HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"count": 51973,
"next": "https://ports.macports.org/api/v1/ports/?format=api&ordering=-updated_at&page=82",
"previous": "https://ports.macports.org/api/v1/ports/?format=api&ordering=-updated_at&page=80",
"results": [
{
"name": "libotr",
"portdir": "security/libotr",
"version": "4.1.1",
"license": "LGPL-2+ and GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.cypherpunks.ca/otr/",
"description": "Off-the-Record Messaging Library",
"long_description": "Off-the-Record (OTR) Messaging allows you to have private conversations over instant messaging.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "rsync",
"github": "",
"ports_count": 3
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"libgcrypt"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"psi-otr",
"bitlbee",
"kopete",
"mcabber",
"profanity",
"pidgin-otr"
]
}
]
},
{
"name": "libident",
"portdir": "security/libident",
"version": "0.32",
"license": "Permissive",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.remlab.net/libident/",
"description": "Ident protocol library",
"long_description": "This is a library which provides a simple interface to the Ident protocol on the client side. It is meant to be used by daemons to try to authenticate users using the Ident protocol. For this to work, users need to have an Ident server running on the system from which they are connected.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "toby",
"github": "tobypeterson",
"ports_count": 255
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"clang-18"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"ngircd"
]
}
]
},
{
"name": "libgsasl",
"portdir": "security/libgsasl",
"version": "1.10.0",
"license": "LGPL-2.1+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://josefsson.org/libgsasl/",
"description": "GNU SASL: an authentication library.",
"long_description": "GNU SASL is an implementation of the Simple Authentication and Security Layer framework and a few common SASL mechanisms. SASL is used by network servers (e.g., IMAP, SMTP) to request authentication from clients, and in clients to authenticate against servers.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [
{
"name": "ryandesign",
"github": "ryandesign",
"ports_count": 2085
}
],
"variants": [
"gssapi_mit",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"gettext",
"libgcrypt",
"libidn",
"gss",
"libiconv"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"libinfinity",
"anubis",
"libvmime",
"mpop",
"msmtp",
"jabberd",
"jreen",
"gobby"
]
}
]
},
{
"name": "libgfshare",
"portdir": "security/libgfshare",
"version": "2.0.0",
"license": "MIT",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.digital-scurf.org/software/libgfshare",
"description": "utilities for multi-way secret sharing",
"long_description": "libgfshare is an implementation of the Shamir′s secret sharing algorithm. It allows to break a password or a secret key into several components, a predefined number of which is necessary to reconstruct it.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "joel-alexis",
"github": "",
"ports_count": 1
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "libfido2",
"portdir": "security/libfido2",
"version": "1.17.0",
"license": "bsd",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://developers.yubico.com/libfido2/",
"description": "library to communicate with a FIDO device over USB",
"long_description": "provides library functionality and command-line tools to communicate with a FIDO device over USB, and to verify attestation and assertion signatures.",
"active": true,
"categories": [
"security",
"crypto"
],
"maintainers": [
{
"name": "manuals-unread2u",
"github": "trodemaster",
"ports_count": 8
}
],
"variants": [
"debug",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"cmake",
"pkgconfig",
"mandoc",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"libcbor",
"openssl3"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"mysql8",
"pam-u2f"
]
}
]
},
{
"name": "libewf",
"portdir": "security/libewf",
"version": "20230212",
"license": "LGPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/libyal/libewf",
"description": "Libewf is a library for support of the Expert Witness Compression Format",
"long_description": "Libewf is a library for support of the Expert Witness Compression Format (EWF), it support both the SMART format (EWF-S01) and the EnCase format (EWF-E01). Libewf allows you to read and write media information within the EWF files.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"gettext",
"libiconv",
"bzip2",
"openssl3",
"macfuse",
"zlib"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"aimage",
"bulk_extractor",
"sleuthkit",
"testdisk"
]
}
]
},
{
"name": "libevt",
"portdir": "security/libevt",
"version": "20140731",
"license": "LGPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://code.google.com/p/libevt/",
"description": "Library and tooling to access the Windows Event Log (EVT) format",
"long_description": "Library and tooling to access the Windows Event Log (EVT) format",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"debug",
"python27",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"gettext",
"python27"
]
}
],
"depends_on": []
},
{
"name": "libcthreads",
"portdir": "security/libcthreads",
"version": "20220102",
"license": "LGPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/libyal/libcthreads",
"description": "Library for cross-platform C threads functions",
"long_description": "Library for cross-platform C threads functions",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"gettext",
"libcerror",
"libcstring",
"libiconv"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"libcdata"
]
}
]
},
{
"name": "libcstring",
"portdir": "security/libcstring",
"version": "20150101",
"license": "LGPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/libyal/libcstring",
"description": "Library for cross-platform C system functions",
"long_description": "Library for cross-platform C system functions",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"gettext",
"libiconv"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"libcdata",
"libcdatetime",
"libcerror",
"libcfile",
"libclocale",
"libcnotify",
"libcsplit",
"libcthreads"
]
}
]
},
{
"name": "libcsplit",
"portdir": "security/libcsplit",
"version": "20220109",
"license": "LGPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/libyal/libcsplit",
"description": "Library for cross-platform C split strings functions",
"long_description": "Library for cross-platform C split strings functions",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"gettext",
"libcerror",
"libcstring",
"libiconv"
]
}
],
"depends_on": []
},
{
"name": "libcotp",
"portdir": "security/libcotp",
"version": "3.1.0",
"license": "Apache-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/paolostivanin/libcotp",
"description": "C library that generates TOTP and HOTP",
"long_description": "C library that generates TOTP and HOTP",
"active": true,
"categories": [
"devel",
"security",
"crypto"
],
"maintainers": [],
"variants": [
"debug",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"cmake",
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"libgcrypt"
]
}
],
"depends_on": []
},
{
"name": "libcnotify",
"portdir": "security/libcnotify",
"version": "20220108",
"license": "LGPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/libyal/libcnotify",
"description": "Library for cross-platform C notification functions",
"long_description": "Library for cross-platform C notification functions",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"gettext",
"libcerror",
"libcstring",
"libiconv"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"libcfile"
]
}
]
},
{
"name": "libclocale",
"portdir": "security/libclocale",
"version": "20220107",
"license": "LGPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/libyal/libclocale",
"description": "Library for cross-platform C locale functions",
"long_description": "Library for cross-platform C locale functions",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"gettext",
"libcerror",
"libcstring",
"libiconv"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"libcfile"
]
}
]
},
{
"name": "libcfile",
"portdir": "security/libcfile",
"version": "20220106",
"license": "LGPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/libyal/libcfile",
"description": "Library for cross-platform C file functions",
"long_description": "Library for cross-platform C file functions",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"libclocale",
"libcnotify",
"gettext",
"libiconv",
"libcstring",
"libcerror"
]
}
],
"depends_on": []
},
{
"name": "libcerror",
"portdir": "security/libcerror",
"version": "20220101",
"license": "LGPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/libyal/libcerror",
"description": "Library for cross-platform C error functions",
"long_description": "Library for cross-platform C error functions",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"gettext",
"libcstring",
"libiconv"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"libcdata",
"libcdatetime",
"libcfile",
"libclocale",
"libcnotify",
"libcsplit",
"libcthreads"
]
}
]
},
{
"name": "libcdatetime",
"portdir": "security/libcdatetime",
"version": "20220104",
"license": "LGPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/libyal/libcdatetime",
"description": "Library for cross-platform C threads functions",
"long_description": "Library for cross-platform C threads functions",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"gettext",
"libcerror",
"libcstring",
"libiconv"
]
}
],
"depends_on": []
},
{
"name": "libcdata",
"portdir": "security/libcdata",
"version": "20220115",
"license": "LGPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/libyal/libcdata",
"description": "Library for cross-platform C generic data functions",
"long_description": "Library for cross-platform C generic data functions",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"libcstring",
"gettext",
"libiconv",
"libcthreads",
"libcerror"
]
}
],
"depends_on": []
},
{
"name": "libbswabe",
"portdir": "security/libbswabe",
"version": "0.9",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://acsc.cs.utexas.edu/cpabe/",
"description": "ciphertext-policy attribute-based encryption toolkit library",
"long_description": "The cpabe toolkit provides a library implementing a ciphertext-policy attribute-based encryption scheme. \n\nIn a ciphertext policy attribute-based encryption scheme, each user's private key is associated with a set of attributes representing their capabilities, and a ciphertext is encrypted such that only users whose attributes satisfy a certain policy can decrypt. For example, we can encrypt a ciphertext such that in a company it can only be decrypted by a someone with attributes Senior and Human Resources or has the attribute Executive. One interesting application of this tool is that we can do Role-Based Access Control (RBAC) without requiring trusted data storage.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"glib2",
"gmp",
"openssl",
"pbc"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"cpabe"
]
}
]
},
{
"name": "lastpass-cli-doc",
"portdir": "security/lastpass-cli",
"version": "1.6.1",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/lastpass/lastpass-cli",
"description": "Documentation for command line interface to LastPass.com",
"long_description": "Documentation for command line interface to LastPass.com",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "khindenburg",
"github": "kurthindenburg",
"ports_count": 433
},
{
"name": "macports",
"github": "Raimondi",
"ports_count": 6
},
{
"name": "mni",
"github": "",
"ports_count": 27
}
],
"variants": [
"debug",
"pinentry",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"pkgconfig",
"asciidoc",
"libxslt",
"cmake"
]
},
{
"type": "lib",
"ports": [
"curl",
"libxml2",
"openssl"
]
}
],
"depends_on": []
},
{
"name": "libaes_siv",
"portdir": "security/libaes_siv",
"version": "1.0.0",
"license": "apache-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/dfoxfranke/libaes_siv",
"description": "A C implementation of AES-SIV",
"long_description": "This is an RFC5297-compliant C implementation of AES-SIV, written by Daniel Franke on behalf of Akamai Technologies and published under the Apache License (v2.0). It uses OpenSSL for the underlying AES and CMAC implementations and follows a similar interface style.",
"active": true,
"categories": [
"devel",
"security"
],
"maintainers": [
{
"name": "fw",
"github": "fhgwright",
"ports_count": 28
}
],
"variants": [
"debug",
"doc",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"cmake",
"asciidoc",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"openssl"
]
}
],
"depends_on": []
},
{
"name": "lego",
"portdir": "security/lego",
"version": "4.35.1",
"license": "MIT",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://go-acme.github.io/lego",
"description": "Let's Encrypt client and ACME library written in Go",
"long_description": "Let's Encrypt client and ACME library written in Go. Supports ACME v2 RFC 8555. Allows registering with a CA, obtaining certificates (both from scratch, or with an existing CSR), renewing certificates, revoking certificates, SAN certificate support, support for ACME challenges (HTTP, DNS, TLS), certificate bundling, and more.",
"active": true,
"categories": [
"security",
"www"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1057
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "lastpass-cli",
"portdir": "security/lastpass-cli",
"version": "1.6.1",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/lastpass/lastpass-cli",
"description": "command line interface to LastPass.com",
"long_description": "command line interface to LastPass.com",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "khindenburg",
"github": "kurthindenburg",
"ports_count": 433
},
{
"name": "macports",
"github": "Raimondi",
"ports_count": 6
},
{
"name": "mni",
"github": "",
"ports_count": 27
}
],
"variants": [
"debug",
"pinentry",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"cmake",
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"openssl",
"libxml2",
"curl",
"pinentry"
]
}
],
"depends_on": []
},
{
"name": "keystore-explorer",
"portdir": "security/keystore-explorer",
"version": "5.6.1",
"license": "GPL-3",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://keystore-explorer.org/",
"description": "KeyStore Explorer is a free GUI replacement for the Java command-line utilities keytool and jarsigner",
"long_description": "KeyStore Explorer is a free GUI replacement for the Java command-line utilities keytool and jarsigner with the following features: \n* Create, load, save and convert between various KeyStore types: JKS, JCEKS, PKCS#12, BKS (V1 and V2) and UBER \n* Change KeyStore and KeyStore entry passwords \n* Delete or rename KeyStore entries \n* Cut/copy/paste KeyStore entries \n* Append certificates to key pair certificate chains \n* Generate RSA, ECC and DSA key pairs with self-signed X.509 certificates \n* Apply X.509 certificate extensions to generated key pairs and Certificate Signing Requests (CSRs) \n* View X.509 Certificate, CRL and CRL entry X.509 V3 extensions \n* Import and export keys and certificates in many formats: PKCS#12, PKCS#8, PKCS#7, DER/PEM X.509 certificate files, Microsoft PVK, SPC, PKI Path, OpenSSL \n* Generate, view and sign CSRs in PKCS #10 and SPKAC formats \n* Sign JAR files \n* Configure a CA Certs KeyStore for use with KeyStore operations",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"gradle",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"openjdk17"
