HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"count": 50735,
"next": "https://ports.macports.org/api/v1/ports/?format=api&ordering=created_at&page=486",
"previous": "https://ports.macports.org/api/v1/ports/?format=api&ordering=created_at&page=484",
"results": [
{
"name": "libotr",
"portdir": "security/libotr",
"version": "4.1.1",
"license": "LGPL-2+ and GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.cypherpunks.ca/otr/",
"description": "Off-the-Record Messaging Library",
"long_description": "Off-the-Record (OTR) Messaging allows you to have private conversations over instant messaging.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "rsync",
"github": "",
"ports_count": 3
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"libgcrypt"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"bitlbee",
"psi-otr",
"pidgin-otr",
"kopete",
"mcabber",
"profanity"
]
}
]
},
{
"name": "libp11",
"portdir": "security/libp11",
"version": "0.4.12",
"license": "LGPL-2.1",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/OpenSC/libp11",
"description": "Interface to access PKCS#11 objects.",
"long_description": "libp11 is a library implementing a thin layer on top of PKCS#11 API to make using PKCS#11 implementations easier.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "nano103",
"github": "nano103",
"ports_count": 3
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"docbook-xsl-nons",
"gengetopt",
"pkgconfig",
"clang-14",
"help2man",
"libxslt"
]
},
{
"type": "lib",
"ports": [
"openssl"
]
}
],
"depends_on": []
},
{
"name": "libprelude",
"portdir": "security/libprelude",
"version": "5.2.0",
"license": "LGPL-2.1+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.prelude-siem.org/",
"description": "Secure Connections between all Sensors and the Prelude Manager",
"long_description": "Libprelude is a collection of generic functions providing communication between all Sensors, like IDS (Intrusion Detection System), and the Prelude Manager. It provides a convenient interface for sending and receiving IDMEF (Information and Event Message Exchange Format) alerts to Prelude Manager with transparent SSL, fail-over and replication support, asynchronous events and timer interfaces, an abstracted configuration API (hooking at the command-line, the configuration line, or wide configuration, available from the Manager), and a generic plugin API. It allows you to easily turn your favorite security program into a Prelude sensor.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "thomas.andrejak",
"github": "ToToL",
"ports_count": 1
}
],
"variants": [
"perl",
"python38"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"pkgconfig",
"gtk-doc",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"python38",
"zlib",
"libiconv",
"gettext",
"gnutls",
"libgpg-error",
"libtasn1",
"libtool"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"libpreludedb",
"prelude-lml",
"prelude-manager"
]
}
]
},
{
"name": "libpreludedb",
"portdir": "security/libpreludedb",
"version": "5.2.0",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.prelude-siem.org/",
"description": "library for easy access to the Prelude database",
"long_description": "Prelude is a Universal Security Information Management (SIM) system. Prelude collects, normalizes, sorts, aggregates, correlates and reports all security-related events independently of the product brand or license giving rise to such events. This port provides an abstract method of accessing various database variants.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"python38",
"sqlite3",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"sqlite3",
"python38",
"libprelude"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"prelude-manager"
]
}
]
},
{
"name": "libressl",
"portdir": "security/libressl",
"version": "4.2.1",
"license": "OpenSSL and SSLeay",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.libressl.org",
"description": "LibreSSL SSL/TLS cryptography library",
"long_description": "LibreSSL is composed of four parts: The openssl(1) utility, which provides tools for managing keys, certificates, etc. libcrypto: a library of cryptography fundamentals libssl: a TLS library, backwards-compatible with OpenSSL libtls: a new TLS library, designed to make it easier to write foolproof applications This port tracks the stable releases, for development releases please use libressl-devel.",
"active": true,
"categories": [
"devel",
"security"
],
"maintainers": [
{
"name": "artkiver",
"github": "artkiver",
"ports_count": 12
},
{
"name": "cal",
"github": "neverpanic",
"ports_count": 53
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"rpki-client",
"ldns"
]
}
