level 2, more types are available, corresponding to
acl_entry_t (the Entry type), acl_permset_t (the Permset type).
The existence of level 2 support and other extensions can be checked
by the constants:
- HAS_ACL_ENTRY for level 2 and the Entry/Permset classes
- HAS_ACL_FROM_MODE for ACL(mode=...) usage
- HAS_ACL_CHECK for the ACL().check function
- HAS_EXTENDED_CHECK for the module-level has_extended function
- HAS_EQUIV_MODE for the ACL().equiv_mode method
|
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
M2Crypto is the most complete Python wrapper for OpenSSL featuring
RSA, DSA, DH, HMACs, message digests, symmetric ciphers (including
AES); SSL functionality to implement clients and servers; HTTPS
extensions to Python's httplib, urllib, and xmlrpclib; unforgeable
HMAC'ing AuthCookies for web session management; FTP/TLS client
and server; S/MIME; ZServerSSL: A HTTPS server for Zope and
ZSmime: An S/MIME messenger for Zope. M2Crypto can also be used to
provide SSL for Twisted.
|
|
|
|
|
| |
Package description:
Python bindings for YAML
|
|
|
|
|
|
|
| |
Package description:
YAML is a data serialization format designed for human readability and
interaction with scripting languages. LibYAML is a YAML parser and
emitter written in C.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
Package description:
AA-lib is a low level gfx library just as many other libraries
are. The main difference is that AA-lib does not require graphics
device. In fact, there is no graphical output possible. AA-lib
replaces those old-fashioned output methods with powerful ascii-
art renderer.
|
|
|
|
|
|
| |
Package description:
mytop is a console-based (non-gui) tool for monitoring the
threads and overall performance of a MySQL server.
|
|
|
|
|
|
| |
Conflicts:
testing/wput/APKBUILD
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
httpry is a specialized packet sniffer designed for displaying
and logging HTTP traffic. It is not intended to perform analysis
itself, but to capture, parse, and log the traffic for later
analysis. It can be run in real-time displaying the traffic as
it is parsed, or as a daemon process that logs to an output file.
It is written to be as lightweight and flexible as possible, so
that it can be easily adaptable to different applications.
|
|
|
|
|
|
|
|
| |
Package description:
mac-robber is a digital investigation tool that collects data
from allocated files in a mounted file system. This is useful
during incident response when analyzing a live system or when
analyzing a dead system in a lab.
|
|
|
|
| |
Package description:
|
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
Ncrack is a high-speed network authentication cracking tool. It was
built to help companies secure their networks by proactively testing
all their hosts and networking devices for poor passwords. Security
professionals also rely on Ncrack when auditing their clients. Ncrack
was designed using a modular approach, a command-line syntax similar to
Nmap and a dynamic engine that can adapt its behaviour based on network
feedback. It allows for rapid, yet reliable large-scale auditing of
multiple hosts.
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
ArpON (ARP handler inspection) is a portable handler daemon that
make ARP protocol secure in order to avoid the Man In The Middle
(MITM) attack through ARP Spoofing, ARP Cache Poisoning, ARP Poison
Routing (APR) attacks. It blocks also the derived attacks by it,
which Sniffing, Hijacking, Injection, Filtering & co attacks for
more complex derived attacks, as: DNS Spoofing, WEB Spoofing,
Session Hijacking and SSL/TLS Hijacking & co attacks.
|
| |
|
|
|
|
|
|
|
|
| |
Package description:
NBTscan is a program for scanning IP networks for NetBIOS name
information. It sends a NetBIOS status query to each address in
supplied range and lists received information in human readable
form.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
Netdiscover is an active/passive address reconnaissance tool,
mainly developed for those wireless networks without dhcp server,
when you are wardriving. It can be also used on hub/switched
networks.
