HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"count": 51892,
"next": "https://ports.macports.org/api/v1/ports/?format=api&ordering=updated_at&page=982",
"previous": "https://ports.macports.org/api/v1/ports/?format=api&ordering=updated_at&page=980",
"results": [
{
"name": "certbot-dns-dnsmadeeasy",
"portdir": "security/certbot",
"version": "5.5.0",
"license": "Apache-2",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://certbot.eff.org/",
"description": "The certbotdns_dnsmadeeasy plugin for dns-01 challenges",
"long_description": "The dns_dnsmadeeasy plugin automates the process of completing a dns-01 challenge (DNS01) by creating, and subsequently removing, TXT records using the DNS Made Easy API. https://certbot-dns-dnsmadeeasy.readthedocs.io/",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "mps",
"github": "Schamschula",
"ports_count": 1419
}
],
"variants": [
"python310",
"python311",
"python312",
"python313",
"python314"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"py314-build",
"py314-installer",
"py314-setuptools",
"py314-wheel"
]
},
{
"type": "lib",
"ports": [
"py314-distro",
"py314-pyrfc3339",
"py314-configobj",
"python314",
"py314-acme",
"py314-dns-lexicon",
"py314-parsedatetime",
"py314-tz",
"py314-cryptography",
"py314-openssl",
"py314-configargparse"
]
}
],
"depends_on": []
},
{
"name": "certbot-dns-gehirn",
"portdir": "security/certbot",
"version": "5.5.0",
"license": "Apache-2",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://certbot.eff.org/",
"description": "The certbot gehirn plugin for dns-01 challenges",
"long_description": "The dns_gehirn plugin automates the process of completing a dns-01 challenge (DNS01) by creating, and subsequently removing, TXT records using the Gehirn Infrastracture Service DNS API. https://certbot-dns-gehirn.readthedocs.io/",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "mps",
"github": "Schamschula",
"ports_count": 1419
}
],
"variants": [
"python310",
"python311",
"python312",
"python313",
"python314"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"py314-build",
"py314-installer",
"py314-setuptools",
"py314-wheel"
]
},
{
"type": "lib",
"ports": [
"py314-distro",
"py314-pyrfc3339",
"py314-configobj",
"python314",
"py314-acme",
"py314-dns-lexicon",
"py314-parsedatetime",
"py314-tz",
"py314-cryptography",
"py314-openssl",
"py314-configargparse"
]
}
],
"depends_on": []
},
{
"name": "certbot-dns-google",
"portdir": "security/certbot",
"version": "5.5.0",
"license": "Apache-2",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://certbot.eff.org/",
"description": "The certbot google plugin for dns-01 challenges",
"long_description": "The dns_google plugin automates the process of completing a dns-01 challenge (DNS01) by creating, and subsequently removing, TXT records using the Google Cloud DNS API. https://certbot-dns-google.readthedocs.io/",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "mps",
"github": "Schamschula",
"ports_count": 1419
}
],
"variants": [
"python310",
"python311",
"python312",
"python313",
"python314"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"py314-build",
"py314-installer",
"py314-setuptools",
"py314-wheel"
]
},
{
"type": "lib",
"ports": [
"py314-google-api-python-client",
"py314-configargparse",
"py314-distro",
"python314",
"py314-configobj",
"py314-parsedatetime",
"py314-acme",
"py314-pyrfc3339",
"py314-tz",
"py314-cryptography",
"py314-openssl",
"py314-google-auth"
]
}
],
"depends_on": []
},
{
"name": "certbot-dns-linode",
"portdir": "security/certbot",
"version": "5.5.0",
"license": "Apache-2",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://certbot.eff.org/",
"description": "The certbot linode plugin for dns-01 challenges",
"long_description": "The dns_linode plugin automates the process of completing a dns-01 challenge (DNS01) by creating, and subsequently removing, TXT records using the Linode API. https://certbot-dns-linode.readthedocs.io/",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "mps",
"github": "Schamschula",
"ports_count": 1419
}
],
"variants": [
"python310",
"python311",
"python312",
"python313",
"python314"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"py314-build",
"py314-installer",
"py314-setuptools",
"py314-wheel"
]
},
{
"type": "lib",
"ports": [
"py314-distro",
"py314-pyrfc3339",