]
},
{
"name": "libressl-devel",
"portdir": "security/libressl-devel",
"version": "4.2.1",
"license": "OpenSSL and SSLeay",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.libressl.org",
"description": "LibreSSL SSL/TLS cryptography library",
"long_description": "LibreSSL is composed of four parts: The openssl(1) utility, which provides tools for managing keys, certificates, etc. libcrypto: a library of cryptography fundamentals libssl: a TLS library, backwards-compatible with OpenSSL libtls: a new TLS library, designed to make it easier to write foolproof applications This port tracks the development releases, for stable releases please use libressl.",
"active": true,
"categories": [
"devel",
"security"
],
"maintainers": [
{
"name": "artkiver",
"github": "artkiver",
"ports_count": 12
},
{
"name": "cal",
"github": "neverpanic",
"ports_count": 53
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "libtomcrypt",
"portdir": "security/libtomcrypt",
"version": "1.18.2",
"license": "public-domain",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.libtom.net/LibTomCrypt",
"description": "Cryptographic toolkit",
"long_description": "LibTomCrypt is a fairly comprehensive, modular and portable cryptographic toolkit that provides developers with a vast array of well known published block ciphers, one-way hash functions, chaining modes, pseudo-random number generators, public key cryptography and a plethora of other routines.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"libtommath",
"clang-15"
]
},
{
"type": "extract",
"ports": [
"xz"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"bitkeeper"
]
}
]
},
{
"name": "libu2f-host",
"portdir": "security/libu2f-host",
"version": "1.1.10",
"license": "LGPL-2.1+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://developers.yubico.com/libu2f-host/",
"description": "Yubico Universal 2nd Factor (U2F) Host C Library",
"long_description": "Libu2f-host provides a C library and command-line tool that implements the host-side of the U2F protocol. There are APIs to talk to a U2F device and perform the U2F Register and U2F Authenticate operations.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "l2dy",
"github": "l2dy",
"ports_count": 97
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-9.0"
]
},
{
"type": "extract",
"ports": [
"xz"
]
},
{
"type": "lib",
"ports": [
"hidapi",
"json-c"
]
}
],
"depends_on": []
},
{
"name": "libu2f-server",
"portdir": "security/libu2f-server",
"version": "1.1.0",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://developers.yubico.com/libu2f-server/",
"description": "Yubico Universal 2nd Factor (U2F) Server C Library",
"long_description": "This is a C library that implements the server-side of the U2F protocol. More precisely, it provides an API for generating the JSON blobs required by U2F devices to perform the U2F Registration and U2F Authentication operations, and functionality for verifying the cryptographic operations.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "l2dy",
"github": "l2dy",
"ports_count": 97
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"help2man",
"gengetopt",
"pkgconfig",
"clang-9.0",
"check"
]
},
{
"type": "extract",
"ports": [
"xz"
]
},
{
"type": "lib",
"ports": [
"json-c",
"openssl"
]
}
],
"depends_on": []
},
{
"name": "libyubikey",
"portdir": "security/libyubikey",
"version": "1.13",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/Yubico/yubico-c",
"description": "Low-level library for decrypting and parsing Yubikey One-Time Passwords (OTP) in C.",
"long_description": "Low-level library for decrypting and parsing Yubikey One-Time Passwords (OTP) in C.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "snc",
"github": "nerdling",
"ports_count": 157
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"asciidoc",
"docbook-xsl-nons",
"libxslt",
"clang-17"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"yubico-c-client",
"ykpers"
]
}
]
},
{
"name": "log2timeline",
"portdir": "security/log2timeline",
"version": "0.65",
"license": "GPL-3+",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://code.google.com/archive/p/log2timeline/",
"description": "framework for automatic creation of a super timeline",
"long_description": "log2timeline provides a single tool to parse various log files and artifacts found on suspect systems (and supporting systems, such as network equipment) and produces a timeline that can be analysed by forensic investigators/analysts.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"perl5_30",
"perl5_32",
"perl5_28",
"perl5_34"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-16"
]
},
{
"type": "lib",
"ports": [
"p5.34-archive-zip",
