HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"count": 51622,
"next": "https://ports.macports.org/api/v1/ports/?format=api&ordering=-created_at&page=548",
"previous": "https://ports.macports.org/api/v1/ports/?format=api&ordering=-created_at&page=546",
"results": [
{
"name": "yubico-pam",
"portdir": "security/yubico-pam",
"version": "2.27",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/Yubico/yubico-pam",
"description": "PAM module to authenticate against a YubiKey validation server or via challenge-response against a local YubiKey",
"long_description": "The Yubico PAM module provides an easy way to integrate the YubiKey into your existing user authentication infrastructure. The module can be configured to validate YubiKeys against Yubico's YubiCloud infrastructure, a custom YubiKey validation server or it can be used for offline authentication with newer YubiKeys supporting a challenge-response protocol.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "cal",
"github": "neverpanic",
"ports_count": 56
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-17",
"docbook-xsl-nons",
"libxslt",
"autoconf",
"automake",
"libtool",
"pkgconfig",
"asciidoc"
]
},
{
"type": "lib",
"ports": [
"yubico-c-client",
"ykpers"
]
}
],
"depends_on": []
},
{
"name": "yubico-c-client",
"portdir": "security/yubico-c-client",
"version": "2.15",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/Yubico/yubico-c-client",
"description": "C library to validate a YubiKey OTP against a validation server",
"long_description": "Library to validate YubiKey one-time-passwords against online validation servers, such as the Yubico YubiCloud.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "cal",
"github": "neverpanic",
"ports_count": 56
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-17",
"pkgconfig",
"help2man",
"autoconf",
"automake",
"libtool"
]
},
{
"type": "lib",
"ports": [
"libyubikey",
"curl"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"yubico-pam"
]
}
]
},
{
"name": "ykpers",
"portdir": "security/ykpers",
"version": "1.20.0",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://developers.yubico.com/yubikey-personalization/",
"description": "Easily personalize Yubico's USB keys.",
"long_description": "Yubico's USB keys (called Yubikeys) need to be personalized. This project's purpose is to create a library that makes this an easy task.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "cal",
"github": "neverpanic",
"ports_count": 56
},
{
"name": "snc",
"github": "nerdling",
"ports_count": 157
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"libyubikey"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"KeePassXC",
"KeePassXC-devel",
"yubico-pam"
]
}
]
},
{
"name": "py39-yara",
"portdir": "security/yara",
"version": "4.5.4",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/VirusTotal/yara-python",
"description": "yara bindings for python 3.9",
"long_description": "Malware identification and classification tool. This subport provides bindings for python 3.9",
"active": false,
"categories": [
"security",
"python"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"py39-setuptools",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"python39",
"yara"
]
}
],
"depends_on": []
},
{
"name": "py38-yara",
"portdir": "security/yara",
"version": "4.5.1",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/VirusTotal/yara-python",
"description": "yara bindings for python 3.8",
"long_description": "Malware identification and classification tool. This subport provides bindings for python 3.8",
"active": false,
"categories": [
"security",
"python"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"py38-setuptools",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"python38",
"yara"
]
}
],
"depends_on": []
},
{
"name": "py37-yara",
"portdir": "security/yara",
"version": "4.4.0",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/VirusTotal/yara-python",
"description": "yara bindings for python 3.7",
"long_description": "Malware identification and classification tool. This subport provides bindings for python 3.7",
"active": false,
"categories": [
"security",
"python"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"py37-setuptools",
"clang-15"
]
},
{
"type": "lib",
"ports": [
"python37",
"yara"
]
}
],
"depends_on": []
},
{
"name": "py36-yara",
"portdir": "security/yara",
"version": "4.0.4",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/VirusTotal/yara-python",
"description": "yara bindings for python 3.6",
"long_description": "Malware identification and classification tool. This subport provides bindings for python 3.6",
"active": false,
"categories": [
"security",
"python"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0",