"py314-configobj",
"python314",
"py314-acme",
"py314-dns-lexicon",
"py314-parsedatetime",
"py314-tz",
"py314-cryptography",
"py314-openssl",
"py314-configargparse"
]
}
],
"depends_on": []
},
{
"name": "certbot-dns-luadns",
"portdir": "security/certbot",
"version": "5.5.0",
"license": "Apache-2",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://certbot.eff.org/",
"description": "The certbot luadns plugin for dns-01 challenges",
"long_description": "The dns_luadns plugin automates the process of completing a dns-01 challenge (DNS01) by creating, and subsequently removing, TXT records using the LuaDNS API. https://certbot-dns-luadns.readthedocs.io/",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "mps",
"github": "Schamschula",
"ports_count": 1419
}
],
"variants": [
"python310",
"python311",
"python312",
"python313",
"python314"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"py314-build",
"py314-installer",
"py314-setuptools",
"py314-wheel"
]
},
{
"type": "lib",
"ports": [
"py314-distro",
"py314-pyrfc3339",
"python314",
"py314-parsedatetime",
"py314-acme",
"py314-configobj",
"py314-tz",
"py314-cryptography",
"py314-openssl",
"py314-configargparse"
]
}
],
"depends_on": []
},
{
"name": "certbot-dns-nsone",
"portdir": "security/certbot",
"version": "5.5.0",
"license": "Apache-2",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://certbot.eff.org/",
"description": "The certbot nsone plugin for dns-01 challenges",
"long_description": "The dns_nsone plugin automates the process of completing a dns-01 challenge (DNS01) by creating, and subsequently removing, TXT records using the NS1 API. https://certbot-dns-nsone.readthedocs.io/",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "mps",
"github": "Schamschula",
"ports_count": 1419
}
],
"variants": [
"python310",
"python311",
"python312",
"python313",
"python314"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"py314-build",
"py314-installer",
"py314-setuptools",
"py314-wheel"
]
},
{
"type": "lib",
"ports": [
"py314-distro",
"py314-pyrfc3339",
"py314-configobj",
"python314",
"py314-acme",
"py314-dns-lexicon",
"py314-parsedatetime",
"py314-tz",
"py314-cryptography",
"py314-openssl",
"py314-configargparse"
]
}
],
"depends_on": []
},
{
"name": "certbot-dns-ovh",
"portdir": "security/certbot",
"version": "5.5.0",
"license": "Apache-2",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://certbot.eff.org/",
"description": "The certbot ovh plugin for dns-01 challenges",
"long_description": "The dns_ovh plugin automates the process of completing a dns-01 challenge (DNS01) by creating, and subsequently removing, TXT records using the OVH API. https://certbot-dns-ovh.readthedocs.io/",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "mps",
"github": "Schamschula",
"ports_count": 1419
}
],
"variants": [
"python310",
"python311",
"python312",
"python313",
"python314"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"py314-build",
"py314-installer",
"py314-setuptools",
"py314-wheel"
]
},
{
"type": "lib",
"ports": [
"py314-distro",
"py314-pyrfc3339",
"py314-configobj",
"python314",
"py314-acme",
"py314-dns-lexicon",
"py314-parsedatetime",
"py314-tz",
"py314-cryptography",
"py314-openssl",
"py314-configargparse"
]
}
],
"depends_on": []
},
{
"name": "certbot-dns-rfc2136",
"portdir": "security/certbot",
"version": "5.5.0",
"license": "Apache-2",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://certbot.eff.org/",
"description": "The certbot rfc2136 plugin for dns-01 challenges",
"long_description": "The dns_rfc2136 plugin automates the process of completing a dns-01 challenge (DNS01) by creating, and subsequently removing, TXT records using RFC 2136 Dynamic Updates. https://certbot-dns-rfc2136.readthedocs.io/",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "mps",
"github": "Schamschula",
"ports_count": 1419
}
],
"variants": [
"python310",
"python311",
"python312",
"python313",
"python314"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"py314-build",
"py314-installer",
"py314-setuptools",
"py314-wheel"
]
},
{
"type": "lib",
"ports": [
"py314-configargparse",
"py314-distro",
"py314-pyrfc3339",
"python314",
"py314-parsedatetime",
"py314-acme",
"py314-configobj",
"py314-tz",
"py314-cryptography",
"py314-openssl",
"py314-dnspython"
]
}
],
"depends_on": []
},
{
