HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"count": 50734,
"next": "https://ports.macports.org/api/v1/ports/?format=api&ordering=created_at&page=487",
"previous": "https://ports.macports.org/api/v1/ports/?format=api&ordering=created_at&page=485",
"results": [
{
"name": "pdfid",
"portdir": "security/pdfid",
"version": "0.2.10",
"license": "public-domain",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "http://blog.didierstevens.com/programs/pdf-tools/#pdfid",
"description": "Tool to test a PDF file",
"long_description": "Tool to test a PDF file",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "extract",
"ports": [
"unzip"
]
}
],
"depends_on": []
},
{
"name": "pdfparser",
"portdir": "security/pdfparser",
"version": "0.7.6",
"license": "public-domain",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "http://blog.didierstevens.com/programs/pdf-tools/#pdfid",
"description": "parse a PDF document to identify the fundamental elements used",
"long_description": "parse a PDF document to identify the fundamental elements used",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-14"
]
},
{
"type": "extract",
"ports": [
"unzip"
]
}
],
"depends_on": []
},
{
"name": "pgp",
"portdir": "security/pgp",
"version": "50i",
"license": "Restrictive",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.pgpi.org/",
"description": "Public-Key encryption for the masses",
"long_description": "PGP 5.0 contains support for new encryption methods (most notably DSS/Diffie-Hellman), and built-in keyserver support. Also, the command line has been redesigned to be more Unix and scripting friendly. Note: this software is old; you probably want gnupg or gnupg2 instead.",
"active": false,
"categories": [
"security",
"mail"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "pgpdump",
"portdir": "security/pgpdump",
"version": "0.37",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.mew.org/~kazu/proj/pgpdump/en/",
"description": "PGP packet visualizer",
"long_description": "pgpdump is a PGP packet visualizer which displays the packet format of OpenPGP (RFC 4880) and PGP version 2 (RFC 1991).",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"bzip2",
"zlib"
]
}
],
"depends_on": []
},
{
"name": "pidgin-otr",
"portdir": "security/pidgin-otr",
"version": "4.0.2",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.cypherpunks.ca/otr/",
"description": "Off-the-Record Plugin for Pidgin",
"long_description": "This is a pidgin plugin which implements Off-the-Record (OTR) Messaging. OTR allows you to have private conversations over IM by providing: - Encryption - No one else can read your instant messages. - Authentication - You are assured the correspondent is who you think it is. - Deniability - The messages you send do _not_ have digital signatures that are checkable by a third party. Anyone can forge messages after a conversation to make them look like they came from you. However, _during_ a conversation, your correspondent is assured the messages he sees are authentic and unmodified. - Perfect forward secrecy - If you lose control of your private keys, no previous conversation is compromised.",
"active": true,
"categories": [
"net",
"security",
"chat"
],
"maintainers": [
{
"name": "rsync",
"github": "",
"ports_count": 3
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-17",
"libtool",
"pkgconfig",
"intltool",
"autoconf",
"automake",
"gettext"
]
},
{
"type": "lib",
"ports": [
"libotr",
"gettext-runtime",
"pidgin"
]
}
],
"depends_on": []
},
{
"name": "pinentry",
"portdir": "security/pinentry",
"version": "1.3.2",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://gnupg.org/software/pinentry/",
"description": "Passphrase entry dialog utilizing the Assuan protocol",
"long_description": "This is a collection of simple PIN or passphrase entry dialogs in a secure manner.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "ionic",
"github": "Ionic",
"ports_count": 24
}
],
"variants": [
"gtk2",
"gnome3",
"qt4",
"qt5",
"fltk",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"libassuan",
"libgpg-error",
"ncurses",
"libiconv"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"lastpass-cli",
"gnupg2"
]
}
]
},
{
"name": "pkcs11-helper",
"portdir": "security/pkcs11-helper",
"version": "1.29.0",
"license": "GPL-2+ and BSD",
"platforms": "darwin freebsd",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/OpenSC/pkcs11-helper",
"description": "Library that simplifies the interaction with PKCS#11 providers for end-user applications using a simple API and optional OpenSSL engine",
"long_description": "Library that simplifies the interaction with PKCS#11 providers for end-user applications using a simple API and optional OpenSSL engine",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"automake",
