Martin Hauke's avatar

You are behind a proxy. You can modify other data related to your profile by this link.

Martin Hauke's avatar

Martin Hauke

mnhauke

Involved Projects and Packages
Maintainer

Portable Computing Language (pocl) aims to become a MIT-licensed open source
implementation of the OpenCL standard which can be easily adapted for new targets
and devices, both for homogeneous CPU and heterogenous GPUs/accelerators.

pocl uses Clang as an OpenCL C frontend and LLVM for the kernel compiler
implementation, and as a portability layer. Thus, if your desired target
has an LLVM backend, it should be able to get OpenCL support easily by using pocl.

The goal is to accomplish improved performance portability using a kernel
compiler that can generate multi-work-item work-group functions that exploit
various types of parallel hardware resources: VLIW, superscalar, SIMD, SIMT,
multicore, multithread ...

Additional purpose of the project is to serve as a research platform for
issues in parallel programming on heterogeneous platforms.

Maintainer

It focuses on different areas of WiFi security:

* Monitoring: Packet capture and export of data to text files for further processing by third party tools
* Attacking: Replay attacks, deauthentication, fake access points and others via packet injection
* Testing: Checking WiFi cards and driver capabilities (capture and injection)
* Cracking: WEP and WPA PSK (WPA 1 and 2)

All tools are command line which allows for heavy scripting. A lot of GUIs have taken advantage of this feature.

Maintainer

NDPMon, Neighbor Discovery Protocol Monitor, is a tool working with ICMPv6 packets. NDPMon observes the local network to see if nodes using neighbor discovery messages behave properly. When it detects a suspicious Neighbor Discovery message, it notifies the administrator by writing in the syslog and in some cases by sending an email report.

Maintainer

ssh-audit is a tool for ssh server auditing.

Features:
* SSH1 and SSH2 protocol server support;
* grab banner, recognize device or software and operating system, detect compression;
* gather key-exchange, host-key, encryption and message authentication code algorithms;
* output algorithm information (available since, removed/disabled, unsafe/weak/legacy, etc);
* output algorithm recommendations (append or remove based on recognized software version);
* output security information (related issues, assigned CVE list, etc);
* analyze SSH version compatibility based on algorithm information;
* historical information from OpenSSH, Dropbear SSH and libssh;
* no dependencies, compatible with Python 2.6+, Python 3.x and PyPy;

Maintainer

A complete tool set to attack the inherent protocol weaknesses of IPV6 and ICMP6, and includes an easy to use packet factory library.

The THC IPV6 ATTACK TOOLKIT comes already with lots of effective attacking tools:
- parasite6: icmp neighbor solitication/advertisement spoofer, puts you as man-in-the-middle, same as ARP mitm (and parasite)
- alive6: an effective alive scanng, which will detect all systems listening to this address
- dnsdict6: parallized dns ipv6 dictionary bruteforcer
- fake_router6: announce yourself as a router on the network, with the highest priority
- redir6: redirect traffic to you intelligently (man-in-the-middle) with a clever icmp6 redirect spoofer
- toobig6: mtu decreaser with the same intelligence as redir6
- detect-new-ip6: detect new ip6 devices which join the network, you can run a script to automatically scan these systems etc.
- dos-new-ip6: detect new ip6 devices and tell them that their chosen IP collides on the network (DOS).
- trace6: very fast traceroute6 with supports ICMP6 echo request and TCP-SYN
- flood_router6: flood a target with random router advertisements
- flood_advertise6: flood a target with random neighbor advertisements
- fuzz_ip6: fuzzer for ipv6
- implementation6: performs various implementation checks on ipv6
- implementation6d: listen daemon for implementation6 to check behind a FW
- fake_mld6: announce yourself in a multicast group of your choice on the net
- fake_mld26: same but for MLDv2
- fake_mldrouter6: fake MLD router messages
- fake_mipv6: steal a mobile IP to yours if IPSEC is not needed for authentication
- fake_advertiser6: announce yourself on the network
- smurf6: local smurfer
- rsmurf6: remote smurfer, known to work only against linux at the moment
- exploit6: known ipv6 vulnerabilities to test against a target
- denial6: a collection of denial-of-service tests againsts a target
- thcping6: sends a hand crafted ping6 packet
- sendpees6: a tool by willdamn@gmail.com, which generates a neighbor solicitation requests with a lot of CGAs (crypto stuff ;-) to keep the CPU busy. nice.