]
}
],
"depends_on": []
},
{
"name": "keysync",
"portdir": "security/keysync",
"version": "3.0.3",
"license": "MIT and Apache-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/budde25/keysync",
"description": "Download and update local authorized_keys file with GitHub, GitLab, or Launchpad.",
"long_description": "Download and update local authorized_keys file with GitHub, GitLab, or Launchpad. keysync is a command line utility and service to help keep your local authorized_keys file synced to a master copy of public keys. The program allows syncing from Github, GitLab, Launchpad at the moment. It downloads and filters only keys that you don't already have a local copy of. This application can be used for either as one time sync when run, or running automatically in the background as a systemd service. You can have the file it updated at a preset interval or a custom cron expression, you can even support multiple users and providers.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1057
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"cargo",
"legacy-support",
"rust",
"clang-20"
]
},
{
"type": "lib",
"ports": [
"libunwind"
]
}
],
"depends_on": []
},
{
"name": "keychain-cpp",
"portdir": "security/keychain-cpp",
"version": "1.2.1",
"license": "MIT",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/hrantzsch/keychain",
"description": "Cross-platform wrapper for the OS credential storage",
"long_description": "Keychain is a thin cross-platform wrapper in C++ to access the operating system credential storage.",
"active": true,
"categories": [
"sysutils",
"security"
],
"maintainers": [],
"variants": [
"debug",
"tests",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"cmake",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "keybase",
"portdir": "security/keybase",
"version": "6.6.2",
"license": "BSD",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/keybase/client",
"description": "Command-line interface to Keybase.io",
"long_description": "Command-line interface to Keybase.io",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
},
{
"type": "run",
"ports": [
"gnupg2"
]
}
],
"depends_on": []
},
{
"name": "kbs2",
"portdir": "security/kbs2",
"version": "0.7.3",
"license": "MIT",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/woodruffw/kbs2",
"description": "A secret manager backed by age",
"long_description": "kbs2 is a command line for managing secrets",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1057
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"cargo",
"legacy-support",
"rust",
"clang-20"
]
},
{
"type": "lib",
"ports": [
"libunwind"
]
}
],
"depends_on": []
},
{
"name": "jailkit",
"portdir": "security/jailkit",
"version": "2.23",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://olivier.sessink.nl/jailkit/",
"description": "utilities to create limited user accounts in a chroot jail",
"long_description": "Jailkit is a set of utilities to allow quick creation of limited user accounts in a chroot jail. It contains a safe logging daemon, shells that can restrict users, utilities to start daemons in a chroot jail, and utilities for easy setup of chroot jails.",
"active": true,
"categories": [
"sysutils",
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"python312"
]
}
],
"depends_on": []
},
{
"name": "infisical",
"portdir": "security/infisical",
"version": "0.28.4",
"license": "MIT",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://infisical.com/",
"description": "Official CLI for Infisical, an open source secrets platform",
"long_description": "Official CLI for Infisical, an open source secrets platform",
"active": true,
"categories": [
"devel",
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "integrit",
"portdir": "security/integrit",
"version": "4.1",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://integrit.sourceforge.net",
"description": "integrit is the most simple Tripwire alternative",
"long_description": "integrit is a more simple alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. integrit works by creating a database that is a snapshot of the most essential parts of your computer system. You put the database somewhere safe, and then later you can use it to make sure that no one has made any illicit modifications to the computer system. In the case of a break in, you know exactly which files have been modified, added, or removed. integrit is a robust, stable piece of software designed for professional use.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "frank.dean",
"github": "frankdean",