"py36-setuptools"
]
},
{
"type": "lib",
"ports": [
"python36",
"yara"
]
}
],
"depends_on": []
},
{
"name": "py35-yara",
"portdir": "security/yara",
"version": "4.0.4",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/VirusTotal/yara-python",
"description": "yara bindings for python 3.5",
"long_description": "Malware identification and classification tool. This subport provides bindings for python 3.5",
"active": false,
"categories": [
"security",
"python"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0",
"py35-setuptools"
]
},
{
"type": "lib",
"ports": [
"python35",
"yara"
]
}
],
"depends_on": []
},
{
"name": "py27-yara",
"portdir": "security/yara",
"version": "4.0.4",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/VirusTotal/yara-python",
"description": "yara bindings for python 2.7",
"long_description": "Malware identification and classification tool. This subport provides bindings for python 2.7",
"active": false,
"categories": [
"security",
"python"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0",
"py27-setuptools"
]
},
{
"type": "lib",
"ports": [
"python27",
"yara"
]
}
],
"depends_on": []
},
{
"name": "yara",
"portdir": "security/yara",
"version": "4.5.5",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/VirusTotal/yara",
"description": "Malware identification and classification tool",
"long_description": "YARA is a tool aimed at helping malware researchers to identify and classify malware samples.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"autoconf",
"automake",
"libtool",
"pkgconfig"
]
},
{
"type": "lib",
"ports": [
"jansson",
"openssl",
"pcre",
"protobuf-c",
"libmagic"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"py27-yara",
"py35-yara",
"py36-yara",
"py311-yara",
"py310-yara",
"py312-yara",
"py313-yara",
"py314-yara",
"py38-yara",
"py39-yara",
"py37-yara"
]
}
]
},
{
"name": "xmltooling",
"portdir": "security/xmltooling",
"version": "3.2.4",
"license": "Apache-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.shibboleth.net",
"description": "XMLTooling library for C++",
"long_description": "Toolkit for security-aware XML processing",
"active": true,
"categories": [
"textproc",
"security",
"shibboleth",
"xml"
],
"maintainers": [
{
"name": "snc",
"github": "nerdling",
"ports_count": 157
},
{
"name": "scantor",
"github": "scantor",
"ports_count": 6
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"boost176",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"xml-security-c",
"zlib",
"xercesc3",
"log4shib",
"openssl",
"curl"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"opensaml",
"shibboleth",
"wt"
]
}
]
},
{
"name": "xmlsec",
"portdir": "security/xmlsec",
"version": "1.3.10",
"license": "MIT",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.aleksey.com/xmlsec/",
"description": "XML Security Library is a C library based on LibXML2.",
"long_description": "XML Security Library is a C library based on LibXML2.. The library supports major XML security standards. XML Signature, XML Encryption, Canonical XML and Exclusive Canonical XML.",
"active": true,
"categories": [
"devel",
"textproc",
"security"
],
"maintainers": [
{
"name": "mps",
"github": "Schamschula",
"ports_count": 1391
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"libgcrypt",
"libtool",
"nspr",
"gnutls",
"nss",
"libxml2",
"libxslt",
"openssl",
"icu"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"py27-xmlsec",
"py36-xmlsec",
"qore-xmlsec-module",
"py311-xmlsec",
"py310-xmlsec",
"py313-xmlsec",
"py312-xmlsec",
"py314-xmlsec",
"py38-xmlsec",
"libreoffice",
"py39-xmlsec",
"oath-toolkit"
]
}
]
},
{
"name": "xml-security-c",
"portdir": "security/xml-security-c",
"version": "2.0.4",
"license": "Apache-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://santuario.apache.org/",
"description": "XML Signing/Encryption for C++",
"long_description": "The C++ library is an implementation of the XML Digital Signature specification. It is designed to be easily ported to new platforms, and has been tested on Solaris, Linux, FreeBSD, NetBSD and Windows.",
"active": true,
"categories": [
"textproc",
"security",
"shibboleth",
"xml"
],
"maintainers": [
{
"name": "snc",
"github": "nerdling",
"ports_count": 157
},
{
"name": "scantor",
"github": "scantor",
"ports_count": 6
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"openssl",
"xercesc3"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"opensaml",
"shibboleth",
"xmltooling",
"wt"
]
}
]
},
{
"name": "xca",
"portdir": "security/xca",
"version": "2.9.0",
"license": "Permissive",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.hohnstaedt.de/xca/",
"description": "X Certificate and Key management",
