(Page 3 of 6)   < Prev  1 2 3 4 5 6  Next >

Category: Programming » Libraries

Smart Card ToolKit
Added 2002-12-11
by Alexandre Becoulet
Smart Card ToolKit provides a library and associated tools for smart cards. Phoenix and Smartmouse protocols are supported for ISO7816 asynchronous smart card access and debugging. JDM is supported for programming PIC-based smart cards like piccard, goldwafer (goldcard), and silvercard. SPI is supported for programming AVR based smart cards (funcard). PIC and AVR loaders provide access to external i2c EEPROM. I2c memory smart cards are also supported. All tools use Intel hex file format to store data. An Intel hex to binary and vice-versa converting tool is also provided.

Lcrzo
Added 2002-08-20
by Laurent Constantin
Network library lcrzo to sniff, spoof, create decode and display packets, convert adresses, create clients and servers, etc.

OpenSSL for Ruby
Added 2002-02-06
by Michal Rokos
The OpenSSL for Ruby project (OSSL) binds the well known OpenSSL library to the fully objective scripting language Ruby.

GNet
Added 2002-02-04
by David A. Helder, dhelder@umich.edu
GNet is a simple network library. It is object-oriented, written in C, and built upon glib. It is intended to be small, fast, easy to use and easy to port. GNet supports abstract internet addresses, TCP, UDP, IP Multicast, asynchronous DNS lookup and TCP connections. It comes with documentation and examples.

LibnetNT
Added 2001-11-22
by eEye Digital Security
Libnet for Unix is used in many of today's popular security programs because of how easy it is to implement low level packet functionality into a program. Well now that same ease of use development API is available for Windows NT platforms. LibnetNT has the exact same functionality and abilities as Libnet except LibnetNT can be used to develop low level packet injection programs on Windows NT4.0 and Windows NT5.0.

jLouiss java tracer
Added 2001-11-05
by Albrecht Kleine
jLouiss is a shared library for logging of start and return of Java methods together with their parameters and result values. Is is designed as an add-on to the JDKs 1.2, 1.3, and 1.4 by various vendors. The tracer output can be controlled by using regular expressions. jLouiss is designed on the JDK JVMDI interface (older releases used the JIT interface).

Modular Controller Architecture
Added 2001-10-22
by Quams
Modular Controller Architecture us a modular, network-transparent, realtime capable C/C++ framework for controlling robots and other kind of hardware. The main plattform is Linux/RTLinux, but support for Win32 and Solaris also exists.

distribuNet
Added 2001-10-22
by Arshan Dabirsiaghi
distribuNet is a mid-level statically linked C library for cross-platform distributed networking applications. The library operates almost exactly like th Berkeley socket libraries that it wraps. The library has been compiled and tested on Linux 2.2 and Linux 2.0 with g++. All programs built with the library must use g++ as well, since it takes advantage of some of the C++ gcc modules.

msystem
Added 2001-10-22
by Matt Bishop
The file msystem.c contains a version of system(3), popen(3), and pclose(3) that provide considerably more security than the standard C functions. They are named msystem, mpopen, and mpclose, respectively. While I don't guarantee them to be PERFECTLY secure, they do constrain the environment of the child quite tightly, tightly enough to close the obvious holes.

Trustfile
Added 2001-10-22
by Matt Bishop
Define a "trusted" file to be one that can be altered only by a set of trusted users. Race conditions that involve file accesses in UNIX programs occur because the program attempts to perform two sequential actions on one file and that file is not trusted; so, an attacker can alter the file between the two operations. If the program knew the file were not trusted, it could take some action to prevent (or warn about) the problem. That's what this library allows it to determine. The file trustfile.c contains a function trustfile(3) that takes a file name and a set of users designted as trusted. It then indicates whether the file is "trusted" in the sense defined earlier.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus