GET /api/v1/ports/?format=api&ordering=updated_at&page=967
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "count": 51956,
    "next": "https://ports.macports.org/api/v1/ports/?format=api&ordering=updated_at&page=968",
    "previous": "https://ports.macports.org/api/v1/ports/?format=api&ordering=updated_at&page=966",
    "results": [
        {
            "name": "s2n-tls",
            "portdir": "security/s2n-tls",
            "version": "1.7.2",
            "license": "Apache-2",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://aws.github.io/s2n-tls/doxygen/s2n_8h.html",
            "description": "An implementation of the TLS/SSL protocols",
            "long_description": "s2n-tls is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "herby.gillot",
                    "github": "herbygillot",
                    "ports_count": 1055
                }
            ],
            "variants": [
                "debug",
                "tests",
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "cmake",
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "openssl"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "saml2aws",
            "portdir": "security/saml2aws",
            "version": "2.36.19",
            "license": "MIT",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/Versent/saml2aws",
            "description": "Log in to AWS using a SAML IDP",
            "long_description": "CLI tool which enables you to login and retrieve AWS temporary credentials using a SAML IDP.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "jamesog",
                    "github": "jamesog",
                    "ports_count": 2
                },
                {
                    "name": "herby.gillot",
                    "github": "herbygillot",
                    "ports_count": 1055
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "go",
                        "clang-18"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "scponly",
            "portdir": "security/scponly",
            "version": "4.6",
            "license": "BSD",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://www.sublimation.org/scponly/",
            "description": "Limited shell which wraps scp/sftp",
            "long_description": "scponly is an alternative 'shell' (of sorts) for system administrators who would like to provide access to remote users to both read and write local files without providing any remote execution priviledges. Functionally, it is best described as a wrapper to the mostly trusted suite of ssh applications.",
            "active": true,
            "categories": [
                "sysutils",
                "net",
                "security"
            ],
            "maintainers": [],
            "variants": [
                "scpCompat",
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "openssh"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "sancp",
            "portdir": "security/sancp",
            "version": "1.6.1",
            "license": "QPL-1",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://sancp.sourceforge.net",
            "description": "Security Analyst Network Connection Profiler",
            "long_description": "This is a network security tool designed to collect statistical information regarding network traffic, as well as, collect the traffic itself in pcap format, all for the purpose of: auditing, historical analysis, and network activity discovery.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "libpcap"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "scrub",
            "portdir": "security/scrub",
            "version": "2.6.1",
            "license": "GPL-2+",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/chaos/scrub",
            "description": "Overwrites files or devices with patterns",
            "long_description": "Scrub writes patterns on special files (i.e. raw disk devices) or regular files to make retrieving the data more difficult. Scrub writes NNSA NAP-14.x, DoD 5220.22-M, BSI, 35-pass gutmann, or one of several other selectable pattern sequences",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "scrypt",
            "portdir": "security/scrypt",
            "version": "1.3.3",
            "license": "BSD",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://www.tarsnap.com/scrypt.html",
            "description": "key derivation function",
            "long_description": "The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more secure against hardware brute-force attacks than alternative functions such as PBKDF2 or bcrypt.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "pkgconfig",
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "openssl3"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "scute",
            "portdir": "security/scute",
            "version": "1.7.0",
            "license": "LGPL-2.1+",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://gnupg.org/",
            "description": "PKCS#11 interface to the GnuPG Agent",
            "long_description": "Scute is a PKCS#11 implementation relying on the GnuPG Agent. It enables the use of an OpenPGP smartcard for TLS client authentication and for CMS digital signatures with Mozilla and other PKCS#11-compatible applications.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "dgouttegattat",
                    "github": "gouttegd",
                    "ports_count": 1
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "pkgconfig",
                        "ImageMagick",
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "gnupg2"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "search-that-hash",
            "portdir": "security/search-that-hash",
            "version": "0.2.8",
            "license": "GPL-3",
            "platforms": "{darwin any}",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/HashPals/search-that-hash",
            "description": "Searches Hash APIs to crack your hash quickly",
            "long_description": "Searches Hash APIs to crack your hash quickly. Search-That-Hash automates this process in less than 2 seconds. It searches the most popular hash cracking sites and automatically inputs your hash(s) for cracking.",
            "active": true,
            "categories": [