"long_description": "XCA is a CA & PKI management tool that supports creating and managing X.509 certificates, certificate requests, RSA, DSA and EC private keys, Smartcards and CRLs.",
"active": true,
"categories": [
"security",
"crypto"
],
"maintainers": [],
"variants": [
"debug",
"RemoteSQL"
],
"dependencies": [
{
"type": "build",
"ports": [
"cmake",
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"qt5-qtmacextras",
"qt5-qtmultimedia",
"qt5-qttools",
"qt5-qtbase",
"qt5-sqlite-plugin",
"libtool",
"openssl11",
"qt5-qttranslations",
"qt5-qtdeclarative",
"qt5-qtsvg"
]
}
],
"depends_on": []
},
{
"name": "vsh",
"portdir": "security/vsh",
"version": "0.14.0",
"license": "MIT",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/fishi0x01/vsh",
"description": "HashiCorp Vault interactive shell and cli tool",
"long_description": "vsh is a HashiCorp Vault interactive shell and cli tool. It comes with multiple common operations and treats paths like directories and files.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1044
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "voms",
"portdir": "security/voms",
"version": "2.0.9",
"license": "Apache-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/italiangrid/voms",
"description": "create a proxy with VOMS extensions",
"long_description": "The voms-proxy-init generates a proxy with the VOMS information included in a non-critical extension.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "okoeroo",
"github": "",
"ports_count": 2
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"openssl",
"expat"
]
}
],
"depends_on": []
},
{
"name": "volatility",
"portdir": "security/volatility",
"version": "2.6.1",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": "volatility3",
"homepage": "https://www.macports.org",
"description": "Obsolete port, replaced by volatility3",
"long_description": "This port has been replaced by volatility3.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "extract",
"ports": [
null
]
},
{
"type": "fetch",
"ports": [
null
]
},
{
"type": "lib",
"ports": [
null
]
},
{
"type": "patch",
"ports": [
null
]
},
{
"type": "run",
"ports": [
null
]
},
{
"type": "test",
"ports": [
null
]
}
],
"depends_on": []
},
{
"name": "vcs_blackbox",
"portdir": "security/vcs_blackbox",
"version": "2.0.0",
"license": "BSD",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/StackExchange/blackbox",
"description": "Safely store secrets in git/hg/svn repos using GPG encryption",
"long_description": "Storing secrets such as passwords, certificates and private keys in Git/Mercurial/SubVersion is dangerous. Blackbox makes it easy to store secrets safely using GPG encryption. They can be easily decrypted for editing or use in production.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "tal",
"github": "",
"ports_count": 1
},
{
"name": "audvare",
"github": "Tatsh",
"ports_count": 25
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-17"
]
}
],
"depends_on": []
},
{
"name": "vault",
"portdir": "security/vault",
"version": "1.21.0",
"license": "Commercial and Permissive",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.vaultproject.io",
"description": "A Tool for Managing Secrets",
"long_description": "HashiCorp Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault handles leasing, key revocation, key rolling, and auditing. Through a unified API, users can access an encrypted Key/Value store and network encryption-as-a-service, or generate AWS IAM/STS credentials, SQL/NoSQL databases, X.509 certificates, SSH credentials, and more.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1044
}
],
"variants": [
"ui"
],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
},
{
"type": "fetch",
"ports": [
"git"
]
}
],
"depends_on": []
},
{
"name": "usign-devel",
"portdir": "security/usign-devel",
"version": "20190920",
"license": "ISC",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://openwrt.org/docs/guide-user/security/keygen#generate_usign_key_pair",
"description": "OpenWrt signature verification utility",
"long_description": "OpenWrt signature verification utility",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "l2dy",
"github": "l2dy",
"ports_count": 97
}
],
"variants": [
"debug",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"cmake",
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "unhash",
"portdir": "security/unhash",
"version": "1.1",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.dxp2532.info/",
"description": "brute force attack against MD5 or SHA1 hashes",
"long_description": "UnHash is a program that tries a brute force attack against a given hash. The hash can be MD5 or SHA1, and the program will auto-detect which one is given.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"openssl"
]
}
],
"depends_on": []
},
{