"pkgconfig",
"clang-17",
"autoconf",
"libtool"
]
},
{
"type": "lib",
"ports": [
"openssl11",
"gnutls"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"gnupg-pkcs11-scd",
"qca-pkcs11",
"qca-qt5-pkcs11"
]
}
]
},
{
"name": "policykit",
"portdir": "security/policykit",
"version": "0.121",
"license": "LGPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://gitlab.freedesktop.org/polkit/polkit",
"description": "PolicyKit is an application-level toolkit for defining and handling the policy that allows unprivileged processes to speak to privileged processes",
"long_description": "PolicyKit is an application-level toolkit for defining and handling the policy that allows unprivileged processes to speak to privileged processes",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "devans",
"github": "dbevans",
"ports_count": 2625
}
],
"variants": [
"docs",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-14",
"docbook-xml-4.5",
"docbook-xsl-nons",
"libxslt",
"gettext",
"meson",
"ninja",
"pkgconfig",
"gobject-introspection",
"docbook-xml-4.1.2"
]
},
{
"type": "lib",
"ports": [
"glib2",
"duktape",
"dbus"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"accountsservice",
"gconf",
"policykit-gnome",
"polkit-qt",
"polkit-qt5-devel",
"gnome-applets",
"gnome-control-center",
"gnome-panel",
"gnome-settings-daemon"
]
}
]
},
{
"name": "portsentry",
"portdir": "security/portsentry",
"version": "1.2",
"license": "CPL-1",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://sourceforge.net/projects/sentrytools/",
"description": "port scan detection and active defense",
"long_description": "PortSentry is part of the Abacus Project suite of security tools. It is a program designed to detect and respond to port scans against a target host in real-time. There are other port scan detectors that perform similar detection of scans, but PortSentry has some unique features that may make it worth looking into.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "prelude-lml",
"portdir": "security/prelude-lml",
"version": "5.2.0",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.prelude-siem.org/",
"description": "Prelude Sensor for analyzing logs and collecting Syslog events",
"long_description": "Prelude is an Hybrid intrusion detection system framework that relies on the IDMEF (Intrusion Detection Message Exchange Format) IETF standard. It enables security sensors such as Snort, honeyd, Nessus Vulnerability Scanner, Samhain, over 30 types of system logs, and many others to verify an attack by performing automatic correlation between events. This port provides the 'log monitoring lackey'",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"gnutls",
"icu",
"pcre",
"libprelude"
]
}
],
"depends_on": []
},
{
"name": "prelude-manager",
"portdir": "security/prelude-manager",
"version": "5.2.0",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.prelude-siem.org/",
"description": "collects and normalize security events from Prelude sensors",
"long_description": "Prelude is a Universal Security Information Management (SIM) system. Prelude collects, normalizes, sorts, aggregates, correlates and reports all security-related events independently of the product brand or license giving rise to such events. Prelude-Manager is a high availability server that accepts secured connections from distributed sensors and/or other Managers and saves received events to a media specified by the user (database, log file, mail etc.).",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"net-snmp",
"tcp_wrappers",
"gnutls",
"libpreludedb",
"libxml2",
"libprelude",
"libev",
"libgeoip",
"libmaxminddb",
"libtool"
]
}
],
"depends_on": []
},
{
"name": "putty",
"portdir": "security/putty",
"version": "0.83",
"license": "MIT",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.chiark.greenend.org.uk/~sgtatham/putty/",
"description": "A free implementation of Telnet and SSH, along with an xterm terminal emulator",
"long_description": "PuTTY is A free implementation of Telnet and SSH, along with an xterm terminal emulator.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [
"debug",
"gui",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"cmake",
"pkgconfig",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"gtk3"
]
}
],
"depends_on": []
},
{
"name": "pwman",
"portdir": "security/pwman",
"version": "0.4.4",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://sourceforge.net/projects/pwman",
"description": "curses based password management program",
"long_description": "PWman is a curses based password storage application. It uses GnuPG to encrypt and decrypt the password file. The interface was inspired by Jaako Heinonen's abook.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "mni",
"github": "",
"ports_count": 27