                "security",
                "python"
            ],
            "maintainers": [
                {
                    "name": "harensdeveloper",
                    "github": "harens",
                    "ports_count": 41
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18",
                        "py314-poetry-core",
                        "py314-installer",
                        "py314-build"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "python314"
                    ]
                },
                {
                    "type": "run",
                    "ports": [
                        "py314-rich",
                        "py314-toml",
                        "py314-cloudscraper",
                        "py314-coloredlogs",
                        "py314-loguru",
                        "py314-click",
                        "py314-appdirs",
                        "py314-requests",
                        "name-that-hash"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "secpwgen",
            "portdir": "security/secpwgen",
            "version": "1.3",
            "license": "MIT",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://www.core-dump.com.hr/index.pl?node_id=407",
            "description": "An utility for generating secure passphrases",
            "long_description": "An utility for generating secure passphrases. Implements several methods for passphrase generation including the Diceware method with 8192 word dictionary compiled in the executable.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "cryptlib"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "sequoia-chameleon-gnupg",
            "portdir": "security/sequoia-chameleon-gnupg",
            "version": "0.13.1",
            "license": "LGPL-2.0+",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://sequoia-pgp.org/",
            "description": "This is a re-implementation and drop-in replacement of gpg and gpgv using the Sequoia OpenPGP implementation.",
            "long_description": "This is a re-implementation and drop-in replacement of gpg and gpgv using the Sequoia OpenPGP implementation.",
            "active": true,
            "categories": [
                "security",
                "mail"
            ],
            "maintainers": [
                {
                    "name": "jann",
                    "github": "roederja",
                    "ports_count": 10
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-20",
                        "capnproto",
                        "cargo",
                        "legacy-support",
                        "pkgconfig",
                        "rust"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "libunwind",
                        "nettle",
                        "libiconv",
                        "openssl3",
                        "sqlite3"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "sequoia-keystore",
            "portdir": "security/sequoia-keystore",
            "version": "0.2.0",
            "license": "LGPL-2.0+",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://gitlab.com/sequoia-pgp/sequoia-keystore",
            "description": "This project implements a private key store for Sequoia.",
            "long_description": "This project implements a private key store for Sequoia. This allows sequoia to access private keys stored in OpenPGP smartcards.",
            "active": true,
            "categories": [
                "security",
                "mail"
            ],
            "maintainers": [
                {
                    "name": "cal",
                    "github": "neverpanic",
                    "ports_count": 60
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-20",
                        "legacy-support",
                        "pkgconfig",
                        "rust",
                        "capnproto",
                        "cargo"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "openssl3",
                        "libunwind"
                    ]
                },
                {
                    "type": "run",
                    "ports": [
                        "opensc"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "run",
                    "ports": [
                        "sequoia-sq"
                    ]
                }
            ]
        },
        {
            "name": "sequoia-sq",
            "portdir": "security/sequoia-sq",
            "version": "1.3.1",
            "license": "LGPL-2.0+",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://sequoia-pgp.org/",
            "description": "Sequoia-PGP is an implementation of OpenPGP in Rust. This port provides the sq command line application, which provides a way to use OpenPGP conveniently from the command line.",
            "long_description": "Sequoia-PGP is an implementation of OpenPGP in Rust. This port provides the sq command line application, which provides a way to use OpenPGP conveniently from the command line.",
            "active": true,
            "categories": [
                "security",
                "mail"
            ],
            "maintainers": [
                {
                    "name": "cal",
                    "github": "neverpanic",
                    "ports_count": 60
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "legacy-support",
                        "pkgconfig",
                        "rust",
                        "clang-20",
                        "capnproto",
                        "cargo"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "sqlite3",
                        "libunwind",
                        "libiconv",
                        "openssl3"
                    ]
                },
                {
                    "type": "run",
                    "ports": [
                        "sequoia-keystore"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "sf-pwgen",
            "portdir": "security/sf-pwgen",
            "version": "1.5",
            "license": "zlib",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/anders/pwgen",
            "description": "macOS command line password generator.",