"name": "trivy",
"portdir": "security/trivy",
"version": "0.69.3",
"license": "Apache-2",
"platforms": "darwin linux freebsd",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/aquasecurity/trivy",
"description": "A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI",
"long_description": "A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI. Trivy detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn, etc.). Trivy is easy to use. Just install the binary and you're ready to scan. All you need to do for scanning is to specify a target such as an image name of the container.",
"active": true,
"categories": [
"sysutils",
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1044
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"goreleaser",
"clang-18"
]
},
{
"type": "fetch",
"ports": [
"git"
]
}
],
"depends_on": []
},
{
"name": "tripwire",
"portdir": "security/tripwire",
"version": "2.4.3.7",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/Tripwire/tripwire-open-source",
"description": "integrity assurance and intrusion detection tool",
"long_description": "Tripwire software is a tool that checks to see what has changed on your system. The program monitors key attributes of files that should not change, including binary signature, size, expected change of size, etc. Tripwire is originally known as an intrusion detection tool, but can be used for many other purposes such as integrity assurance, change management, policy compliance and more.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"anacron",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"openssl"
]
}
],
"depends_on": []
},
{
"name": "tor-devel",
"portdir": "security/tor-devel",
"version": "0.4.8.13",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.torproject.org/",
"description": "anonymizing overlay network for TCP",
"long_description": "Tor provides a distributed network of servers (onion routers). Users bounce their TCP streams (web traffic, FTP, SSH, etc.) around the routers. This makes it hard for recipients, observers, and even the onion routers themselves to track the source of the stream.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"zlib",
"libevent",
"openssl3"
]
}
],
"depends_on": []
},
{
"name": "tor",
"portdir": "security/tor",
"version": "0.4.8.17",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.torproject.org/",
"description": "anonymizing overlay network for TCP",
"long_description": "Tor provides a distributed network of servers (onion routers). Users bounce their TCP streams (web traffic, FTP, SSH, etc.) around the routers. This makes it hard for recipients, observers, and even the onion routers themselves to track the source of the stream.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [
{
"name": "i0ntempest",
"github": "i0ntempest",
"ports_count": 268
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"zlib",
"libevent",
"openssl3"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"Vidalia",
"py310-torrequest",
"py311-torrequest",
"py313-torrequest",
"py314-torrequest",
"py312-torrequest",
"py38-torrequest",
"py39-torrequest"
]
},
{
"type": "run",
"ports": [
"onioncat"
]
}
]
},
{
"name": "tinyca2",
"portdir": "security/tinyca2",
"version": "0.7.5",
"license": "GPL-2+",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "https://salsa.debian.org/cpt_nemo-guest/tinyca",
"description": "GUI Certificate Authority tool.",
"long_description": "TinyCA is a simple graphical user interface for managing a small CA (Certification Authority). TinyCA works as a frontend for openssl.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [
"perl5_28",
"perl5_30",
"perl5_32",
"perl5_34"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-16"
]
},
{
"type": "lib",
"ports": [
"zip",
"gettext",
"openssl",
"p5.34-gtk2",
"p5.34-locale-gettext"
]
}
],
"depends_on": []
},
{
"name": "tfsec",
"portdir": "security/tfsec",
"version": "1.28.14",
"license": "MIT",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/tfsec/tfsec",
"description": "Security scanner for your Terraform code",
"long_description": "Security scanner for your Terraform code. tfsec uses static analysis of your Terraform templates to spot potential security issues.",
"active": true,
"categories": [
"sysutils",
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1044
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-17"
]
}
],
"depends_on": []
},
{
"name": "tcpcrypt-devel",
"portdir": "security/tcpcrypt-devel",
"version": "0.5",
"license": "BSD",
"platforms": "darwin freebsd",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/scslab/tcpcrypt",
"description": "encrypt (almost) all of your network traffic",