"name": "certbot-dns-route53",
"portdir": "security/certbot",
"version": "5.5.0",
"license": "Apache-2",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://certbot.eff.org/",
"description": "The certbot route53 plugin for dns-01 challenges",
"long_description": "The dns_route53 plugin automates the process of completing a dns-01 challenge (DNS01) by creating, and subsequently removing, TXT records using the Amazon Web Services Route 53 API. https://certbot-dns-route53.readthedocs.io/",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "mps",
"github": "Schamschula",
"ports_count": 1419
}
],
"variants": [
"python310",
"python311",
"python312",
"python313",
"python314"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"py314-build",
"py314-installer",
"py314-setuptools",
"py314-wheel"
]
},
{
"type": "lib",
"ports": [
"py314-configargparse",
"py314-distro",
"py314-pyrfc3339",
"python314",
"py314-parsedatetime",
"py314-acme",
"py314-configobj",
"py314-tz",
"py314-cryptography",
"py314-openssl",
"py314-boto3"
]
}
],
"depends_on": []
},
{
"name": "certbot-dns-sakuracloud",
"portdir": "security/certbot",
"version": "5.5.0",
"license": "Apache-2",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://certbot.eff.org/",
"description": "The certbot sakuracloud plugin for dns-01 challenges",
"long_description": "The dns_sakuracloud plugin automates the process of completing a dns-01 challenge (DNS01) by creating, and subsequently removing, TXT records using the Sakura Cloud DNS API. https://certbot-dns-sakuracloud.readthedocs.io/",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "mps",
"github": "Schamschula",
"ports_count": 1419
}
],
"variants": [
"python310",
"python311",
"python312",
"python313",
"python314"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"py314-build",
"py314-installer",
"py314-setuptools",
"py314-wheel"
]
},
{
"type": "lib",
"ports": [
"py314-distro",
"py314-pyrfc3339",
"py314-configobj",
"python314",
"py314-acme",
"py314-dns-lexicon",
"py314-parsedatetime",
"py314-tz",
"py314-cryptography",
"py314-openssl",
"py314-configargparse"
]
}
],
"depends_on": []
},
{
"name": "certstrap",
"portdir": "security/certstrap",
"version": "1.3.0",
"license": "Apache-2",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/square/certstrap",
"description": "Bootstrap CAs, certificate requests, and signed certificates.",
"long_description": "A simple certificate manager written in Go, to bootstrap your own certificate authority and public key infrastructure. Adapted from etcd-ca. certstrap is a very convenient app if you don't feel like dealing with openssl, its myriad of options or config files.",
"active": true,
"categories": [
"devel",
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1053
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "certsync",
"portdir": "security/certsync",
"version": "1.1.3",
"license": "MIT",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.macports.org/",
"description": "Export x509 CAs from the Mac OS X Keychain.",
"long_description": "The package implements exporting of x509 CAs from the Mac OS X keychain, for use by OpenSSL and gnutls.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "landonf",
"github": "landonf",
"ports_count": 84
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "cfssl",
"portdir": "security/cfssl",
"version": "1.6.5",
"license": "BSD",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://cfssl.org",
"description": "Cloudflare's PKI and TLS toolkit",
"long_description": "CFSSL is CloudFlare's PKI/TLS swiss army knife. It is both a command line tool and an HTTP API server for signing, verifying, and bundling TLS certificates. CFSSL consists of: a set of packages useful for building custom TLS PKI tools, the cfssl program - the canonical command line utility using the CFSSL packages, the multirootca program - a certificate authority server that can use multiple signing keys, the mkbundle program - used to build certificate pool bundles, the cfssljson program - which takes the JSON output from the cfssl and multirootca programs and writes certificates, keys, CSRs, and bundles to disk.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1053
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "cfv",
"portdir": "security/cfv",
"version": "1.18.3",