            "long_description": "macOS command line password generator. A command line tool that generates passwords using macOS's SecurityFoundation framework.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "build",
                    "ports": [
                        "adblock2privoxy",
                        "privoxy"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "mail-server"
                    ]
                }
            ]
        },
        {
            "name": "sguil-client",
            "portdir": "security/sguil-client",
            "version": "1.0.0",
            "license": "GPL-3",
            "platforms": "any",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://bammv.github.io/sguil/",
            "description": "GUI Console for Sguil Network Security Monitor",
            "long_description": "GUI Console for Sguil Network Security Monitor",
            "active": true,
            "categories": [
                "net",
                "security"
            ],
            "maintainers": [],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "openssl",
                        "tcl-tls",
                        "tcllib",
                        "tclx",
                        "itk",
                        "iwidgets"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "shibboleth",
            "portdir": "security/shibboleth",
            "version": "3.5.2",
            "license": "Apache",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://www.shibboleth.net/",
            "description": "Shibboleth Native Service Provider",
            "long_description": "The Shibboleth System is a standards based, open source software package for web single sign-on across or within organizational boundaries. It allows sites to make informed authorization decisions for individual access of protected online resources in a privacy-preserving manner.",
            "active": true,
            "categories": [
                "security",
                "www",
                "shibboleth"
            ],
            "maintainers": [
                {
                    "name": "snc",
                    "github": "nerdling",
                    "ports_count": 157
                },
                {
                    "name": "scantor",
                    "github": "scantor",
                    "ports_count": 6
                }
            ],
            "variants": [
                "odbc",
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18",
                        "autoconf",
                        "automake",
                        "libtool",
                        "pkgconfig",
                        "boost176"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "opensaml",
                        "xml-security-c",
                        "xmltooling",
                        "log4shib",
                        "xercesc3",
                        "apache2"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "sign",
            "portdir": "security/sign",
            "version": "1.1",
            "license": "BSD and zlib and ISC",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://swapped.cc/sign/",
            "description": "sign is a file signing and signature verification utility",
            "long_description": "sign is a file signing and signature verification utility",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "pkgconfig",
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "openssl10"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "signify",
            "portdir": "security/signify",
            "version": "1.63",
            "license": "ISC",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://man.openbsd.org/signify.1",
            "description": "cryptographically sign and verify files",
            "long_description": "The signify utility creates and verifies cryptographic signatures. A signature verifies the integrity of a message.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "jpo",
                    "github": "jpouellet",
                    "ports_count": 4
                },
                {
                    "name": "artkiver",
                    "github": "artkiver",
                    "ports_count": 12
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "skipfish",
            "portdir": "security/skipfish",
            "version": "2.10b",
            "license": "Apache-2",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://code.google.com/p/skipfish/",
            "description": "web application security scanner",
            "long_description": "A fully automated, active web application security reconnaissance tool.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "zlib",
                        "openssl10",
                        "pcre",
                        "libidn"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "smimesign",
            "portdir": "security/smimesign",
            "version": "0.2.0",
            "license": "MIT",
            "platforms": "darwin freebsd linux",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/github/smimesign",
            "description": "An S/MIME signing utility for use with Git",
            "long_description": "Smimesign is an S/MIME signing utility for macOS and Windows that is compatible with Git. This allows developers to sign their Git commits and tags using X.509 certificates issued by public certificate authorities or their organization's internal certificate authority. Smimesign uses keys and certificates already stored in the macOS Keychain or the Windows Certificate Store.",
            "active": true,
            "categories": [
                "devel",
                "security"
            ],
            "maintainers": [
                {
                    "name": "herby.gillot",
                    "github": "herbygillot",
                    "ports_count": 1055
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "go",
                        "clang-18"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "sniffglue",
            "portdir": "security/sniffglue",
            "version": "0.16.1",
            "license": "GPL-3",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/kpcyrd/sniffglue",
            "description": "Secure multithreaded packet sniffer",