"p5.34-carp-assert",
"p5.34-data-hexify",
"p5.34-date-manip",
"p5.34-datetime-format-strptime",
"p5.34-datetime-timezone",
"p5.34-dbd-sqlite",
"p5.34-dbi",
"p5.34-digest-crc",
"p5.34-file-mork",
"p5.34-gtk2",
"perl5.34",
"p5.34-html-scrubber",
"p5.34-image-exiftool",
"p5.34-libwww-perl",
"p5.34-mac-propertylist",
"p5.34-net-pcap",
"p5.34-netpacket",
"p5.34-params-validate",
"p5.34-parse-win32registry",
"p5.34-version",
"p5.34-xml-entities",
"p5.34-xml-libxml",
"p5.34-html-parser"
]
}
],
"depends_on": []
},
{
"name": "logsentry",
"portdir": "security/logsentry",
"version": "1.1.1",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://sourceforge.net/projects/sentrytools",
"description": "logfile auditing tool (previously logcheck)",
"long_description": "Logsentry is a scheduled auditing tool that scans system log files for security violations and unusual activity. Reports of suspicious log entries are mailed to a specified user (usually root). Logsentry was formerly known as logcheck.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "logsurfer",
"portdir": "security/logsurfer",
"version": "1.6b",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.crypt.gen.nz/logsurfer/",
"description": "monitors system logs in real-time and reports on the occurrence of events",
"long_description": "similar to the well-known swatch program on which it is based, but offers a number of advanced features which swatch does not support. Logsurfer is capable of grouping related log entries together - for instance, when a system boots it usually creates a high number of log messages.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "mat",
"github": "",
"ports_count": 1
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "logwatch",
"portdir": "security/logwatch",
"version": "7.14",
"license": "MIT",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "http://logwatch.sourceforge.net",
"description": "system log analyzer and reporter",
"long_description": "Logwatch is a customizable log analysis system. Logwatch parses through your system's logs for a given period of time and creates a report analyzing areas that you specify, in as much detail as you require. Logwatch is easy to use and will work right out of the package on most systems.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "khindenburg",
"github": "kurthindenburg",
"ports_count": 433
}
],
"variants": [
"perl5_30",
"perl5_32",
"perl5_34",
"perl5_36",
"perl5_38"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"perl5.34",
"p5.34-html-parser"
]
}
],
"depends_on": []
},
{
"name": "lynis",
"portdir": "security/lynis",
"version": "3.1.6",
"license": "GPL-3",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "https://cisofy.com/lynis/",
"description": "Security and system auditing tool to harden systems",
"long_description": "Lynis is a battle-tested security tool for systems running Linux, macOS, or Unix-based operating system. It performs an extensive health scan of your systems to support system hardening and compliance testing. The project is open source software with the GPL license and available since 2007.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "newtonne.github",
"github": "newtonne",
"ports_count": 5
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "makepasswd",
"portdir": "security/makepasswd",
"version": "1.10-13",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://packages.debian.org/stable/source/makepasswd",
"description": "generate and encrypt passwords",
"long_description": "A port of Rob Levin's makepasswd tool.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"perl5_28",
"perl5_30",
"perl5_32",
"perl5_34"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-14"
]
},
{
"type": "extract",
"ports": [
"xz"
]
},
{
"type": "lib",
"ports": [
"perl5.34"
]
},
{
"type": "run",
"ports": [
"p5.34-bytes-random-secure",
"p5.34-crypt-passwdmd5",
"p5.34-getopt-long"
]
}
],
"depends_on": []
},
{
"name": "md5deep",
"portdir": "security/md5deep",
"version": "4.4",
"license": "public-domain and GPL-2+ and LGPL-2.1+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/jessek/hashdeep",
"description": "Recursively compute digests on files/directories",
"long_description": "md5deep and hashdeep are a cross-platform set of programs to recursively compute MD5, SHA-1, or SHA-256 message digests on an arbitrary number of files.",
"active": true,
"categories": [
"sysutils",
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"clang-17"
]
}
],
"depends_on": []
},
{
"name": "medusa",
"portdir": "security/medusa",
"version": "2.2",
"license": "(GPL-2 or OpenSSLException)",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.foofus.net/~jmk/medusa/medusa.html",
