AuthSight uses your Mac's iSight camera to take snapshots of the nut behind the keyboard whenever an invalid password is entered, either at login or in a screensaver. AuthSight can also (optionally) email photos to you.
BlazingTools Perfect Keylogger for Mac
BlazingTools Perfect Keylogger for Mac is a local and remote covert surveillance tool. It lets you monitor the people who use your computer, including their keystrokes, their IM chats, the and Web sites they visit. Screenshots of activity can be accessed by email or FTP. Mac OS X Leopard and Tiger are supported.
CiphSafe provides an easy-to-use method for storing account/password pairs as well as any general notes you wish to keep safe. It requires Mac OS X version 10.2.x, 10.3.x, or 10.4.x. It encrypts with 320-bit Blowfish, includes random password generation, and a very clean interface, and uses the system's OpenSSL for encryption.
Cocoa Packet Analyzer
Cocoa Packet Analyzer (CPA) is a native cocoa implementation of a network packet protocol analyzer. It uses libPCAP for reading packet files. For now it supports reading, analyzing, displaying and basic capturing of packets.
(shareware) Data Guardian is a secure database application with up to 448-bits of Blowfish encryption ? regardless of how sensitive your data is.
distributed.net is a client for RC5-72/OGRp2 encryption contest.
Encrypt This is a Universal Binary AppleScript application for Mac OS X 10.3 or later that takes all the files and folders you drag onto the Encrypt This icon and creates an AES 128-bit encrypted .dmg disk image file which contains those files and folders.
FiSHy is a plugin for Colloquy, providing Blowfish encryption support. You can encrypt messages you send to chat rooms or queries, and decrypt incoming messages. It also supports automatic Diffie-Hellmann key-exchanges for queries, so you can share channel-keys securely.
It fits nicely in the OS X ecosystem by saving keys in the Keychain and by using a simple Drag'n'Drop install. It is compatible with FiSH, mIRCryption and Dirt. It is a Universal Binary and works on any Mac running OS X 10.4
(commercial) FrameSeer is a network packet capture application which can capture traffic on your Ethernet, AirPort, PPPoE (eg aDSL or cable-modem), PPP (eg dial-up modem) and loopback interfaces.
GlowWorm FW Lite
GlowWorm FW Lite is a network security and monitoring application that allows the user to define a set of rules defining acceptable network behaviour on a per-address, port, and application basis. An authorization dialog alerts you when an application tries to perform an unauthorized operation on the network.
Gpg Tools allows encryption, decryption, signing and verification of documents with a graphical interface by using gpg, the Mac OS X replacement for PGP.
GU!MD5 makes it possible to have signature MD5 of one or several files in 2 clicks. GU!MD5 is very practical to check the signatures of the ISO files, or even simply to check the integrity of downloaded files.
iCrypt is an application that encrypts files using 128 bit encryption.
iDecX decode keyfiles from www.onlinetvrecorder (.otrkey) and www.onlinemusicdecoder.com (.omrkey)
logKext ia a kernel-based freeware keylogger.
Mac GNU Privacy Guard
Mac GNU Privacy Guard (Mac GPG for short) is, after a fashion, the Mac OS X port of GnuPG, licensed under the GNU GPL. The aims of the project are to make GnuPG easy to install, develop a framework to make it easy for other developers to incorporate GnuPG functionality into their applications, write services to allow for the use of GnuPG functions in most Cocoa applications, and write a Mac GPG Keys type application so that you no longer have to go to the commandline to manage your keys.
MacHash is a simple utility that uses the OpenSSL digest libraries to create the basic hash digest for files or text. Greate for verifying downloaded files or generating you first hash for a program you are writing.
MacKrack is a freeware password hash brute forcer for Mac OS X, supporting the Crypt, MD5, SHA-1, and Salted SHA-1 algorithms.
NetDumper is a simple network packet sniffer that dumps all packets to a file. Simple and plain without the overhead of any analyzer. Since it uses libPCAP it supports most expressions you are used from tcpdump.
Nmap is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Read more
OS X Rootkit Hunter
OS X Rootkit Hunter is based on rooltkit hunter. It scans for backdoors, rootkits, and local exploits.
OutguessWrapper is a small Cocoa application written in Objective-C. It acts as a GUI interface to the command-line program called outguess. Outguess is a steganographic tool that allows the insertion of hidden information into the redundant bits of data sources.
Packet Peeper is a network protocol analyzer (or `packet sniffer'). Its features include TCP stream reassembly, privilege separation, decoding of some common protocols, etc. It's a work in progress, and feedback is appreciated.
Pastor is a tool to store all your passwords, website logins, program serial numbers, etc. RC4-encrypted and password-protected. With built-in password generator.
Protection is an anti-thief software. It will help you to retrieve your Mac, by taking iSight pictures, screen capture, audio recording and IP reporting.
SSH Tunnel Manager
a tool to manage SSH Tunnels (comonly invoqued with -L and -R arguments in the console). With SSH Tunnel Manager you can setup many tunnels as you wish, each one containing many port redirections as you wish. Once tunnels are configured, all you have to do is Start, or Stop the tunnels
SSHKeychain integrates with the Apple Keychain. All key passphrases can be stored, and you can use all your keys just by unlocking the Keychain.
TCstripper is an AppleScript droplet to check if files with document file extensions (eg. MP3, PDF, JPG) contain Mac OS Type & Creator information which enables the file to execute potentially malicious code if openend by double clicking or Cmd-O in the Finder.
Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and more. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.
TrueCrypt is on-the-fly disk encryption software that can create a virtual encrypted disk within a file and mount it as a real disk. It can also encrypt an entire hard disk partition, or a storage device such as USB memory stick. It supports plausible deniability. Read more