"license": "GPL-2",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "http://cfv.sourceforge.net/",
"description": "Command-line File Verify",
"long_description": "cfv is a utility to both test and create .sfv, .csv, .crc, .md5(sfv-like), md5sum, bsd md5, sha1sum, and .torrent files. These files are commonly used to ensure the correct retrieval or storage of data.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"python27"
]
}
],
"depends_on": []
},
{
"name": "checkpassword-pam",
"portdir": "security/checkpassword-pam",
"version": "0.99",
"license": "GPL-2+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://checkpasswd-pam.sourceforge.net/",
"description": "implementation of checkpassword-compatible auth program",
"long_description": "checkpassword-pam was written from scratch. There are several older packages called checkpassword-pam, derived from DJB's checkpassword code. This checkpassword-pam is more modern and administrator-friendly.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "ciphey",
"portdir": "security/ciphey",
"version": "5.14.0",
"license": "none",
"platforms": "darwin",
"epoch": 0,
"replaced_by": "ares",
"homepage": "https://www.macports.org",
"description": "Obsolete port, replaced by ares",
"long_description": "This port has been replaced by ares.",
"active": true,
"categories": [
"security",
"python"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "extract",
"ports": [
null
]
},
{
"type": "fetch",
"ports": [
null
]
},
{
"type": "lib",
"ports": [
null
]
},
{
"type": "patch",
"ports": [
null
]
},
{
"type": "run",
"ports": [
null
]
},
{
"type": "test",
"ports": [
null
]
}
],
"depends_on": []
},
{
"name": "clef",
"portdir": "security/clef",
"version": "0.3.0",
"license": "Apache-2",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/b4nst/clef",
"description": "CLI secret management",
"long_description": "clef is a simple and secure command-line tool for managing secrets. It was created to help keep sensitive data—like API keys and tokens—out of shell configuration files. Instead of hardcoding values in .bashrc, .zshrc, or similar, you can store and retrieve them safely using clef.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1053
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"goreleaser",
"clang-18"
]
},
{
"type": "fetch",
"ports": [
"git"
]
}
],
"depends_on": []
},
{
"name": "comply",
"portdir": "security/comply",
"version": "1.6.0",
"license": "Apache-2",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/strongdm/comply",
"description": "Compliance automation framework, focused on SOC2",
"long_description": "Comply is a SOC2-focused compliance automation tool. It includes: a Policy Generator: a markdown-powered document pipeline for publishing auditor-friendly policy documents, Ticketing Integration: to automate compliance throughout the year via your existing ticketing system, and SOC2 Templates: open source policy and procedure templates suitable for satisfying a SOC2 audit.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1053
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "courier-authlib",
"portdir": "security/courier-authlib",
"version": "0.72.1",
"license": "GPL-3",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.courier-mta.org/authlib/",
"description": "Courier Authentication Library is a generic authentication API",
"long_description": "Courier Authentication Library is a generic authentication API",
"active": true,
"categories": [
"security",
"mail"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"gmake",
"db48",
"libidn2",
"libtool",
"courier-unicode"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"courier-imap"
]
}
]
},
{
"name": "cosign",
"portdir": "security/cosign",
"version": "3.0.4",
"license": "Apache-2",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/sigstore/cosign",
"description": "Container Signing",
"long_description": "Container Signing, Verification and Storage in an OCI registry. Cosign aims to make signatures invisible infrastructure.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "judaew",
"github": "judaew",
"ports_count": 655
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "cpabe",
"portdir": "security/cpabe",
"version": "0.11",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://acsc.cs.utexas.edu/cpabe/",
"description": "ciphertext-policy attribute-based encryption toolkit",