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"ncurses",
"gnupg2",
"libxml2"
]
}
],
"depends_on": []
},
{
"name": "pwsafe",
"portdir": "security/pwsafe",
"version": "0.2.0",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://nsd.dyndns.org/pwsafe/",
"description": "manage encrypted password databases",
"long_description": "pwsafe is a command-line program that manages encrypted password databases",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"ncurses",
"openssl",
"readline",
"xorg-libXmu"
]
}
],
"depends_on": []
},
{
"name": "qtkeychain",
"portdir": "security/qtkeychain",
"version": "0.13.2",
"license": "BSD",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "",
"description": "QtKeyChain stores passwords securely",
"long_description": "QtKeyChain stores passwords securely",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"qt5",
"qt6",
"qt4",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-16"
]
},
{
"type": "lib",
"ports": [
"pkgconfig",
"qtkeychain-qt6"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"owncloud-client"
]
}
]
},
{
"name": "qtkeychain-qt4",
"portdir": "security/qtkeychain",
"version": "0.11.1",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/frankosterfeld/qtkeychain",
"description": "QtKeyChain stores passwords securely",
"long_description": "QtKeyChain stores passwords securely",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"debug",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"cmake",
"pkgconfig",
"clang-16"
]
},
{
"type": "lib",
"ports": [
"qt4-mac",
"pkgconfig"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"Deriv"
]
}
]
},
{
"name": "qtkeychain-qt5",
"portdir": "security/qtkeychain",
"version": "0.13.2",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/frankosterfeld/qtkeychain",
"description": "QtKeyChain stores passwords securely",
"long_description": "QtKeyChain stores passwords securely",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"debug"
],
"dependencies": [
{
"type": "build",
"ports": [
"qt5-qttools",
"cmake",
"pkgconfig",
"clang-16"
]
},
{
"type": "lib",
"ports": [
"qt5-qttranslations",
"pkgconfig",
"qt5-qtbase"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"nheko",
"qgis3",
"qgis3-ltr",
"trojita",
"nextcloud-client"
]
}
]
},
{
"name": "rats",
"portdir": "security/rats",
"version": "2.4",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://code.google.com/p/rough-auditing-tool-for-security/",
"description": "Rough Auditing Tool for Security",
"long_description": "RATS is a tool for scanning C, Perl, PHP and Python source code and flagging common security related programming errors such as buffer overflows and TOCTOU (Time Of Check, Time Of Use) race conditions.",
"active": true,
"categories": [
"devel",
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"expat"
]
}
],
"depends_on": []
},
{
"name": "reaver",
"portdir": "security/reaver",
"version": "1.6.6",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/t6x/reaver-wps-fork-t6x",
"description": "Brute-force attack against Wi-Fi Protected Setup",
"long_description": "Reaver implements a brute-force attack against Wi-Fi Protected Setup which can crack the WPS PIN of a wireless access point in a matter of hours and subsequently recover the WPA/WPA2 passphrase. Reaver includes Wash, a utility for identifying potentially vulnerable access points.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [
{
"name": "ryandesign",
"github": "ryandesign",
"ports_count": 1827
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "extract",
"ports": [
"xz"
]
},
{
"type": "lib",
"ports": [
"libpcap"
]
},
{
"type": "run",
"ports": [
"aircrack-ng"
]
}
],
"depends_on": []
},
{
"name": "rekall",
"portdir": "security/rekall",
"version": "1.7.1",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": "volatility3",
"homepage": "https://www.macports.org",
"description": "Obsolete port, replaced by volatility3",
"long_description": "This port has been replaced by volatility3.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "extract",
"ports": [
null
]
},
{
"type": "fetch",
"ports": [
null
]
},
{
"type": "lib",
"ports": [
null
]
},
{
"type": "patch",
"ports": [
null
]
},
{
"type": "run",
"ports": [
null
]
},
{
"type": "test",
"ports": [
null
]
}
],
"depends_on": []
},
{
"name": "rsyncrypto",
"portdir": "security/rsyncrypto",
"version": "1.14",
"license": "(GPL-2+ or OpenSSLException)",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://sourceforge.net/projects/rsyncrypto/",
"description": "rsync friendly file encryption",
"long_description": "A slightly reduced strength bulk encryption. In exchange for the reduced strength, you get the ability to rsync the encrypted files, so that local changes in the plaintext file will result in (relatively) local changes to the cyphertext file.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "ryandesign",