"description": "speedy, massively parallel, modular, login brute-forcer",
"long_description": "Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application. Thread-based parallel testing: Brute-force testing can be performed against multiple hosts, users or passwords concurrently. Flexible user input: Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing. Modular design: Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [
{
"name": "normen",
"github": "Gminfly",
"ports_count": 11
}
],
"variants": [
"subversion",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-16",
"automake",
"libtool",
"pkgconfig",
"autoconf"
]
},
{
"type": "lib",
"ports": [
"openssl10",
"subversion",
"libssh2"
]
}
],
"depends_on": []
},
{
"name": "metasploit2",
"portdir": "security/metasploit2",
"version": "2.7",
"license": "(Artistic-1 or GPL-2) and GPL-2+ and APSL-1.1 and Noncommercial and Restrictive",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://metasploit.com/",
"description": "Tools and information for security research and pentesting",
"long_description": "The Metasploit Project goal is to provide useful information to people who perform penetration testing, IDS signature development, and exploit research. This framework was created to fill the gaps in the information publicly available on various exploitation techniques and to create a useful resource for exploit developers. The tools and information are provided for legal security research and testing purposes only.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-14"
]
},
{
"type": "run",
"ports": [
"perl5.34",
"p5.34-net-ssleay",
"p5.34-term-readline-gnu"
]
}
],
"depends_on": []
},
{
"name": "metasploit3",
"portdir": "security/metasploit3",
"version": "3.0",
"license": "unknown",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://metasploit.com/",
"description": "Tools and information for security research and pentesting",
"long_description": "The Metasploit Project goal is to provide useful information to people who perform penetration testing, IDS signature development, and exploit research. This framework was created to fill the gaps in the information publicly available on various exploitation techniques and to create a useful resource for exploit developers. The tools and information are provided for legal security research and testing purposes only.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "run",
"ports": [
"readline",
"ruby",
"rb-rails"
]
}
],
"depends_on": []
},
{
"name": "mfa",
"portdir": "security/mfa",
"version": "20210617",
"license": "MIT",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/k-saiki/mfa",
"description": "Generate TOTP(Time-based One-time Password) token with CLI.",
"long_description": "Generate TOTP(Time-based One-time Password) token with CLI.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1023
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-17"
]
}
],
"depends_on": []
},
{
"name": "minisign",
"portdir": "security/minisign",
"version": "0.12",
"license": "ISC",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://jedisct1.github.io/minisign/",
"description": "a dead simple tool to sign files and verify digital signatures",
"long_description": "Minisign is a dead simple tool to sign files and verify digital signatures.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "l2dy",
"github": "l2dy",
"ports_count": 97
}
],
"variants": [
"debug",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"cmake",
"pkgconfig",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"libsodium"
]
}
],
"depends_on": []
},
{
"name": "mkcert",
"portdir": "security/mkcert",
"version": "1.4.4",
"license": "BSD",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/FiloSottile/mkcert",
"description": "A simple zero-config tool to make locally trusted development certificates with any names you'd like",
"long_description": "mkcert is a simple tool for making locally-trusted development certificates. It requires no configuration. Using certificates from real certificate authorities (CAs) for development can be dangerous or impossible (for hosts like localhost or 127.0.0.1), but self-signed certificates cause trust errors. Managing your own CA is the best solution, but usually involves arcane commands, specialized knowledge and manual steps. mkcert automatically creates and installs a local CA in the system root store, and generates locally-trusted certificates.",
"active": true,
"categories": [
"devel",
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1023
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-17"
]
}
],
"depends_on": [
{
"type": "run",
"ports": [
"ddev"
]
}
]
},
{