            "long_description": "sniffglue is a network sniffer written in rust. Network packets are parsed concurrently using a thread pool to utilize all cpu cores. Project goals are that you can run sniffglue securely on untrusted networks and that it must not crash when processing packets. The output should be as useful as possible by default.",
            "active": true,
            "categories": [
                "net",
                "security"
            ],
            "maintainers": [
                {
                    "name": "judaew",
                    "github": "judaew",
                    "ports_count": 655
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "cargo",
                        "legacy-support",
                        "rust",
                        "clang-20"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "libunwind"
                    ]
                },
                {
                    "type": "run",
                    "ports": [
                        "libpcap"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "softhsm",
            "portdir": "security/softhsm",
            "version": "2.7.0",
            "license": "BSD",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://www.softhsm.org/",
            "description": "SoftHSM is an implementation of a cryptographic store accessible through a PKCS #11 interface.",
            "long_description": "SoftHSM is an implementation of a cryptographic store accessible through a PKCS #11 interface. You can use it to explore PKCS #11 without having a Hardware Security Module. SoftHSM Version 2 is using openssl for its cryptographic operations.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "jaap",
                    "github": "Jakker",
                    "ports_count": 9
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18",
                        "libtool",
                        "pkgconfig",
                        "autoconf",
                        "automake",
                        "cppunit"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "openssl",
                        "sqlite3"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "build",
                    "ports": [
                        "pkcs11-provider"
                    ]
                }
            ]
        },
        {
            "name": "sqlmap",
            "portdir": "security/sqlmap",
            "version": "1.10",
            "license": "GPL-2+",
            "platforms": "{darwin any}",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://sqlmap.org/",
            "description": "Automatic SQL injection and database takeover tool",
            "long_description": "sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches including database fingerprinting, over data fetching from the database, accessing the underlying file system, and executing commands on the operating system via out-of-band connections.",
            "active": true,
            "categories": [
                "databases",
                "security",
                "python"
            ],
            "maintainers": [
                {
                    "name": "judaew",
                    "github": "judaew",
                    "ports_count": 655
                }
            ],
            "variants": [
                "python27",
                "python310",
                "python311",
                "python312",
                "python313",
                "python314"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18",
                        "py314-build",
                        "py314-installer",
                        "py314-setuptools",
                        "py314-wheel"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "python314"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "sqlninja",
            "portdir": "security/sqlninja",
            "version": "0.2.6-r1",
            "license": "GPL-3+",
            "platforms": "any",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://sqlninja.sourceforge.net/",
            "description": "Microsoft SQL Server SQL Injection vulnerability tester",
            "long_description": "Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end.",
            "active": true,
            "categories": [
                "net",
                "security"
            ],
            "maintainers": [],
            "variants": [
                "perl5_28",
                "perl5_30",
                "perl5_32",
                "perl5_34"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "p5.34-io-socket-ssl",
                        "p5.34-net-dns",
                        "p5.34-net-pcap",
                        "p5.34-net-rawip",
                        "p5.34-netpacket"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "ssdeep",
            "portdir": "security/ssdeep",
            "version": "2.14.1",
            "license": "GPL-2",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://ssdeep-project.github.io/ssdeep/",
            "description": "Recursively compute fuzzy hashes on files",
            "long_description": "ssdeep is a program for computing fuzzy hashes on files. These hashes can be used for finding similar files.",
            "active": true,
            "categories": [
                "sysutils",
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "sqlninja-devel",
            "portdir": "security/sqlninja",
            "version": "0.2.999-alpha1",
            "license": "GPL-3+",
            "platforms": "any",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://sqlninja.sourceforge.net/",
            "description": "Microsoft SQL Server SQL Injection vulnerability tester",
            "long_description": "Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end.",
            "active": true,
            "categories": [
                "net",
                "security"
            ],
            "maintainers": [],
            "variants": [
                "perl5_28",
                "perl5_30",
                "perl5_32",
                "perl5_34"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "p5.34-dbi",
                        "p5.34-io-socket-ssl",
                        "p5.34-net-dns",