"long_description": "The cpabe toolkit provides a set of programs implementing a ciphertext-policy attribute-based encryption scheme. \n\nIn a ciphertext policy attribute-based encryption scheme, each user's private key is associated with a set of attributes representing their capabilities, and a ciphertext is encrypted such that only users whose attributes satisfy a certain policy can decrypt. For example, we can encrypt a ciphertext such that in a company it can only be decrypted by a someone with attributes Senior and Human Resources or has the attribute Executive. One interesting application of this tool is that we can do Role-Based Access Control (RBAC) without requiring trusted data storage.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"openssl",
"gettext",
"pbc",
"libbswabe",
"glib2"
]
}
],
"depends_on": []
},
{
"name": "cracklib",
"portdir": "security/cracklib",
"version": "2.9.11",
"license": "LGPL-2.1",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/cracklib/cracklib",
"description": "A ProActive Password Sanity Library",
"long_description": "CrackLib is a library containing a C function (well, lots of functions really, but you only need to use one of them) which may be used in a passwd-like program. The idea is simple: try to prevent users from choosing passwords that could be guessed by Crack by filtering them out, at source.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"automake",
"gettext",
"libtool",
"bzip2",
"autoconf"
]
},
{
"type": "lib",
"ports": [
"libiconv",
"gettext-runtime",
"zlib"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"libpwquality",
"php53-crack",
"rb-password",
"apg"
]
}
]
},
{
"name": "crackpkcs12",
"portdir": "security/crackpkcs12",
"version": "0.2.9",
"license": "(GPL-3+ or OpenSSLException)",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://crackpkcs12.sourceforge.net",
"description": "Crack PKCS12 files passwords",
"long_description": "A tool to audit PKCS12 files passwords",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "bernhard",
"github": "",
"ports_count": 1
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"pkgconfig",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"openssl"
]
}
],
"depends_on": []
},
{
"name": "crunch",
"portdir": "security/crunch",
"version": "3.6",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://sourceforge.net/projects/crunch-wordlist/",
"description": "Wordlist generator",
"long_description": "Crunch is a wordlist generator where you can specify a standard character set or a character set you specify. crunch can generate all possible combinations and permutations.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "i0ntempest",
"github": "i0ntempest",
"ports_count": 271
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "ctool",
"portdir": "security/ctool",
"version": "1.2.3",
"license": "Noncommercial",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://web.archive.org/web/20050405212926/http://www.macsecurity.org/tools/ctool/",
"description": "ctool is a checksumming application.",
"long_description": "ctool is a checusmming application that is mindful of the prebinding information stored in Mach-o executable files.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"openssl",
"curl"
]
}
],
"depends_on": []
},
{
"name": "cvemap",
"portdir": "security/cvemap",
"version": "1.0.0",
"license": "none",
"platforms": "darwin",
"epoch": 0,
"replaced_by": "vulnx",
"homepage": "https://www.macports.org",
"description": "Obsolete port, replaced by vulnx",
"long_description": "This port has been replaced by vulnx.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "extract",
"ports": [
null
]
},
{
"type": "fetch",
"ports": [
null
]
},
{
"type": "lib",
"ports": [
null
]
},
{
"type": "patch",
"ports": [
null
]
},
{
"type": "run",
"ports": [
null
]
},
{
"type": "test",
"ports": [
null
]
}
],
"depends_on": []
},
{
"name": "cyrus-sasl-xoauth2",
"portdir": "security/cyrus-sasl-xoauth2",
"version": "0.2",
"license": "MIT",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/moriyoshi/cyrus-sasl-xoauth2",
"description": "Plugin implementation of XOAUTH2 for cyrus-sasl",
"long_description": "Plugin implementation of XOAUTH2 for cyrus-sasl",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [
{
"name": "cal",