"name": "murk",
"portdir": "security/murk",
"version": "0.3",
"license": "BSD-old",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://murk.sourceforge.net/",
"description": "rsync friendly encryption tool",
"long_description": "rsync friendly encryption that runs on the unix command line. Encrypt a file and backup the changes to an untrusted host.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"ctags",
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"bzip2",
"openssl10"
]
}
],
"depends_on": []
},
{
"name": "name-that-hash",
"portdir": "security/name-that-hash",
"version": "1.10.0",
"license": "GPL-3",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://nth.skerritt.blog",
"description": "The Modern Hash Identification System",
"long_description": "Don't know what type of hash it is? Name That Hash will name that hash type! Identify MD5, SHA256 and 3000+ other hashes.",
"active": true,
"categories": [
"security",
"python"
],
"maintainers": [
{
"name": "harensdeveloper",
"github": "harens",
"ports_count": 39
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"py314-build",
"py314-installer",
"py314-poetry-core"
]
},
{
"type": "lib",
"ports": [
"python314"
]
},
{
"type": "run",
"ports": [
"py314-click",
"py314-rich"
]
}
],
"depends_on": [
{
"type": "run",
"ports": [
"search-that-hash"
]
}
]
},
{
"name": "nasty",
"portdir": "security/nasty",
"version": "0.6",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.vanheusden.com/nasty/",
"description": "passphrase revovery helper for PGP and GPG keys",
"long_description": "Nasty is a program that helps you to recover the passphrase of your PGP or GPG-key in case you forget or lost it. This tool will not help if you have no clue about the passphrase!",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"gpgme",
"pth"
]
}
],
"depends_on": []
},
{
"name": "nbtscan",
"portdir": "security/nbtscan",
"version": "1.7.2",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/resurrecting-open-source-projects/nbtscan",
"description": "Scan networks for NetBIOS name information",
"long_description": "NBTscan is a program for scanning IP networks for NetBIOS name information. It sends NetBIOS status query to each address in supplied range and lists received information in human readable form. For each responded host it lists IP address, NetBIOS computer name, logged-in user name and MAC address.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"clang-17"
]
}
],
"depends_on": []
},
{
"name": "nsrllookup",
"portdir": "security/nsrllookup",
"version": "1.4.2",
"license": "ISC",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://rjhansen.github.io/nsrllookup/",
"description": "Look up hashes in the NSRL",
"long_description": "Look up hashes in the National Software Reference Library database of hashes",
"active": true,
"categories": [
"sysutils",
"security"
],
"maintainers": [],
"variants": [
"universal",
"debug"
],
"dependencies": [
{
"type": "build",
"ports": [
"cmake",
"clang-16"
]
},
{
"type": "lib",
"ports": [
"boost176"
]
}
],
"depends_on": []
},
{
"name": "oath-toolkit",
"portdir": "security/oath-toolkit",
"version": "2.6.13",
"license": "GPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.nongnu.org/oath-toolkit/",
"description": "The OATH Toolkit contains a shared library, command line tool, and PAM module for one-time password authentication.",
"long_description": "The OATH Toolkit contains a shared library, command line tool, and PAM module that makes it possible to build one-time password authentication systems. Supported technologies include the event-based HOTP algorithm and the time-based TOTP algorithm. OATH is the Open AuTHentication organization which specify the algorithms.",
"active": true,
"categories": [
"devel",
"security"
],
"maintainers": [
{
"name": "arno+macports",
"github": "fracai",
"ports_count": 14
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"gtk-doc",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"libtool",
"xmlsec",
"libxml2"
]
}
],
"depends_on": [
{
"type": "run",
"ports": [
"pass-otp"
]
}
]
},
{
"name": "oauth2-proxy",
"portdir": "security/oauth2-proxy",
"version": "7.13.0",
"license": "MIT",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://oauth2-proxy.github.io/oauth2-proxy",
"description": "A reverse proxy that provides authentication with Google, GitHub or other providers.",
"long_description": "A reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others) to validate accounts by email, domain or group.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1023
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "openfpc",
"portdir": "security/openfpc",
"version": "0.1a",