"github": "ryandesign",
"ports_count": 1827
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"gzip",
"argtable",
"openssl"
]
}
],
"depends_on": []
},
{
"name": "sancp",
"portdir": "security/sancp",
"version": "1.6.1",
"license": "QPL-1",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://sancp.sourceforge.net",
"description": "Security Analyst Network Connection Profiler",
"long_description": "This is a network security tool designed to collect statistical information regarding network traffic, as well as, collect the traffic itself in pcap format, all for the purpose of: auditing, historical analysis, and network activity discovery.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"libpcap"
]
}
],
"depends_on": []
},
{
"name": "scponly",
"portdir": "security/scponly",
"version": "4.6",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.sublimation.org/scponly/",
"description": "Limited shell which wraps scp/sftp",
"long_description": "scponly is an alternative 'shell' (of sorts) for system administrators who would like to provide access to remote users to both read and write local files without providing any remote execution priviledges. Functionally, it is best described as a wrapper to the mostly trusted suite of ssh applications.",
"active": true,
"categories": [
"sysutils",
"net",
"security"
],
"maintainers": [],
"variants": [
"noWildcards",
"noWinscpCompat",
"rsyncCompat",
"chroot",
"scpCompat",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"openssh"
]
}
],
"depends_on": []
},
{
"name": "scrub",
"portdir": "security/scrub",
"version": "2.6.1",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/chaos/scrub",
"description": "Overwrites files or devices with patterns",
"long_description": "Scrub writes patterns on special files (i.e. raw disk devices) or regular files to make retrieving the data more difficult. Scrub writes NNSA NAP-14.x, DoD 5220.22-M, BSI, 35-pass gutmann, or one of several other selectable pattern sequences",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "scrypt",
"portdir": "security/scrypt",
"version": "1.3.3",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.tarsnap.com/scrypt.html",
"description": "key derivation function",
"long_description": "The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more secure against hardware brute-force attacks than alternative functions such as PBKDF2 or bcrypt.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"openssl3"
]
}
],
"depends_on": []
},
{
"name": "secpwgen",
"portdir": "security/secpwgen",
"version": "1.3",
"license": "MIT",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.core-dump.com.hr/index.pl?node_id=407",
"description": "An utility for generating secure passphrases",
"long_description": "An utility for generating secure passphrases. Implements several methods for passphrase generation including the Diceware method with 8192 word dictionary compiled in the executable.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"cryptlib"
]
}
],
"depends_on": []
},
{
"name": "sequoia-pgp",
"portdir": "security/sequoia-pgp",
"version": "0.25.0",
"license": "GPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://sequoia-pgp.org/",
"description": "Sequoia PGP",
"long_description": "Sequoia is a cool new OpenPGP implementation. It consists of several crates, providing both a low-level and a high-level API for dealing with OpenPGP data.",
"active": false,
"categories": [
"security"
],
"maintainers": [
{
"name": "jann",
"github": "roederja",
"ports_count": 10
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-14",
"cargo",
"pkgconfig",
"rust",
"coreutils"
]
},
{
"type": "lib",
"ports": [
"capnproto",
"nettle",
"openssl",
"sqlite3"
]
}
],
"depends_on": []
},
{
"name": "sf-pwgen",
"portdir": "security/sf-pwgen",
"version": "1.5",
"license": "zlib",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/anders/pwgen",
"description": "macOS command line password generator.",
"long_description": "macOS command line password generator. A command line tool that generates passwords using macOS's SecurityFoundation framework.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-17"
]
}
],
"depends_on": [
{
"type": "build",
"ports": [
"privoxy",
"adblock2privoxy"
]
},
{
"type": "lib",
"ports": [
"mail-server"
]
}
]
},
{
"name": "sguil-client",
"portdir": "security/sguil-client",
"version": "1.0.0",
"license": "GPL-3",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "https://bammv.github.io/sguil/",
"description": "GUI Console for Sguil Network Security Monitor",
"long_description": "GUI Console for Sguil Network Security Monitor",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-16"