                        "p5.34-dbd-sqlite",
                        "p5.34-net-rawip",
                        "p5.34-netpacket",
                        "p5.34-net-pcap"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "ssh-askpass",
            "portdir": "security/ssh-askpass",
            "version": "1.5.1",
            "license": "ISC",
            "platforms": "{darwin any}",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/theseal/ssh-askpass",
            "description": "ssh-askpass for OS X/macOS",
            "long_description": "ssh-askpass for OS X/macOS",
            "active": true,
            "categories": [
                "devel",
                "security"
            ],
            "maintainers": [
                {
                    "name": "judaew",
                    "github": "judaew",
                    "ports_count": 655
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "ssh-audit",
            "portdir": "security/ssh-audit",
            "version": "3.3.0",
            "license": "MIT",
            "platforms": "{darwin any}",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/jtesta/ssh-audit",
            "description": "ssh-audit is a tool for ssh server & client configuration auditing.",
            "long_description": "ssh-audit is a tool for ssh server & client configuration auditing.",
            "active": true,
            "categories": [
                "security",
                "python"
            ],
            "maintainers": [
                {
                    "name": "mps",
                    "github": "Schamschula",
                    "ports_count": 1419
                }
            ],
            "variants": [
                "python310",
                "python311",
                "python312",
                "python313"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18",
                        "py313-build",
                        "py313-installer",
                        "py313-setuptools",
                        "py313-wheel"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "python313"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "ssh-manager",
            "portdir": "security/ssh-manager",
            "version": "1.102.0",
            "license": "Apache-2",
            "platforms": "darwin freebsd linux",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/omegion/ssh-manager",
            "description": "SSH Key Manager for Bitwarden and 1Password",
            "long_description": "SSH Key Manager for Bitwarden and 1Password",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "herby.gillot",
                    "github": "herbygillot",
                    "ports_count": 1055
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "go",
                        "clang-18"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "ssss",
            "portdir": "security/ssss",
            "version": "1.0.1",
            "license": "Apache-2",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/okoeroo/ssss",
            "description": "Shamir's Secret Sharing Service",
            "long_description": "Shamir's Secret Sharing is an algorithm in cryptography. It is a form of secret sharing, where a secret is divided into parts, giving each participant its own unique part, where some of the parts or all of them are needed in order to reconstruct the secret. Counting on all participants to combine together the secret might be impractical, and therefore sometimes the threshold scheme is used where any k of the parts are sufficient to reconstruct the original secret.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "okoeroo",
                    "github": "",
                    "ports_count": 2
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "autoconf",
                        "automake",
                        "libtool",
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "openssl"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "stegdetect",
            "portdir": "security/stegdetect",
            "version": "0.6",
            "license": "BSD-old and SSLeay and Permissive and IJG",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://www.outguess.org/detection.php",
            "description": "tool for detecting steganographic content in jpeg images.",
            "long_description": "Stegdetect is an automated tool for detecting steganographic content in images. It is capable of detecting several different steganographic methods to embed hidden information in jpeg images.",
            "active": true,
            "categories": [
                "graphics",
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "steghide",
            "portdir": "security/steghide",
            "version": "0.5.1",
            "license": "GPL-2+",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://steghide.sourceforge.net/",
            "description": "Steghide is a steganography program",
            "long_description": "Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "cforkin",
                    "github": "",
                    "ports_count": 1
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "libtool",
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "libmcrypt",
                        "mhash",
                        "zlib",
                        "libiconv",
                        "libjpeg-turbo",
                        "gettext"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "step-ca",
            "portdir": "security/step-ca",
            "version": "0.30.2",
            "license": "Apache-2",
            "platforms": "darwin freebsd linux",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/smallstep/certificates",
            "description": "A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH.",
            "long_description": "step-ca is an online Certificate Authority (CA) for secure, automated X.509 and SSH certificate management. It's the server counterpart to step CLI. It is secured with TLS, and it offers several configurable certificate provisioners, flexible certificate templating, and pluggable database backends to suit a wide variety of contexts and workflows. It employs sane default algorithms and attributes, so you don't have to be a security engineer to use it securely.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "wyuenho",