"long_description": "Tcpcrypt is a protocol that attempts to encrypt (almost) all of your network traffic. Unlike other security mechanisms, Tcpcrypt works out of the box: it requires no configuration, no changes to applications, and your network connections will continue to work even if the remote end does not support Tcpcrypt, in which case connections will gracefully fall back to standard clear-text TCP. Install Tcpcrypt and you'll feel no difference in your every day user experience, but yet your traffic will be more secure and you'll have made life much harder for hackers.",
"active": true,
"categories": [
"security",
"www"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"openssl"
]
}
],
"depends_on": []
},
{
"name": "stunnel",
"portdir": "security/stunnel",
"version": "5.78",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.stunnel.org/",
"description": "SSL tunneling program",
"long_description": "Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [
{
"name": "mps",
"github": "Schamschula",
"ports_count": 1391
}
],
"variants": [
"openssl1",
"openssl3",
"libwrap",
"mimalloc",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"tcp_wrappers",
"openssl3"
]
}
],
"depends_on": []
},
{
"name": "step-cli",
"portdir": "security/step-cli",
"version": "0.29.0",
"license": "Apache-2",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/smallstep/cli",
"description": "A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.",
"long_description": "step is a toolkit for working with your public key infrastructure (PKI). It's also the client counterpart to the step-ca online Certificate Authority (CA).",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1044
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "steghide",
"portdir": "security/steghide",
"version": "0.5.1",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://steghide.sourceforge.net/",
"description": "Steghide is a steganography program",
"long_description": "Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "cforkin",
"github": "",
"ports_count": 1
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"libtool",
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"libmcrypt",
"mhash",
"zlib",
"libiconv",
"libjpeg-turbo",
"gettext"
]
}
],
"depends_on": []
},
{
"name": "stegdetect",
"portdir": "security/stegdetect",
"version": "0.6",
"license": "BSD-old and SSLeay and Permissive and IJG",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.outguess.org/detection.php",
"description": "tool for detecting steganographic content in jpeg images.",
"long_description": "Stegdetect is an automated tool for detecting steganographic content in images. It is capable of detecting several different steganographic methods to embed hidden information in jpeg images.",
"active": true,
"categories": [
"graphics",
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "ssss",
"portdir": "security/ssss",
"version": "1.0.1",
"license": "Apache-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/okoeroo/ssss",
"description": "Shamir's Secret Sharing Service",
"long_description": "Shamir's Secret Sharing is an algorithm in cryptography. It is a form of secret sharing, where a secret is divided into parts, giving each participant its own unique part, where some of the parts or all of them are needed in order to reconstruct the secret. Counting on all participants to combine together the secret might be impractical, and therefore sometimes the threshold scheme is used where any k of the parts are sufficient to reconstruct the original secret.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "okoeroo",
"github": "",
"ports_count": 2
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"openssl"
]
}
],
"depends_on": []
},
{
"name": "ssdeep",
"portdir": "security/ssdeep",
"version": "2.14.1",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://ssdeep-project.github.io/ssdeep/",
"description": "Recursively compute fuzzy hashes on files",
"long_description": "ssdeep is a program for computing fuzzy hashes on files. These hashes can be used for finding similar files.",
"active": true,
"categories": [
"sysutils",
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "sqlninja-devel",
"portdir": "security/sqlninja",
"version": "0.2.999-alpha1",
"license": "GPL-3+",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "http://sqlninja.sourceforge.net/",
"description": "Microsoft SQL Server SQL Injection vulnerability tester",
"long_description": "Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [
"perl5_34",
"perl5_28",
"perl5_30",
"perl5_32"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-16"
]
},
{
"type": "lib",
"ports": [
"p5.34-dbi",
"p5.34-io-socket-ssl",
"p5.34-net-dns",
"p5.34-dbd-sqlite",
"p5.34-net-rawip",
"p5.34-netpacket",
"p5.34-net-pcap"
]
}
],