"license": "GPL-2+",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "https://code.google.com/p/openfpc/",
"description": "lightweight full-packet network traffic recorder & buffering tool",
"long_description": "OpenFPC is a set of scripts that combine to provide a lightweight full-packet network traffic recorder & buffering tool. Its design goal is to allow non-expert users to deploy a distributed network traffic recorder on COTS hardware while integrating into existing alert and log tools.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-14"
]
},
{
"type": "lib",
"ports": [
"perl5.34"
]
}
],
"depends_on": []
},
{
"name": "openpace",
"portdir": "security/openpace",
"version": "1.1.3",
"license": "GPL-3",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/frankmorgner/openpace",
"description": "Cryptographic library for EAC version 2",
"long_description": "OpenPACE implements Extended Access Control (EAC) version 2 as specified in BSI TR-03110.",
"active": true,
"categories": [
"security",
"libs"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"gengetopt",
"pkgconfig",
"help2man",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"openssl3"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"opensc"
]
}
]
},
{
"name": "openpgpsdk",
"portdir": "security/openpgpsdk",
"version": "0.9",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://openpgp.nominet.org.uk/",
"description": "OpenPGP library SDK",
"long_description": "The OpenPGP SDK project provides an open source library, written in C, which implements the OpenPGP specification.",
"active": true,
"categories": [
"devel",
"security"
],
"maintainers": [],
"variants": [
"doc"
],
"dependencies": [
{
"type": "build",
"ports": [
"perl5",
"gnupg2",
"clang-14"
]
},
{
"type": "lib",
"ports": [
"bzip2",
"openssl",
"zlib",
"cunit"
]
}
],
"depends_on": []
},
{
"name": "opensc",
"portdir": "security/opensc",
"version": "0.26.1",
"license": "LGPL-2.1",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/OpenSC/OpenSC",
"description": "Tools and libraries for smart cards",
"long_description": "OpenSC provides a set of libraries and utilities to work with smart cards. Its main focus is on cards that support cryptographic operations, and facilitate their use in security applications such as authentication, mail encryption and digital signatures. OpenSC implements the PKCS#11 API so applications supporting this API (such as Mozilla Firefox and Thunderbird) can use it. On the card OpenSC implements the PKCS#15 standard and aims to be compatible with every software/card that does so, too.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"eac",
"p11kit",
"readline",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-17",
"pkgconfig",
"docbook-xsl-nons",
"help2man",
"libxslt",
"autoconf",
"automake",
"gengetopt",
"libtool"
]
},
{
"type": "lib",
"ports": [
"readline",
"openpace",
"openssl3",
"zlib"
]
}
],
"depends_on": [
{
"type": "build",
"ports": [
"pkcs11-provider"
]
},
{
"type": "run",
"ports": [
"sequoia-keystore"
]
}
]
},
{
"name": "openvas-client",
"portdir": "security/openvas-client",
"version": "2.0.5",
"license": "(GPL-2 or OpenSSLException)",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.openvas.org/",
"description": "Open Vulnerability Assessment System client",
"long_description": "OpenVAS is the Open Vulnerability Assessment System. This port is the client component.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-15"
]
},
{
"type": "lib",
"ports": [
"openssl",
"gtk2",
"gd2"
]
}
],
"depends_on": []
},
{
"name": "openvas-libnasl",
"portdir": "security/openvas-libnasl",
"version": "2.0.2",
"license": "(GPL-2 or OpenSSLException)",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.openvas.org/",
"description": "Open Vulnerability Assessment System NASL library",
"long_description": "OpenVAS is the Open Vulnerability Assessment System. This port contains the Nessus Attack Scripting Language (NASL) library used by the server component.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"bison",
"pkgconfig",
"gsed",
"clang-15"
]
},
{
"type": "lib",
"ports": [
"gpgme",
"openvas-libraries"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"openvas-server"
]
}
]
},
{
"name": "openvas-libraries",
"portdir": "security/openvas-libraries",
"version": "2.0.4",
"license": "(GPL-2 or OpenSSLException)",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.openvas.org/",
"description": "Open Vulnerability Assessment System libraries",
"long_description": "OpenVAS is the Open Vulnerability Assessment System. This port contains the libraries used by the server component.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-15"
]
},
{