                    "github": "wyuenho",
                    "ports_count": 1
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "go",
                        "clang-18"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "step-cli",
            "portdir": "security/step-cli",
            "version": "0.30.2",
            "license": "Apache-2",
            "platforms": "darwin freebsd linux",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/smallstep/cli",
            "description": "A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.",
            "long_description": "step is a toolkit for working with your public key infrastructure (PKI). It's also the client counterpart to the step-ca online Certificate Authority (CA).",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "herby.gillot",
                    "github": "herbygillot",
                    "ports_count": 1055
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "go",
                        "clang-18"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "stunnel",
            "portdir": "security/stunnel",
            "version": "5.78",
            "license": "GPL-2+",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://www.stunnel.org/",
            "description": "SSL tunneling program",
            "long_description": "Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code.",
            "active": true,
            "categories": [
                "net",
                "security"
            ],
            "maintainers": [
                {
                    "name": "mps",
                    "github": "Schamschula",
                    "ports_count": 1419
                }
            ],
            "variants": [
                "openssl1",
                "openssl3",
                "libwrap",
                "mimalloc",
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "pkgconfig",
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "tcp_wrappers",
                        "openssl3"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "tcpcrypt-devel",
            "portdir": "security/tcpcrypt-devel",
            "version": "0.5",
            "license": "BSD",
            "platforms": "darwin freebsd",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/scslab/tcpcrypt",
            "description": "encrypt (almost) all of your network traffic",
            "long_description": "Tcpcrypt is a protocol that attempts to encrypt (almost) all of your network traffic. Unlike other security mechanisms, Tcpcrypt works out of the box: it requires no configuration, no changes to applications, and your network connections will continue to work even if the remote end does not support Tcpcrypt, in which case connections will gracefully fall back to standard clear-text TCP. Install Tcpcrypt and you'll feel no difference in your every day user experience, but yet your traffic will be more secure and you'll have made life much harder for hackers.",
            "active": true,
            "categories": [
                "security",
                "www"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "autoconf",
                        "automake",
                        "libtool",
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "openssl"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "testssl",
            "portdir": "security/testssl",
            "version": "3.2.3",
            "license": "GPL-2",
            "platforms": "any",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://testssl.sh",
            "description": "Test TLS/SSL encryption anywhere on any port",
            "long_description": "testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "makr",
                    "github": "mohd-akram",
                    "ports_count": 84
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "tfsec",
            "portdir": "security/tfsec",
            "version": "1.28.14",
            "license": "MIT",
            "platforms": "darwin freebsd linux",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/tfsec/tfsec",
            "description": "Security scanner for your Terraform code",
            "long_description": "Security scanner for your Terraform code. tfsec uses static analysis of your Terraform templates to spot potential security issues.",
            "active": true,
            "categories": [
                "sysutils",
                "security"
            ],
            "maintainers": [
                {
                    "name": "herby.gillot",
                    "github": "herbygillot",
                    "ports_count": 1055
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "go",
                        "clang-18"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "tinyca2",
            "portdir": "security/tinyca2",
            "version": "0.7.5",
            "license": "GPL-2+",
            "platforms": "any",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://salsa.debian.org/cpt_nemo-guest/tinyca",
            "description": "GUI Certificate Authority tool.",
            "long_description": "TinyCA is a simple graphical user interface for managing a small CA (Certification Authority). TinyCA works as a frontend for openssl.",
            "active": true,
            "categories": [
                "net",
                "security"
            ],
            "maintainers": [],
            "variants": [
                "perl5_28",
                "perl5_30",
                "perl5_32",
                "perl5_34"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "zip",
                        "gettext",
                        "openssl",
                        "p5.34-gtk2",
                        "p5.34-locale-gettext"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "tor-devel",
            "portdir": "security/tor-devel",
            "version": "0.4.8.13",
            "license": "BSD",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://www.torproject.org/",
            "description": "anonymizing overlay network for TCP",
            "long_description": "Tor provides a distributed network of servers (onion routers). Users bounce their TCP streams (web traffic, FTP, SSH, etc.) around the routers. This makes it hard for recipients, observers, and even the onion routers themselves to track the source of the stream.",