"ports_count": 12
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "ike-scan",
"portdir": "security/ike-scan",
"version": "1.9.5",
"license": "(GPL-2+ or OpenSSLException)",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/royhills/ike-scan",
"description": "ike-scan can discover and identify IPsec VPN systems running IKE.",
"long_description": "ike-scan can discover and identify IPsec VPN systems running IKE.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"openssl"
]
}
],
"depends_on": []
},
{
"name": "i2pd",
"portdir": "security/i2pd",
"version": "2.60.0",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://i2pd.website https://i2pd.readthedocs.io",
"description": "End-to-End encrypted and anonymous Internet",
"long_description": "End-to-End encrypted and anonymous Internet",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [
"debug",
"upnp",
"logrotate",
"tests",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-20",
"cmake",
"pkgconfig"
]
},
{
"type": "lib",
"ports": [
"boost181",
"zlib",
"miniupnpc",
"openssl3"
]
},
{
"type": "run",
"ports": [
"logrotate"
]
}
],
"depends_on": []
},
{
"name": "igtf-ca-bundle",
"portdir": "security/igtf-ca-bundle",
"version": "1.106",
"license": "(CCBY-3 or Permissive) and MPL-1.1+",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.igtf.net",
"description": "The IGTF trusted certificates and metadata",
"long_description": "The International Grid Trust Federation (IGTF) maintains a list of trust anchors, root certificates and related meta-information for all the accredited authorities, i.e., those that meet or exceed the criteria mentioned in the Authentication Profiles accepted by the IGTF. For a list of those profiles, please refer to the website.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [
{
"name": "petr",
"github": "petrrr",
"ports_count": 612
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "run",
"ports": [
"fetch-crl"
]
}
],
"depends_on": []
},
{
"name": "hydra",
"portdir": "security/hydra",
"version": "9.7",
"license": "(AGPL-3 or OpenSSLException)",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/vanhauser-thc/thc-hydra",
"description": "A very fast network logon cracker which support many services",
"long_description": "Hydra is a parallelized logon cracker utility. Hydra can brute force attack on FTP, POP3, IMAP, Telnet, HTTP Auth, NNTP, VNC, ICQ, Socks5, PCNFS and more services within SSL support.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [
{
"name": "i0ntempest",
"github": "i0ntempest",
"ports_count": 271
}
],
"variants": [
"xhydra",
"postgresql96",
"postgresql12",
"postgresql13",
"postgresql14",
"mysql57",
"mariadb",
"smb2",
"subversion",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"libssh",
"ncurses",
"openssl",
"pcre2",
"libidn"
]
}
],
"depends_on": []
},
{
"name": "hashcat",
"portdir": "security/hashcat",
"version": "7.1.2",
"license": "MIT",
"platforms": "{darwin >= 19}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://hashcat.net/hashcat/",
"description": "World's fastest and most advanced password recovery utility.",
"long_description": "hashcat is the world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized hashing algorithms. hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, Windows, and macOS, and has facilities to help enable distributed password cracking",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "",
"github": "gaming-hacker",
"ports_count": 1
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"zlib",
"minizip",
"xxhash",
"libiconv",
"python313"
]
},
{
"type": "run",
"ports": [
"perl5.34",
"p5.34-dbd-sqlite",
"py313-pycryptodome",
"py313-cryptography",
"py313-asn1",
"py313-protobuf3",
"py313-python-snappy",
"py313-plyvel"
]
}
],
"depends_on": []
},
{
"name": "harp",
"portdir": "security/harp",
"version": "0.2.11",
"license": "Apache-2",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/elastic/harp",
"description": "Secret management by contract toolchain",
"long_description": "Harp is a tool set to operate secret management by contract. The objective is to reduce the value centric management by handling secret data in a reproducible way by providing a technical stack to describe how your value is managed by contracts and pipelines. Furthermore, we know that naming thing is hard, as a consequence a secret could be consistently associated to a predictable secret identifier used as a key to refer to the secret value. Finally, the secret can hold additional metadata (ownership, rotation period, leak severity, etc.) which can be consumed during the pipeline executions. These key/value associations (path ⇒ value) form a Bundle stored in an immutable file named a Container. This Container acts as a pivot format to allow Harp commands to communicate and create data management pipelines. In addition to that, it provides a template engine used to generate various confidence values (password, passphrase, crypto keys, etc.) and allow more sophisticated rendering operations (configuration files, etc.). Finally, it provides a SDK to allow developers to integrate Harp features in their products, and/or extend the Harp pipeline features by creating new plugins.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1057