"type": "lib",
"ports": [
"gnutls",
"gettext",
"libpcap",
"libgcrypt",
"glib2"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"openvas-libnasl"
]
}
]
},
{
"name": "openvas-plugins",
"portdir": "security/openvas-plugins",
"version": "1.0.7",
"license": "(GPL-2 or OpenSSLException)",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.openvas.org/",
"description": "Open Vulnerability Assessment System plugins",
"long_description": "OpenVAS is the Open Vulnerability Assessment System. This port contains the plugins used by the server component.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"gsed",
"clang-15"
]
},
{
"type": "lib",
"ports": [
"glib2",
"openvas-server"
]
}
],
"depends_on": []
},
{
"name": "openvas-server",
"portdir": "security/openvas-server",
"version": "2.0.3",
"license": "(GPL-2 or OpenSSLException)",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.openvas.org/",
"description": "Open Vulnerability Assessment System server",
"long_description": "OpenVAS is the Open Vulnerability Assessment System. This port is the server component.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-15"
]
},
{
"type": "lib",
"ports": [
"openvas-libnasl",
"xorg-libX11"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"openvas-plugins"
]
}
]
},
{
"name": "ophcrack",
"portdir": "security/ophcrack",
"version": "3.8.0",
"license": "(GPL-2+ or OpenSSLException)",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://ophcrack.sourceforge.io",
"description": "Microsoft Windows password cracker",
"long_description": "Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"gui",
"tables",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"openssl",
"expat"
]
}
],
"depends_on": []
},
{
"name": "outguess",
"portdir": "security/outguess",
"version": "0.4",
"license": "BSD-old and Noncommercial and IJG",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/resurrecting-open-source-projects/outguess",
"description": "steganographic tool",
"long_description": "OutGuess is a universal steganographic tool that allows the insertion of hidden information into the redundant bits of data sources. The nature of the data source is irrelevant to the core of OutGuess. The program relies on data specific handlers that will extract redundant bits and write them back after modification. In this version the PNM and JPEG image formats are supported. In the next paragraphs, images will be used as concrete example of data objects, though OutGuess can use any kind of data, as long as a handler is provided.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"clang-12"
]
}
],
"depends_on": []
},
{
"name": "p11-kit",
"portdir": "security/p11-kit",
"version": "0.26.2",
"license": "Permissive",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/p11-glue/p11-kit",
"description": "PKCS#11 module discovery and loading",
"long_description": "Provides a way to load and enumerate PKCS#11 modules and a standard configuration setup for installing PKCS#11 modules in such a way that they are discoverable.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"doc",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"python313",
"gettext",
"pkgconfig",
"clang-18"
]
},
{
"type": "extract",
"ports": [
"xz"
]
},
{
"type": "lib",
"ports": [
"libffi",
"libtasn1",
"libxslt",
"gettext-runtime"
]
},
{
"type": "run",
"ports": [
"curl-ca-bundle"
]
}
],
"depends_on": [
{
"type": "build",
"ports": [
"pkcs11-provider"
]
},
{
"type": "lib",
"ports": [
"gnutls",
"gnutls-devel",
"VLC2",
"libVLC2",
"glib-networking",
"openconnect",
"gcr",
"redwax-tool"
]
}
]
},
{
"name": "pam-google-authenticator",
"portdir": "security/pam-google-authenticator",
"version": "1.11",
"license": "apache-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/google/google-authenticator-libpam",
"description": "Pluggable Authentication Module for Google Authenticator",
"long_description": "The Google Authenticator PAM module provides an easy way use Google's 2FA (via Google Authenticator app) to your existing user authentication infrastructure.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "eborisch",
"github": "eborisch",
"ports_count": 222
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"clang-17"
]
},
{
"type": "run",
"ports": [
"qrencode"
]
}
],
"depends_on": []
},
{
"name": "pam-u2f",
"portdir": "security/pam-u2f",
"version": "1.4.0",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://developers.yubico.com/pam-u2f/",
"description": "Pluggable Authentication Module (PAM) for U2F",
"long_description": "The PAM U2F module provides an easy way to integrate the Yubikey (or other U2F-compliant authenticators) into your existing user authentication infrastructure. PAM is used by GNU/Linux, Solaris and Mac OS X for user authentication.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "l2dy",