"depends_on": []
},
{
"name": "sqlninja",
"portdir": "security/sqlninja",
"version": "0.2.6-r1",
"license": "GPL-3+",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "http://sqlninja.sourceforge.net/",
"description": "Microsoft SQL Server SQL Injection vulnerability tester",
"long_description": "Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [
"perl5_28",
"perl5_30",
"perl5_32",
"perl5_34"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-16"
]
},
{
"type": "lib",
"ports": [
"p5.34-io-socket-ssl",
"p5.34-net-dns",
"p5.34-net-pcap",
"p5.34-net-rawip",
"p5.34-netpacket"
]
}
],
"depends_on": []
},
{
"name": "sqlmap",
"portdir": "security/sqlmap",
"version": "1.10",
"license": "GPL-2+",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://sqlmap.org/",
"description": "Automatic SQL injection and database takeover tool",
"long_description": "sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches including database fingerprinting, over data fetching from the database, accessing the underlying file system, and executing commands on the operating system via out-of-band connections.",
"active": true,
"categories": [
"databases",
"security",
"python"
],
"maintainers": [
{
"name": "judaew",
"github": "judaew",
"ports_count": 654
}
],
"variants": [
"python27",
"python310",
"python311",
"python312",
"python313",
"python314"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"py314-build",
"py314-installer",
"py314-setuptools",
"py314-wheel"
]
},
{
"type": "lib",
"ports": [
"python314"
]
}
],
"depends_on": []
},
{
"name": "sops",
"portdir": "security/sops",
"version": "3.12.2",
"license": "MPL-2",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/mozilla/sops",
"description": "Simple and flexible tool for managing secrets",
"long_description": "Simple and flexible tool for managing secrets. sops is an editor of encrypted files that supports YAML, JSON, ENV, INI and BINARY formats and encrypts with AWS KMS, GCP KMS, Azure Key Vault and PGP.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1044
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "softhsm",
"portdir": "security/softhsm",
"version": "2.7.0",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.softhsm.org/",
"description": "SoftHSM is an implementation of a cryptographic store accessible through a PKCS #11 interface.",
"long_description": "SoftHSM is an implementation of a cryptographic store accessible through a PKCS #11 interface. You can use it to explore PKCS #11 without having a Hardware Security Module. SoftHSM Version 2 is using openssl for its cryptographic operations.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "jaap",
"github": "Jakker",
"ports_count": 9
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"libtool",
"pkgconfig",
"autoconf",
"automake",
"cppunit"
]
},
{
"type": "lib",
"ports": [
"openssl",
"sqlite3"
]
}
],
"depends_on": [
{
"type": "build",
"ports": [
"pkcs11-provider"
]
}
]
},
{
"name": "skipfish",
"portdir": "security/skipfish",
"version": "2.10b",
"license": "Apache-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://code.google.com/p/skipfish/",
"description": "web application security scanner",
"long_description": "A fully automated, active web application security reconnaissance tool.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-16"
]
},
{
"type": "lib",
"ports": [
"zlib",
"openssl10",
"pcre",
"libidn"
]
}
],
"depends_on": []
},
{
"name": "signify",
"portdir": "security/signify",
"version": "1.63",
"license": "ISC",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://man.openbsd.org/signify.1",
"description": "cryptographically sign and verify files",
"long_description": "The signify utility creates and verifies cryptographic signatures. A signature verifies the integrity of a message.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "jpo",
"github": "jpouellet",
"ports_count": 4
},
{
"name": "artkiver",
"github": "artkiver",
"ports_count": 12
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "sign",
"portdir": "security/sign",
"version": "1.1",
"license": "BSD and zlib and ISC",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://swapped.cc/sign/",
"description": "sign is a file signing and signature verification utility",
"long_description": "sign is a file signing and signature verification utility",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"openssl10"
]
}
],
"depends_on": []
},
{
"name": "shibboleth",
"portdir": "security/shibboleth",
"version": "3.4.1",
"license": "Apache",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.shibboleth.net/",
"description": "Shibboleth Native Service Provider",