            "active": true,
            "categories": [
                "net",
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "pkgconfig",
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "zlib",
                        "libevent",
                        "openssl3"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "tor",
            "portdir": "security/tor",
            "version": "0.4.8.17",
            "license": "BSD",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://www.torproject.org/",
            "description": "anonymizing overlay network for TCP",
            "long_description": "Tor provides a distributed network of servers (onion routers). Users bounce their TCP streams (web traffic, FTP, SSH, etc.) around the routers. This makes it hard for recipients, observers, and even the onion routers themselves to track the source of the stream.",
            "active": true,
            "categories": [
                "net",
                "security"
            ],
            "maintainers": [
                {
                    "name": "i0ntempest",
                    "github": "i0ntempest",
                    "ports_count": 271
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "pkgconfig",
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "zlib",
                        "libevent",
                        "openssl3"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "lib",
                    "ports": [
                        "Vidalia",
                        "py39-torrequest",
                        "py38-torrequest",
                        "py310-torrequest",
                        "py311-torrequest",
                        "py312-torrequest",
                        "py313-torrequest",
                        "py314-torrequest"
                    ]
                },
                {
                    "type": "run",
                    "ports": [
                        "onioncat"
                    ]
                }
            ]
        },
        {
            "name": "totp-cli",
            "portdir": "security/totp-cli",
            "version": "1.9.2",
            "license": "MIT",
            "platforms": "darwin freebsd linux",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/yitsushi/totp-cli",
            "description": "Authy/Google Authenticator like TOTP CLI tool written in Go.",
            "long_description": "A simple TOTP (Time-based One-time Password) CLI tool. TOTP is the most common mechanism for 2FA (Two-Factor-Authentication). You can manage and organize your accounts with namespaces and protect your data with a password.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "herby.gillot",
                    "github": "herbygillot",
                    "ports_count": 1055
                },
                {
                    "name": "smanojkarthick",
                    "github": "manojkarthick",
                    "ports_count": 10
                },
                {
                    "name": "amtor",
                    "github": "RobK88",
                    "ports_count": 11
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "go",
                        "clang-18"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "tripwire",
            "portdir": "security/tripwire",
            "version": "2.4.3.7",
            "license": "GPL-2+",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/Tripwire/tripwire-open-source",
            "description": "integrity assurance and intrusion detection tool",
            "long_description": "Tripwire software is a tool that checks to see what has changed on your system. The program monitors key attributes of files that should not change, including binary signature, size, expected change of size, etc. Tripwire is originally known as an intrusion detection tool, but can be used for many other purposes such as integrity assurance, change management, policy compliance and more.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "anacron",
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "openssl"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "trivy",
            "portdir": "security/trivy",
            "version": "0.70.0",
            "license": "Apache-2",
            "platforms": "darwin linux freebsd",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/aquasecurity/trivy",
            "description": "A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI",
            "long_description": "A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI. Trivy detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn, etc.). Trivy is easy to use. Just install the binary and you're ready to scan. All you need to do for scanning is to specify a target such as an image name of the container.",
            "active": true,
            "categories": [
                "sysutils",
                "security"
            ],
            "maintainers": [
                {
                    "name": "herby.gillot",
                    "github": "herbygillot",
                    "ports_count": 1055
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "go",
                        "goreleaser",
                        "clang-18"
                    ]
                },
                {
                    "type": "fetch",
                    "ports": [
                        "git"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "uacme",
            "portdir": "security/uacme",
            "version": "1.8.0",
            "license": "GPL-3+",
            "platforms": "any",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/ndilieto/uacme",
            "description": "ACMEv2 client written in plain C with minimal dependencies",
            "long_description": "lightweight client for the RFC8555 ACMEv2 protocol, written in plain C with minimal dependencies (libcurl and OpenSSL).",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "lmkrawiec",
                    "github": "lmkra",
                    "ports_count": 3
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18",
                        "pkgconfig",