"github": "l2dy",
"ports_count": 97
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"autoconf",
"automake",
"gengetopt",
"libtool",
"pkgconfig",
"asciidoc"
]
},
{
"type": "lib",
"ports": [
"libfido2"
]
}
],
"depends_on": []
},
{
"name": "paperkey",
"portdir": "security/paperkey",
"version": "1.6",
"license": "GPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.jabberwocky.com/software/paperkey/",
"description": "An OpenPGP key archiver",
"long_description": "A reasonable way to achieve a long term backup of OpenPGP keys is to print them out on paper. Paper and ink have amazingly long retention qualities - far longer than the magnetic or optical means that are generally used to back up computer data.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "larryv",
"github": "larryv",
"ports_count": 48
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "pass",
"portdir": "security/pass",
"version": "1.7.4",
"license": "GPL-2+",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.passwordstore.org/",
"description": "pass is the standard unix password manager",
"long_description": "pass is the standard unix password manager",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "judaew",
"github": "judaew",
"ports_count": 652
}
],
"variants": [
"external_gpg"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-16"
]
},
{
"type": "extract",
"ports": [
"xz"
]
},
{
"type": "run",
"ports": [
"util-linux",
"gnupg2",
"tree",
"qrencode",
"git"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"pass-import",
"pass-update"
]
},
{
"type": "run",
"ports": [
"pass-otp",
"pass-update"
]
}
]
},
{
"name": "pass-import",
"portdir": "security/pass-import",
"version": "0.1",
"license": "GPL-2+",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/roddhjav/pass-import",
"description": "A generic importer extension for the standard unix password manager pass.",
"long_description": "A generic importer extension for the standard unix password manager pass.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"coreutils",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"pass"
]
}
],
"depends_on": []
},
{
"name": "pass-otp",
"portdir": "security/pass-otp",
"version": "1.2.0",
"license": "GPL-3",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/tadfisher/pass-otp",
"description": "A pass extension for managing one-time-password (OTP) tokens",
"long_description": "A pass extension for managing one-time-password (OTP) tokens",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "loic-github",
"github": "lpefferkorn",
"ports_count": 1
},
{
"name": "judaew",
"github": "judaew",
"ports_count": 652
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-14"
]
},
{
"type": "run",
"ports": [
"qrencode",
"oath-toolkit",
"pass"
]
}
],
"depends_on": []
},
{
"name": "pass-update",
"portdir": "security/pass-update",
"version": "2.2.1",
"license": "GPL-2",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/roddhjav/pass-update",
"description": "A pass extension that provides a convenient solution to update an existing password.",
"long_description": "A pass extension that provides a convenient solution to update an existing password.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "judaew",
"github": "judaew",
"ports_count": 652
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"coreutils",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"pass"
]
},
{
"type": "run",
"ports": [
"pass"
]
}
],
"depends_on": []
},
{
"name": "pbc",
"portdir": "security/pbc",
"version": "1.0.0",
"license": "LGPL-3",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://crypto.stanford.edu/pbc/",
"description": "The Pairing-Based Cryptography Library",
"long_description": "The Pairing-Based Cryptography Library \n\nPairing-based cryptography is a relatively young area of cryptography that revolves around a certain function with special properties. \n\nThe PBC (Pairing-Based Cryptography) library is a free C library built on the GMP library that performs the mathematical operations underlying pairing-based cryptosystems. \n\nThe PBC library is designed to be the backbone of implementations of pairing-based cryptosystems, thus speed and portability are important goals. It provides routines such as elliptic curve generation, elliptic curve arithmetic and pairing computation. Thanks to the GMP library, despite being written in C, pairings times are reasonable.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"gmp"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"cpabe",
"libbswabe"
]
}
]
}
]
}