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "gss",
"portdir": "security/gss",
"version": "1.0.4",
"license": "GPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.gnu.org/software/gss/",
"description": "GNU Generic Security Service Library",
"long_description": "GSS is an implementation of the Generic Security Service Application Program Interface (GSS-API). GSS-API is used by network servers to provide security services, e.g., to authenticate SMTP/IMAP clients against SMTP/IMAP servers.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"pkgconfig",
"gtk-doc",
"autoconf",
"automake",
"gettext",
"libtool"
]
},
{
"type": "lib",
"ports": [
"gettext-runtime",
"libiconv"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"imap-uw",
"libgsasl"
]
}
]
},
{
"name": "gpg-tui",
"portdir": "security/gpg-tui",
"version": "0.11.2",
"license": "MIT",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://blog.orhun.dev/introducing-gpg-tui/",
"description": "gpg-tui is a Terminal User Interface for GnuPG.",
"long_description": "gpg-tui is a Terminal User Interface for GnuPG. It aims to ease the key management operations such as listing/exporting/signing by providing an interface along with the command-line fallback for more complex operations. It is not trying to be a full-fledged interface for all the features that gpg provides but it tries to bring a more interactive approach to key management.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1057
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-20",
"cargo",
"legacy-support",
"pkgconfig",
"rust"
]
},
{
"type": "lib",
"ports": [
"libgpg-error",
"libunwind",
"gpgme"
]
},
{
"type": "run",
"ports": [
"gnupg2"
]
}
],
"depends_on": []
},
{
"name": "grype",
"portdir": "security/grype",
"version": "0.109.0",
"license": "Apache-2",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/anchore/grype",
"description": "A vulnerability scanner for container images and filesystems",
"long_description": "A vulnerability scanner for container images and filesystems. Works with Syft, the powerful SBOM (software bill of materials) tool for container images and filesystems.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1057
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"goreleaser",
"clang-18"
]
},
{
"type": "fetch",
"ports": [
"git"
]
}
],
"depends_on": []
},
{
"name": "govulncheck",
"portdir": "security/govulncheck",
"version": "1.3.0",
"license": "BSD",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/golang/vuln",
"description": "Govulncheck reports known vulnerabilities that affect Go code",
"long_description": "Govulncheck reports known vulnerabilities that affect Go code. It uses static analysis of source code or a binary's symbol table to narrow down reports to only those that could affect the application.",
"active": true,
"categories": [
"devel",
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1057
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "gosec",
"portdir": "security/gosec",
"version": "2.24.7",
"license": "Apache-2",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://securego.io",
"description": "Golang security checker. Inspects source code for security problems by scanning the Go AST.",
"long_description": "Golang security checker. Inspects source code for security problems by scanning the Go AST.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1057
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "gopass-jsonapi",
"portdir": "security/gopass-jsonapi",
"version": "1.16.1",
"license": "MIT",
"platforms": "{darwin >= 23}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.gopass.pw",
"description": "Gopass Browser Bindings",
"long_description": "gopass-jsonapi enables communication with gopass via JSON messages",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "sikmir",
"github": "sikmir",
"ports_count": 46
},
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1057
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "gopass-hibp",
"portdir": "security/gopass-hibp",
"version": "1.16.1",
"license": "MIT",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.gopass.pw",
"description": "Gopass haveibeenpwnd.com integration",
"long_description": "Gopass haveibeenpwnd.com integration",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "sikmir",
"github": "sikmir",
"ports_count": 46
},
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1057
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "gopass",
"portdir": "security/gopass",
"version": "1.16.1",
"license": "MIT",
"platforms": "{darwin >= 23}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.gopass.pw",
"description": "The slightly more awesome Standard Unix Password Manager for Teams",
"long_description": "The slightly more awesome Standard Unix Password Manager for Teams",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "sikmir",
"github": "sikmir",