                        "asciidoc",
                        "autoconf",
                        "automake",
                        "libtool"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "curl",
                        "openssl"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "unhash",
            "portdir": "security/unhash",
            "version": "1.1",
            "license": "GPL-2",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://www.dxp2532.info/",
            "description": "brute force attack against MD5 or SHA1 hashes",
            "long_description": "UnHash is a program that tries a brute force attack against a given hash. The hash can be MD5 or SHA1, and the program will auto-detect which one is given.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "openssl"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "usign-devel",
            "portdir": "security/usign-devel",
            "version": "20190920",
            "license": "ISC",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://openwrt.org/docs/guide-user/security/keygen#generate_usign_key_pair",
            "description": "OpenWrt signature verification utility",
            "long_description": "OpenWrt signature verification utility",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "l2dy",
                    "github": "l2dy",
                    "ports_count": 97
                }
            ],
            "variants": [
                "debug",
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "cmake",
                        "clang-18"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "vault",
            "portdir": "security/vault",
            "version": "2.0.0",
            "license": "Commercial and Permissive",
            "platforms": "darwin freebsd linux",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://www.vaultproject.io",
            "description": "A Tool for Managing Secrets",
            "long_description": "HashiCorp Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault handles leasing, key revocation, key rolling, and auditing. Through a unified API, users can access an encrypted Key/Value store and network encryption-as-a-service, or generate AWS IAM/STS credentials, SQL/NoSQL databases, X.509 certificates, SSH credentials, and more.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "herby.gillot",
                    "github": "herbygillot",
                    "ports_count": 1055
                }
            ],
            "variants": [
                "ui"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "go",
                        "clang-18"
                    ]
                },
                {
                    "type": "fetch",
                    "ports": [
                        "git"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "vcs_blackbox",
            "portdir": "security/vcs_blackbox",
            "version": "2.0.0",
            "license": "BSD",
            "platforms": "any",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/StackExchange/blackbox",
            "description": "Safely store secrets in git/hg/svn repos using GPG encryption",
            "long_description": "Storing secrets such as passwords, certificates and private keys in Git/Mercurial/SubVersion is dangerous. Blackbox makes it easy to store secrets safely using GPG encryption. They can be easily decrypted for editing or use in production.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "tal",
                    "github": "",
                    "ports_count": 1
                },
                {
                    "name": "audvare",
                    "github": "Tatsh",
                    "ports_count": 25
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "volatility",
            "portdir": "security/volatility",
            "version": "2.6.1",
            "license": "GPL-2+",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": "volatility3",
            "homepage": "https://www.macports.org",
            "description": "Obsolete port, replaced by volatility3",
            "long_description": "This port has been replaced by volatility3.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                },
                {
                    "type": "extract",
                    "ports": [
                        null
                    ]
                },
                {
                    "type": "fetch",
                    "ports": [
                        null
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        null
                    ]
                },
                {
                    "type": "patch",
                    "ports": [
                        null
                    ]
                },
                {
                    "type": "run",
                    "ports": [
                        null
                    ]
                },
                {
                    "type": "test",
                    "ports": [
                        null
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "volatility3",
            "portdir": "security/volatility3",
            "version": "2.26.2",
            "license": "VSL",
            "platforms": "{darwin any}",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://www.volatilityfoundation.org/",
            "description": "Memory forensics framework",
            "long_description": "The Volatility Framework is a completely open collection of tools for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer unprecedented visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "py314-build",
                        "clang-18",
                        "py314-wheel",
                        "py314-setuptools",
                        "py314-installer"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "python314",
                        "py314-pefile"
                    ]
                },
                {
                    "type": "run",
                    "ports": [
                        "py314-yara",
                        "py314-pycryptodome",
                        "py314-Pillow",
                        "capstone"
                    ]
                }
            ],
            "depends_on": []
        }
    ]
}