]
},
{
"type": "lib",
"ports": [
"openssl",
"tcl-tls",
"tcllib",
"tclx",
"itk",
"iwidgets"
]
}
],
"depends_on": []
},
{
"name": "shibboleth",
"portdir": "security/shibboleth",
"version": "3.4.1",
"license": "Apache",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.shibboleth.net/",
"description": "Shibboleth Native Service Provider",
"long_description": "The Shibboleth System is a standards based, open source software package for web single sign-on across or within organizational boundaries. It allows sites to make informed authorization decisions for individual access of protected online resources in a privacy-preserving manner.",
"active": true,
"categories": [
"security",
"www",
"shibboleth"
],
"maintainers": [
{
"name": "snc",
"github": "nerdling",
"ports_count": 157
},
{
"name": "scantor",
"github": "scantor",
"ports_count": 6
}
],
"variants": [
"odbc",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-17",
"autoconf",
"automake",
"libtool",
"pkgconfig",
"boost176"
]
},
{
"type": "lib",
"ports": [
"opensaml",
"xml-security-c",
"xmltooling",
"log4shib",
"xercesc3",
"apache2"
]
}
],
"depends_on": []
},
{
"name": "sign",
"portdir": "security/sign",
"version": "1.1",
"license": "BSD and zlib and ISC",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://swapped.cc/sign/",
"description": "sign is a file signing and signature verification utility",
"long_description": "sign is a file signing and signature verification utility",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"openssl10"
]
}
],
"depends_on": []
},
{
"name": "signify",
"portdir": "security/signify",
"version": "1.62",
"license": "ISC",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://man.openbsd.org/signify.1",
"description": "cryptographically sign and verify files",
"long_description": "The signify utility creates and verifies cryptographic signatures. A signature verifies the integrity of a message.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "jpo",
"github": "jpouellet",
"ports_count": 4
},
{
"name": "artkiver",
"github": "artkiver",
"ports_count": 12
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "skipfish",
"portdir": "security/skipfish",
"version": "2.10b",
"license": "Apache-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://code.google.com/p/skipfish/",
"description": "web application security scanner",
"long_description": "A fully automated, active web application security reconnaissance tool.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-16"
]
},
{
"type": "lib",
"ports": [
"zlib",
"openssl10",
"pcre",
"libidn"
]
}
],
"depends_on": []
},
{
"name": "softhsm",
"portdir": "security/softhsm",
"version": "2.6.1",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.opendnssec.org/softhsm",
"description": "Software implementation of a Hardware Security Module (HSM)",
"long_description": "SoftHSM is an implementation of a cryptographic store accessible through a PKCS #11 interface. You can use it to explore PKCS #11 without having a Hardware Security Module. SoftHSM Version 2 is using openssl for its cryptographic operations.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "ian",
"github": "iay",
"ports_count": 1
},
{
"name": "jaap",
"github": "Jakker",
"ports_count": 9
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"cppunit",
"libtool",
"pkgconfig",
"clang-15"
]
},
{
"type": "lib",
"ports": [
"sqlite3",
"openssl"
]
}
],
"depends_on": [
{
"type": "build",
"ports": [
"pkcs11-provider"
]
}
]
},
{
"name": "sops",
"portdir": "security/sops",
"version": "3.11.0",
"license": "MPL-2",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/mozilla/sops",
"description": "Simple and flexible tool for managing secrets",
"long_description": "Simple and flexible tool for managing secrets. sops is an editor of encrypted files that supports YAML, JSON, ENV, INI and BINARY formats and encrypts with AWS KMS, GCP KMS, Azure Key Vault and PGP.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1023
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "sqlmap",
"portdir": "security/sqlmap",
"version": "1.10",
"license": "GPL-2+",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://sqlmap.org/",
"description": "Automatic SQL injection and database takeover tool",
"long_description": "sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches including database fingerprinting, over data fetching from the database, accessing the underlying file system, and executing commands on the operating system via out-of-band connections.",
"active": true,
"categories": [
"databases",
"security",
"python"
],
"maintainers": [
{
"name": "judaew",
"github": "judaew",
"ports_count": 652
}
],
"variants": [
"python27",
"python310",
"python311",
"python312",
"python313",
