Newbies What Next ? News Forums Calendar
Home | YouTube | Register | News | Forums | Portal Pages | MyLinks | New | Hot | Link Us


 Category Gateway
More Options

LinuxLinks News
 · 9 Excellent Open Source Configuration Management Applications
 · A Beginner’s Introduction to Linux
 · Simon Tatham’s Portable Puzzle Collection – Games for the Brain
 · Captain Holetooth – Explorative 2D Platform Game for Kids
 · Taisei – A Classy, Frenetic Shoot’em Up Game in the Style of The Touhou Project
 · YouTube Channel
 · Minilens – Fun Open Source Puzzle Platform Game
 · Wizznic! – Highly Addictive Open Source Puzzle Game
 · Success! Beelink S1 Running Linux – Courtesy of the Open Source Community
 · Beelink S1 Mini PC and Linux – Comedy Gold


Latest Links

Top : Java : Networking : Security

9 Excellent Open Source Configuration Management Applications
This software automates the configuration of machines to a particular state. Like any other tools, they are designed to solve specific problems in certain ways. The goal is to get a system from whatever state it is in, into the desired state. Configuration management software are the tools of choice for many system administrators and devops professionals.

(Read more)
jEdit is a powerful, easy to use, extensible text editor. Read more


  • Access Road
    Access Road will help to model and to learn about the access rights in complex information systems, by the mean of user-friendly and powerful diagrams. It is a software in Java with a GPL license.
  • Antsp2p
    protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others. Supports torrent downloads & auto-resume
  • Apktool
    Apktool is a tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications. It also makes working with an app easier because of the project like file structure and automation of some repetitive tasks like building apk, etc.
  • Armitage
    Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework.
  • AuthenticRoast
    AuthenticRoast allows you to build highly flexible authentication mechanisms for the Java Web tier. This can be anything from HTTP Basic authentication to authenticating with openid, facebook, or your company's Kerberos setup. The authentication modules can be combined at will and even changed at runtime.
  • BlackHole
    BlackHole is an data de-duplicating network block device that also supports mirroring, snapshots, and support for multiple LUNs using the same data store.
  • Burp intruder
    a tool to facilitate automated attacks against web-enabled applications. It is not a point-and-click tool: using burp intruder effectively requires a detailed knowledge of the target application, and an understanding of the HTTP protocol
  • Burp suite
    Burp suite is an integrated platform for attacking web applications. It contains all of the burp tools (proxy, spider, intruder and repeater) with numerous interfaces between them designed to facilitate and speed up the process of attacking a web application. All plugins share the same robust framework for handling HTTP requests, authentication, downstream proxies, logging, alerting and extensibility.
  • Cryptix
    a cleanroom implementation of Sun's Java Cryptography Extensions (JCE) version 1.1. In addition to that it contains the Cryptix Provider which delivers a wide range of algorithms and support for PGP 2.x. Cryptix 3 runs on both JDK 1.1 and JDK 1.2 (Java 2)
  • Digital Invisible Ink Toolkit
    This project provides a simple Java-based steganography tool that can hide a message inside a 24-bit colour image so that knowing how it was embedded, or performing statistical analysis, does not make it any easier to find the concealed information.
  • Fast MD5 Implementation in Java
    a heavily optimized implementation of the MD5 hashing algorithm written in Java. It includes an optional native method for even greater speed improvements
  • FlexiCA
    FlexiCA is a certification authority tool. It is implemented using Java and the Eclipse Rich Client Platform. FlexiCA is extensible and supports RSA, DSA, and Elliptic Curve cryptography out of the box. Other crypto-systems may be added easily, if ASN.1 structures for encoding are available. All cryptographic functions are provided by FlexiProvider.
  • FlexiCrypt
    FlexiCrypt is a universal cryptography toolkit for managing certificates and symmetric keys. It can perform many kinds of encryption, decryption, signing, and several related tasks.
  • Ganzua
    Ganzua is a cryptanalysis tool for monoalphabetic and polyalphabetic ciphers that can work with almost any set of characters.
  • jad
    jad is a Java decompiler.
  • javasnoop
    javasnoop is a tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer.
  • jBCrypt
    jBCrypt is a Java implementation of OpenBSD's Blowfish password hashing code, as described in "A Future-Adaptable Password Scheme" by Niels Provos and David Mazières. This system hashes passwords using a version of Bruce Schneier's Blowfish block cipher, with modifications designed to raise the cost of off-line password cracking and frustrate fast hardware implementation.
  • JCSI Kerberos
    JCSI Kerberos is a pure Java implementation of the Kerberos protocol. It allows developers to integrate Kerberos functionality for authentication and single sign-on with Microsoft's Active Directory and MIT Kerberos servers into their applications. JCSI Kerberos is now part of Vintela Single Sign-On for Java (VSJ).
  • jEnkryptor
    jEnkryptor is a Java Swing based, multi-threaded cross-platform encryption application. It uses the WizCrypt engine.
  • jFileCrypt
    jFileCrypt encrypts and decrypts files and directories very fast and very secure. It is written in Java 5 and uses the JCE, it supports the following algorithms: Blowfish, DES, 3DES, AES and RC4.
  • JMap Port Scanner
    JMap is a Java network port scanner, a security tool to identify open ports on any host or network subnet. It features the ability to scan every host in a given network segment for a range of ports or a specific service. Both TCP and UDP are supported.
  • JMd5Sum
    JMd5Sum is a GUI MD5/SHA digest generator. It allows you to calculate an MD5 sum or SHA1 sum for any file to ensure that your download has worked correctly.
  • JMiddleMan
    JMiddleMan will be an application vulnerability tool based on EXProxy HTTP/HTTPS proxy server library and on an expert system. It can be use in a passive way in order to preserve the targeted server. It aims to help security experts to detect security vulnerabilities
  • JSummer
    JSummer is a tool to compute and check MD5, SHA-160, and SHA-256 message digest. There are console and GUI (SWT) versions. It features calculation of MD5, SHA160, and SHA256 message digest, recursion of directories, and checking of MD5, SHA160, and SHA256 message digest.
  • JWepGen
    JWepGen is a simple interface to generate WEP keys that work with the standard WEP generators used by many wireless access point manufacturers.
  • JWScan
    JWScan is a reverse engineering tool that tells you if your PE file was packed by a Jar-To-EXE wrapper tool.
  • Maltego
    Maltego is proprietary software used for open-source intelligence and forensics, developed by Paterva. Maltego focuses on providing a library of transforms for discovery of data from open sources, and visualizing that information in a graph format, suitable for link analysis and data mining.
  • md5i
    creates an MD5 database of all files in a directory structure, and then allows you to easily recheck the contents of the directory and notify you if any files has changed
  • NoNox
    NoNox watches log files for events such as "failed password". When such a pattern is seen several times within a specified time period (for example, 4 failed login attempts within 10 minutes) from the same source, NoNox can execute a command to mitigate the behavior, notify someone, or make a record of the event (or all these things). The supplied configuration file shows how to detect repeated failed logins and (if iptables is installed and running) how to add a new rule that instantly blocks a malicious host that's trying to break in.
  • PGPSigner
    PGPSigner helps you to manage, sign, and send out PGP keys after a PGP/GPG key signing event. This application uses strong cryptography.
  • RvSnoop
    RvSnoop is a Swing based GUI that provides developers and operations support personnel with a sophisticated, feature-rich, interface for tracing TIBCO Rendezvous" messages.
  • Security Filter
    a Java Servlet Filter that mimics container managed security. It looks just like container managed security to your app, as you can call request.getRemoteUser(), equest.isUserInRole(), and request.getUserPrincipal() and get valid responses
  • SelekTOR
    SelekTOR for Linux is an open source Java based GUI frontend for Tor running in client mode, it acts as a Tor launcher and exit node chooser for browsers that support system proxying using PAC files, it is licensed under the GPL2.
  • SigTranslator
    SigTranslator is a project able to translate IDS signatures e.g. from Snort rules to Dragon rules and vice versa, as well as the common signatures standard (CIDSS - Common Intrusion Detection Signatures Standard).
  • SSHVnc
    SSHVnc is a standalone Java VNC viewer that secures VNC access by integrating the popular TightVNC viewer with the SSHTools Java SSH API. It features a clean and easy to use interface, simplifying the complicated processes currently used to secure the VNC protocol through SSH port forwarding.
  • ThreadFix
    ThreadFix is a software vulnerability aggregation and management system that helps organizations aggregate vulnerability data, generate virtual patches, and interact with software defect tracking systems.
  • TruPax
    TruPax is a utility for applying the TrueCrypt encryption solution. It offers you a convenient way to transfer arbitrary numbers of files and directories into a new volume file. The size of the final container will be exactly that of the space needed.
  • WizCrypt
    WizCrypt is a cross-platform encryption tool. It requires no configuration, uses industry standard RC4 and MD5 encryption, and can be used in scripts for batch operation.
  • Zed Attack Proxy
    The Zed Attack Proxy (ZAP) is a penetration test tool designed to be used to make Web applications more secure. While ZAP can detect some security issues automatically, it is primarily designed to help you find security vulnerabilities manually.
  • ZedLog
    ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data.