"long_description": "The Shibboleth System is a standards based, open source software package for web single sign-on across or within organizational boundaries. It allows sites to make informed authorization decisions for individual access of protected online resources in a privacy-preserving manner.",
"active": true,
"categories": [
"security",
"www",
"shibboleth"
],
"maintainers": [
{
"name": "snc",
"github": "nerdling",
"ports_count": 157
},
{
"name": "scantor",
"github": "scantor",
"ports_count": 6
}
],
"variants": [
"odbc",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-17",
"autoconf",
"automake",
"libtool",
"pkgconfig",
"boost176"
]
},
{
"type": "lib",
"ports": [
"opensaml",
"xml-security-c",
"xmltooling",
"log4shib",
"xercesc3",
"apache2"
]
}
],
"depends_on": []
},
{
"name": "sguil-client",
"portdir": "security/sguil-client",
"version": "1.0.0",
"license": "GPL-3",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "https://bammv.github.io/sguil/",
"description": "GUI Console for Sguil Network Security Monitor",
"long_description": "GUI Console for Sguil Network Security Monitor",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-16"
]
},
{
"type": "lib",
"ports": [
"openssl",
"tcl-tls",
"tcllib",
"tclx",
"itk",
"iwidgets"
]
}
],
"depends_on": []
},
{
"name": "sf-pwgen",
"portdir": "security/sf-pwgen",
"version": "1.5",
"license": "zlib",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/anders/pwgen",
"description": "macOS command line password generator.",
"long_description": "macOS command line password generator. A command line tool that generates passwords using macOS's SecurityFoundation framework.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-17"
]
}
],
"depends_on": [
{
"type": "build",
"ports": [
"adblock2privoxy",
"privoxy"
]
},
{
"type": "lib",
"ports": [
"mail-server"
]
}
]
},
{
"name": "sequoia-pgp",
"portdir": "security/sequoia-pgp",
"version": "0.25.0",
"license": "GPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://sequoia-pgp.org/",
"description": "Sequoia PGP",
"long_description": "Sequoia is a cool new OpenPGP implementation. It consists of several crates, providing both a low-level and a high-level API for dealing with OpenPGP data.",
"active": false,
"categories": [
"security"
],
"maintainers": [
{
"name": "jann",
"github": "roederja",
"ports_count": 10
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-14",
"cargo",
"pkgconfig",
"rust",
"coreutils"
]
},
{
"type": "lib",
"ports": [
"capnproto",
"nettle",
"openssl",
"sqlite3"
]
}
],
"depends_on": []
},
{
"name": "secpwgen",
"portdir": "security/secpwgen",
"version": "1.3",
"license": "MIT",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.core-dump.com.hr/index.pl?node_id=407",
"description": "An utility for generating secure passphrases",
"long_description": "An utility for generating secure passphrases. Implements several methods for passphrase generation including the Diceware method with 8192 word dictionary compiled in the executable.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"cryptlib"
]
}
],
"depends_on": []
},
{
"name": "scrypt",
"portdir": "security/scrypt",
"version": "1.3.3",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.tarsnap.com/scrypt.html",
"description": "key derivation function",
"long_description": "The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more secure against hardware brute-force attacks than alternative functions such as PBKDF2 or bcrypt.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"openssl3"
]
}
],
"depends_on": []
},
{
"name": "scrub",
"portdir": "security/scrub",
"version": "2.6.1",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/chaos/scrub",
"description": "Overwrites files or devices with patterns",
"long_description": "Scrub writes patterns on special files (i.e. raw disk devices) or regular files to make retrieving the data more difficult. Scrub writes NNSA NAP-14.x, DoD 5220.22-M, BSI, 35-pass gutmann, or one of several other selectable pattern sequences",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "scponly",
"portdir": "security/scponly",
"version": "4.6",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.sublimation.org/scponly/",
"description": "Limited shell which wraps scp/sftp",
"long_description": "scponly is an alternative 'shell' (of sorts) for system administrators who would like to provide access to remote users to both read and write local files without providing any remote execution priviledges. Functionally, it is best described as a wrapper to the mostly trusted suite of ssh applications.",
"active": true,
"categories": [
"sysutils",
"net",
"security"
],
"maintainers": [],
"variants": [
"noWildcards",
"noWinscpCompat",
"rsyncCompat",
"chroot",
"scpCompat",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"openssh"
]
}
],
"depends_on": []
}
]
}