Maintainer

Graphical certification authority is an interface for managing RSA keys and certificates, and the creation and signing of PKCS#10 requests. It uses the OpenSSL library and a Berkeley DB for key and certificate storage. It supports importing and exporting keys and PEM DER PKCS8 certificates, signing and revoking of PEM DER PKCS12, and the selection of x509v3 extensions. A tree view of certificates is presented.

Extract all forensic interesting information from Firefox,
Iceweasel and Seamonkey browsers.
Works in command line interface, so information dumps could be
redirected by pipes with tools such as grep, awk, cut, sed...
Dumpzilla allows to visualize following sections, search
customization and extract certain content.

Features:
* Cookies + DOM Storage (HTML 5).
* User preferences (Domain permissions, Proxy settings...).
* Downloads.
* Web forms (Searches, emails, comments..).
* Historial.
* Bookmarks.
* Cache HTML5 Visualization / Extraction (Offline cache).
* visited sites "thumbnails" Visualization / Extraction .
* Addons / Extensions and used paths or urls.
* Browser saved passwords.
* SSL Certificates added as a exception.
* Session data (Webs, reference URLs and text used in forms).
* Visualize live user surfing, Url used in each tab or window
and use of forms.

Maintainer

A tool to get information of PE32/PE32+ executables (EXE, DLL, OCX
...) like headers, sections, resources and more.

Maintainer

Age features small explicit keys, no config options, and UNIX-style
composability.

mongo-c-driver is a library for building high-performance applications that communicate with the MongoDB NoSQL database in the C language. It can also be used to write fast client implementations in languages such as Python, Ruby, or Perl.

Maintainer

A tool to collect DNS records passively to aid Incident handling, Network
Security Monitoring (NSM) and general digital forensics.

PassiveDNS sniffes traffic from an interface or reads a pcap-file and outputs
the DNS-server answers to a log file. PassiveDNS can cache/aggregate duplicate
DNS answers in-memory, limiting the amount of data in the logfile without
loosing the essens in the DNS answer.

Maintainer

A fast and lightweight USENET newsreader.

Maintainer

Cancel locks are used by Usenet article posters to authenticate their
authorship of an article. It may then by used by servers to prevent
cancel and supersede abuse. The use of this feature remains the
newsmaster's decision.

This library may be used for both the generation and the verification
of cancel locks.

Maintainer

mcds is a command line tool primarily used as a search query plugin
for mutt to query a carddav server.

Maintainer

System an network monitoring software.

Maintainer

cpustat periodically reports the current CPU utilization of running tasks and
can optionally report per CPU and per task utilization statistics at the end
of a run.
cpustat has been designed and optimized to use a minimal amount of CPU cycles
to monitor a system hence it is a light weight alternative to traditional
process monitoring tools such as top.

Eventstat periodically dumps out the current kernel event state.It keeps track
of current events and outputs the change in events on each output update.
The tool requires sudo to run since it needs to write to /proc/timer_stats to
start and stop the event monitoring.

Fnotifystat periodically dumps out the activity on files in the system. It can
be used to identify rogue file activity and discover which processes are
performing open/close/read/write operations on the files.

Forkstat monitors process fork(), exec() and exit() activity. It is useful for
monitoring system behaviour and to track down rogue processes that are spawning
off processes and potentially abusing the system.

Health-check monitors processes and optionally their child
processes and threads for a given amount of time. At the end
of the monitoring it will display the CPU time used, wakeup
events generated and I/O operations of the given processes.
It can be used to diagnose unhealthy bad processes.

Maintainer

Kcollectd is a graphical KDE-frontend to collectd that allows to view RRD files
that have been created by collectd.
It allows to easily navigate in the data with the mouse and can be used as a
chart recorder.

openSUSE Build Service is sponsored by