Matching Content

Share this Page
Bookmark and Share
Submit this page to popular social networks such as Digg, Twitter, StumbleUpon and more.

My LinuxLinks
  • Bookmarked links
  • Emailed Newsletter
  • Your own profile

  • Top Applications
    100 Essential Apps
    All Group Tests

    Top Free Software
    5 Office Suites
    3 Lean Desktops
    7 Document Processors
    4 Distraction Free Tools
    9 Project Management
    4 Business Solutions
    9 Groupware Apps
    14 File Managers
    10 Databases
    21 Backup Tools
    21 Productivity Tools
    5 Note Taking Apps
    9 Terminal Emulators
    21 Financial Tools
    5 Bitcoin Clients
    21 Text Editors
    21 Video Emulators
    21 Home Emulators
    42 Graphics Apps
    6 CAD Apps
    42 Scientific Apps
    10 Web Browsers
    42 Email Apps
    12 Instant Messaging
    10 IRC Clients
    7 Twitter Clients
    12 News Aggregators
    11 VoIP Apps
    42 Best Games
    9 Steam Games
    42 Audio Apps
    5 Music Streaming
    42 Video Apps
    5 YouTube Tools
    80 Security Apps
    9 System Monitoring
    8 Geometry Apps
    Free Console Apps
    14 Multimedia
    4 Audio Grabbers
    9 Internet Apps
    3 HTTP Clients
    5 File Managers
    8 Compilers
    9 IDEs
    9 Debuggers
    7 Revision Control Apps
    6 Doc Generators
    Free Web Software
    21 Web CMS
    14 Wiki Engines
    8 Blog Apps
    6 eCommerce Apps
    5 Human Resource Apps
    10 ERP
    10 CRM
    6 Data Warehouse Apps
    8 Business Intelligence
    6 Point-of-Sale

    Other Articles
    Migrating from Windows
    Back up your data
    20 Free Linux Books
    24 Beginner Books
    12 Shell Scripting Books

    Web Calendar
    Linux Licenses

    Advertise at


    Add Link | Modify Link | About | FAQ | Guide | Privacy | Awards | Contact |
    Portal Version 0.7. Intel Blade.
    Comments to the webmaster are welcome.
    Copyright 2009 All rights reserved.