"python314"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"py314-build",
"py314-installer",
"py314-setuptools",
"py314-wheel"
]
},
{
"type": "lib",
"ports": [
"python314"
]
}
],
"depends_on": []
},
{
"name": "sqlninja",
"portdir": "security/sqlninja",
"version": "0.2.6-r1",
"license": "GPL-3+",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "http://sqlninja.sourceforge.net/",
"description": "Microsoft SQL Server SQL Injection vulnerability tester",
"long_description": "Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [
"perl5_28",
"perl5_30",
"perl5_32",
"perl5_34"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-16"
]
},
{
"type": "lib",
"ports": [
"p5.34-io-socket-ssl",
"p5.34-net-dns",
"p5.34-net-pcap",
"p5.34-net-rawip",
"p5.34-netpacket"
]
}
],
"depends_on": []
},
{
"name": "sqlninja-devel",
"portdir": "security/sqlninja",
"version": "0.2.999-alpha1",
"license": "GPL-3+",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "http://sqlninja.sourceforge.net/",
"description": "Microsoft SQL Server SQL Injection vulnerability tester",
"long_description": "Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [
"perl5_34",
"perl5_28",
"perl5_30",
"perl5_32"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-16"
]
},
{
"type": "lib",
"ports": [
"p5.34-dbi",
"p5.34-io-socket-ssl",
"p5.34-net-dns",
"p5.34-dbd-sqlite",
"p5.34-net-rawip",
"p5.34-netpacket",
"p5.34-net-pcap"
]
}
],
"depends_on": []
},
{
"name": "ssdeep",
"portdir": "security/ssdeep",
"version": "2.14.1",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://ssdeep-project.github.io/ssdeep/",
"description": "Recursively compute fuzzy hashes on files",
"long_description": "ssdeep is a program for computing fuzzy hashes on files. These hashes can be used for finding similar files.",
"active": true,
"categories": [
"sysutils",
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "ssss",
"portdir": "security/ssss",
"version": "1.0.1",
"license": "Apache-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/okoeroo/ssss",
"description": "Shamir's Secret Sharing Service",
"long_description": "Shamir's Secret Sharing is an algorithm in cryptography. It is a form of secret sharing, where a secret is divided into parts, giving each participant its own unique part, where some of the parts or all of them are needed in order to reconstruct the secret. Counting on all participants to combine together the secret might be impractical, and therefore sometimes the threshold scheme is used where any k of the parts are sufficient to reconstruct the original secret.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "okoeroo",
"github": "",
"ports_count": 2
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"openssl"
]
}
],
"depends_on": []
},
{
"name": "stegdetect",
"portdir": "security/stegdetect",
"version": "0.6",
"license": "BSD-old and SSLeay and Permissive and IJG",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.outguess.org/detection.php",
"description": "tool for detecting steganographic content in jpeg images.",
"long_description": "Stegdetect is an automated tool for detecting steganographic content in images. It is capable of detecting several different steganographic methods to embed hidden information in jpeg images.",
"active": true,
"categories": [
"graphics",
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
}
],
"depends_on": []
},
{
"name": "steghide",
"portdir": "security/steghide",
"version": "0.5.1",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://steghide.sourceforge.net/",
"description": "Steghide is a steganography program",
"long_description": "Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "cforkin",
"github": "",
"ports_count": 1
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"libtool",
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"libmcrypt",
"mhash",
"zlib",
"libiconv",
"libjpeg-turbo",
"gettext"
]
}
],
"depends_on": []
},
{
"name": "step-cli",
"portdir": "security/step-cli",
"version": "0.28.7",
"license": "Apache-2",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/smallstep/cli",
"description": "A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.",
"long_description": "step is a toolkit for working with your public key infrastructure (PKI). It's also the client counterpart to the step-ca online Certificate Authority (CA).",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1023
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "stunnel",
"portdir": "security/stunnel",
"version": "5.76",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://www.stunnel.org/",
"description": "SSL tunneling program",
"long_description": "Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [
{
"name": "mps",
"github": "Schamschula",
"ports_count": 1297
}
],
"variants": [
"openssl1",