"ports_count": 46
},
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1057
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"gnupg2"
]
}
],
"depends_on": []
},
{
"name": "gon",
"portdir": "security/gon",
"version": "0.2.5",
"license": "MIT",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/mitchellh/gon",
"description": "Sign, notarize, and package macOS CLI tools and applications written in any language.",
"long_description": "gon is a simple, no-frills tool for signing and notarizing your CLI binaries for macOS. Beginning with macOS Catalina (10.15), Apple is requiring all software distributed outside of the Mac App Store to be signed and notarized. Software that isn't properly signed or notarized will be shown an error message with the only actionable option being to \"Move to Bin\". The software cannot be run even from the command-line. The workarounds are painful for users. gon helps you automate the process of notarization.",
"active": true,
"categories": [
"devel",
"sysutils",
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1057
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "gokey",
"portdir": "security/gokey",
"version": "0.2.0",
"license": "BSD-3",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/cloudflare/gokey",
"description": "A simple vaultless password manager in Go",
"long_description": "gokey is a password manager, which does not require a password vault. Instead of storing your passwords in a vault it derives your password on the fly from your master password and supplied realm string (for example, resource URL). This way you do not have to manage, backup or sync your password vault (or trust its management to a third party) as your passwords are available immediately anywhere.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1057
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"go-md2man",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "gnupg-pkcs11-scd",
"portdir": "security/gnupg-pkcs11-scd",
"version": "0.10.0",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/alonbl/gnupg-pkcs11-scd",
"description": "GnuPG PKCS#11 Smart-Card Daemon",
"long_description": "gnupg-pkcs11 is a project to implement a BSD-licensed smart-card daemon to enable the use of PKCS#11 tokens with GnuPG",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "sstallion",
"github": "sstallion",
"ports_count": 4
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"libgcrypt",
"gnupg2",
"pkcs11-helper"
]
}
],
"depends_on": []
},
{
"name": "gnu-pw-mgr",
"portdir": "security/gnu-pw-mgr",
"version": "2.7.4",
"license": "GPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.gnu.org/software/gnu-pw-mgr/",
"description": "password manager to reconstruct difficult passwords",
"long_description": "gnu-pw-mgr is a password manager designed to make it easy to reconstruct difficult passwords when they are needed, while limiting the risk of attack. The user of this program inputs a very long initial password \"seed\" and a self-defined transformation of a web site URL to obtain both the password and a user name hint for that web site. The seed is stored in a hidden file. However, the passwords and the URL transforms are never stored anywhere. You must remember this transform (password id), or the password is lost forever.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "ryandesign",
"github": "ryandesign",
"ports_count": 2085
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "extract",
"ports": [
"xz"
]
},
{
"type": "lib",
"ports": [
"gettext"
]
}
],
"depends_on": []
},
{
"name": "gnomint",
"portdir": "security/gnomint",
"version": "1.2.1",
"license": "GPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://gnomint.sourceforge.net/",
"description": "Single-user PKI with graphical (GTK) and CLI interface",
"long_description": "gnoMint provides a GUI and a CLI to manage a simple PKI. Supports multiple root certificates, intermediate certificates, creating/importing and signing of CSRs and certificate revokation. Stores the whole PKI in a single SQLite file.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "fgp",
"github": "",
"ports_count": 2
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"pkgconfig",
"gnome-common",
"intltool",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"gconf",
"zlib",
"gtk2",
"sqlite3",
"gettext",
"glib2",
"gnutls",
"libgcrypt",
"readline"
]
}
],
"depends_on": []
},
{
"name": "gitleaks",
"portdir": "security/gitleaks",
"version": "8.30.1",
"license": "MIT",
"platforms": "darwin freebsd linux",
"epoch": 1,
"replaced_by": null,
"homepage": "https://github.com/gitleaks/gitleaks",
"description": "Scan git repos (or files) for secrets using regex and entropy",
"long_description": "Gitleaks is a SAST tool for detecting and preventing hardcoded secrets like passwords, api keys, and tokens in git repos. Gitleaks is an easy-to-use, all-in-one solution for detecting secrets, past or present, in your code.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1057
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
}
]
}