hashdir aims to be the easiest way to hash a file/directory. This is useful when transferring files, archiving data, or detecting duplicates.
Read more
The Linux Portal Site
hashdir aims to be the easiest way to hash a file/directory. This is useful when transferring files, archiving data, or detecting duplicates.
Read more
Hash Calculator is a console tool that can calculate about 50 cryptographic hashes of strings and files.
Read more
Kapitano is a modern, user-friendly malware scanner for Linux. It’s a frontend to ClamAV.
Read more
diceware is a passphrase generator. It generates passphrases by concatenating words randomly picked from wordlists.
Read more
OTI (One Time Information) is a modern web application designed for secure, one-time information sharing.
Read more
Hashes is a simple hash algorithm identification GUI using GTK4 and Adwaita.
Read more
Hash-o-matic generates, compares and verifies MD5, SHA-256 and SHA-1 hashes.
Read more
John the Ripper is a password security auditing and password recovery tool available for many operating systems.
Read more
LaZagne is an application used to retrieve lots of passwords stored on a local computer.
Read more
Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches.
Read more
The pfSense project is a powerful open source firewall and routing platform based on FreeBSD. pfSense software includes a web interface.
Read more
When you connect to a new network, Bouncer will open a window prompting you for what kind of network (e.g. home, public, work) it is.
Read more
eddy offers simple and fast file encryption. It features concurrent file processing while ensuring data authenticity and plausible deniability.
Read more
Vaults lets you create encrypted vaults in which you can safely store files. It currently uses gocryptfs and CryFS for encryption.
Read more
Volaris GUI is a sleek and modern application designed to streamline the process of file encryption and decryption using key files.
Read more
Qccrypt is a Qt cross-platform frontend for the ccrypt command-line tool.
Read more
Vulnerability scanning is an essential activity for enterprise security. We recommend the best free and open source vulnerability detection tools.
Read more
Volaris is an encryption tool designed to prioritize privacy and security.
Read more
ccrypt is a tool for encrypting and decrypting files and streams. It is based on the Rijndael block cipher.
Read more
The Terrapin Vulnerability Scanner can be used to determine the vulnerability of an SSH client or server against the Terrapin Attack.
Read more