"openssl3",
"libwrap",
"mimalloc",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"tcp_wrappers",
"openssl3"
]
}
],
"depends_on": []
},
{
"name": "tcpcrypt-devel",
"portdir": "security/tcpcrypt-devel",
"version": "0.5",
"license": "BSD",
"platforms": "darwin freebsd",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/scslab/tcpcrypt",
"description": "encrypt (almost) all of your network traffic",
"long_description": "Tcpcrypt is a protocol that attempts to encrypt (almost) all of your network traffic. Unlike other security mechanisms, Tcpcrypt works out of the box: it requires no configuration, no changes to applications, and your network connections will continue to work even if the remote end does not support Tcpcrypt, in which case connections will gracefully fall back to standard clear-text TCP. Install Tcpcrypt and you'll feel no difference in your every day user experience, but yet your traffic will be more secure and you'll have made life much harder for hackers.",
"active": true,
"categories": [
"security",
"www"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"openssl"
]
}
],
"depends_on": []
},
{
"name": "tfsec",
"portdir": "security/tfsec",
"version": "1.28.14",
"license": "MIT",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/tfsec/tfsec",
"description": "Security scanner for your Terraform code",
"long_description": "Security scanner for your Terraform code. tfsec uses static analysis of your Terraform templates to spot potential security issues.",
"active": true,
"categories": [
"sysutils",
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1023
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-17"
]
}
],
"depends_on": []
},
{
"name": "tinyca2",
"portdir": "security/tinyca2",
"version": "0.7.5",
"license": "GPL-2+",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "https://salsa.debian.org/cpt_nemo-guest/tinyca",
"description": "GUI Certificate Authority tool.",
"long_description": "TinyCA is a simple graphical user interface for managing a small CA (Certification Authority). TinyCA works as a frontend for openssl.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [
"perl5_28",
"perl5_30",
"perl5_32",
"perl5_34"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-16"
]
},
{
"type": "lib",
"ports": [
"zip",
"gettext",
"openssl",
"p5.34-gtk2",
"p5.34-locale-gettext"
]
}
],
"depends_on": []
},
{
"name": "tor",
"portdir": "security/tor",
"version": "0.4.8.17",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.torproject.org/",
"description": "anonymizing overlay network for TCP",
"long_description": "Tor provides a distributed network of servers (onion routers). Users bounce their TCP streams (web traffic, FTP, SSH, etc.) around the routers. This makes it hard for recipients, observers, and even the onion routers themselves to track the source of the stream.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [
{
"name": "i0ntempest",
"github": "i0ntempest",
"ports_count": 228
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"zlib",
"libevent",
"openssl3"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"py312-torrequest",
"Vidalia",
"py38-torrequest",
"py39-torrequest",
"py310-torrequest",
"py311-torrequest",
"py313-torrequest"
]
},
{
"type": "run",
"ports": [
"onioncat"
]
}
]
},
{
"name": "tor-devel",
"portdir": "security/tor-devel",
"version": "0.4.8.13",
"license": "BSD",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.torproject.org/",
"description": "anonymizing overlay network for TCP",
"long_description": "Tor provides a distributed network of servers (onion routers). Users bounce their TCP streams (web traffic, FTP, SSH, etc.) around the routers. This makes it hard for recipients, observers, and even the onion routers themselves to track the source of the stream.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-17"
]
},
{
"type": "lib",
"ports": [
"zlib",
"libevent",
"openssl3"
]
}
],
"depends_on": []
},
{
"name": "tripwire",
"portdir": "security/tripwire",
"version": "2.4.3.7",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/Tripwire/tripwire-open-source",
"description": "integrity assurance and intrusion detection tool",
"long_description": "Tripwire software is a tool that checks to see what has changed on your system. The program monitors key attributes of files that should not change, including binary signature, size, expected change of size, etc. Tripwire is originally known as an intrusion detection tool, but can be used for many other purposes such as integrity assurance, change management, policy compliance and more.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"anacron",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-9.0"
]
},
{
"type": "lib",
"ports": [
"openssl"
]
}
],
"depends_on": []
}
]
}