Built on top of libnet and libpcap, it can passively detect
online hosts, or search for them, by actively sending arp
requests, it can also be used to inspect your network arp
traffic, or find network addresses using auto scan mode,
which will scan for common local networks.
|
| |
|
|
|
|
|
|
|
|
|
|
| |
Package description:
etherdump is an extremely small packet sniffer. It can be used to
dump raw ethernet frames for parsing (optimally with Ethereal's
text2pcap), or for viewing the network traffic of a few common
TCP/IP protocols. On a uClibc system a dynamically-linked version
is about 8kB and a statically linked version is about 30kB because
it does not depend on libpcap.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
Nebula is a network intrusion signature generator. It can help
securing a network by automatically deriving and installing
filter rules from attack traces. In a common setup, nebula
runs as a daemon and receives attacks from honeypots. Signatures
are currently published in Snort format.
The code was written to be fast. A signature is not of much value
if the generation process takes hours or days. With nebula, you
should get a first revision within a few seconds. As more attacks
of a kind are submitted, signatures get better and nebula publishes
updated revisions.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
This is RATS, a rough auditing tool for security, developed by Secure
Software Inc. It is a tool for scanning C, C++, Perl, PHP, Python
and Ruby source code and flagging common security related programming
errors such as buffer overflows and TOCTOU (Time Of Check, Time Of
Use) race conditions. As its name implies, the tool performs only a
rough analysis of source code. It will not find every error and will
also find things that are not errors. Manual inspection of your code
is still necessary, but greatly aided with this tool.
|
|
|
|
|
|
|
|
|
| |
Package description:
Flawfinder is a program that examines source code and reports
possible security weaknesses (``flaws'') sorted by risk level.
It's very useful for quickly finding and removing at least some
potential security problems before a program is widely released
to the public.
|
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
Pylint is a python tool that checks if a module satisfies a coding
standard. Pylint is similar to PyChecker but offers more features,
like checking line-code's length, checking if variable names are
well-formed according to your coding standard, or checking if
declared interfaces are truly implemented, and much more.
The big advantage with Pylint is that it is highly configurable,
customizable, and you can easily write a small plugin to add a
personal feature.
|
|
|
|
|
|
|
|
| |
Package description:
The aim of this module is to provide a common base representation
of python source code for projects such as pychecker, pyreverse,
pylint... Well, actually the development of this library is essentialy
governed by pylint's needs.
|
|
|
|
|
| |
Package description:
This package contains some modules used by differents Logilab's projects.
|
|
|
|
|
|
|
| |
Package description:
rpmlint is a tool for checking common errors in RPM packages. It can be
used to test individual packages. By default all checks are processed
but specific checks can be performed by using command line parameters.
|
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
scrub overwrites hard disks, files, and other devices with
repeating patterns intended to make recovering data from
these devices more difficult. Although physical destruction
is unarguably the most reliable method of destroying sensitive
data, it is inconvenient and costly. For certain classes of
data, organizations may be willing to do the next best thing
which is scribble on all the bytes until retrieval would
require heroic efforts in a lab.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Package description:
dc3dd is a patched version of GNU dd to include a number of
features useful for computer forensics. Many of these features
were inspired by dcfldd, but were rewritten for dc3dd.
- Pattern writes. The program can write a single hexadecimal
value or a text string to the output device for wiping purposes.
- Piecewise and overall hashing with multiple algorithms. Supports
MD5, SHA-1, SHA-256, and SHA-512.
- Progress meter with automatic input/output file size probing.
- Combined log for hashes and errors.
- Error grouping. Produces one error message for identical
sequential errors.
- Verify mode. Able to hash output files and compare hashes to
the acquisition hash.
- Ability to split the output into chunks with numerical or
alphabetic extensions.
- Ability to write multiple output files simultaneuously.
|
|
|
|
|
|
|
|
|
|
| |
Package description:
Pcapy is a Python extension module that interfaces with the libpcap
packet capture library. Pcapy enables python scripts to capture
packets on the network. Pcapy is highly effective when used in
conjunction with a packet-handling package such as Impacket, which
is a collection of Python classes for constructing and dissecting
network packets.
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|