"github": "neverpanic",
"ports_count": 60
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"cyrus-sasl2"
]
}
],
"depends_on": []
},
{
"name": "cyrus-sasl2",
"portdir": "security/cyrus-sasl2",
"version": "2.1.28",
"license": "Permissive",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.cyrusimap.org",
"description": "SASL is an authentication library.",
"long_description": "SASL is the Simple Authentication and Security Layer, a method for adding authentication support to connection-based protocols. To use SASL, a protocol includes a command for identifying and authenticating a user to a server and for optionally negotiating protection of subsequent protocol interactions. If its use is negotiated, a security layer is inserted between the protocol and the connection.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [
"kerberos",
"sql",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"zlib",
"openssl",
"kerberos5"
]
}
],
"depends_on": [
{
"type": "lib",
"ports": [
"MongoObjCDriver",
"mesos",
"subversion-pythonbindings-3.9",
"subversion-pythonbindings-2.7",
"subversion-pythonbindings-3.5",
"subversion-pythonbindings-3.6",
"subversion-pythonbindings-3.7",
"percona",
"subversion-pythonbindings-3.8",
"R-mongolite",
"telepathy-gabble",
"mongodb",
"mongodb-devel",
"mysql57",
"mysql8",
"openldap",
"openldap-devel",
"LibVNCServer",
"libmemcached",
"mongo-c-driver",
"mongo-cxx-driver",
"qca-cyrus-sasl",
"qca-qt5-cyrus-sasl",
"qca-qt6-cyrus-sasl",
"spice-server",
"subversion",
"subversion-javahlbindings",
"subversion-python27bindings",
"subversion-rubybindings",
"subversion-pythonbindings-3.10",
"subversion-pythonbindings-3.11",
"subversion-pythonbindings-3.12",
"qemu",
"znc",
"kdepimlibs4",
"kdepimlibs4-kioslaves",
"php85-ldap",
"php84-ldap",
"php83-ldap",
"php82-ldap",
"php81-ldap",
"php80-ldap",
"php74-ldap",
"php73-ldap",
"php72-ldap",
"php71-ldap",
"php70-ldap",
"php56-ldap",
"php55-ldap",
"php54-ldap",
"php53-ldap",
"php52-ldap",
"alpine",
"cyrus-imapd",
"cyrus5-imapd",
"isync",
"libetpan",
"nmail",
"argus",
"argus-clients",
"calendar-contacts-server",
"librdkafka",
"php53-mongo",
"php54-mongo",
"php55-mongo",
"php56-mongo",
"php54-mongodb",
"cyrus-sasl-xoauth2",
"fluent-bit"
]
}
]
},
{
"name": "dalfox",
"portdir": "security/dalfox",
"version": "2.12.0",
"license": "MIT",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://dalfox.hahwul.com",
"description": "DalFox is an powerful open source XSS scanning tool & parameter analyzer",
"long_description": "DalFox is an powerful open source XSS scanning tool and parameter analyzer and utility that speeds up the process of detecting and verifying XSS flaws. It comes with a powerful testing engine, many niche features for the cool hacker",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1053
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "danectl",
"portdir": "security/danectl",
"version": "0.8.4",
"license": "GPL-2+",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "https://raf.org/danectl/",
"description": "DNSSEC DANE implementation manager",
"long_description": "DNSSEC DANE implementation manager. \n\nDANE is \"DNS-based Authentication of Named Entities\". It means securely letting the world know in advance what your public encryption keys are by publishing them as DNS records (TLSA, SSHFP, OPENPGPKEY, SMIMEA) in your DNSSEC-enabled internet domain zone. This is the simplest and most secure way to let the world know what keys to expect when connecting to your servers. This can apply to TLS keys, SSH host keys, and OpenPGP and S/MIME keys. This makes it possible to prevent impersonation or man-in-the-middle attacks. It's mostly used with mail servers. Eventually, it could render certificate authorities unnecessary. DNSSEC has become very easy.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "raf",
"github": "macportsraf",
"ports_count": 33
}
],
"variants": [
"tlsa",
"sshfp",
"openpgpkey",
"smimea"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"libidn2"
]
},
{
"type": "run",
"ports": [
"gnupg2",
"certbot",
"coreutils",
"openssh",
"openssl"
]
}
],
"depends_on": []
},
{
"name": "denyhosts",
"portdir": "security/denyhosts",
"version": "3.1.2",
"license": "GPL-2",
"platforms": "{darwin any} freebsd",
"epoch": 0,
"replaced_by": null,
"homepage": "https://denyhosts.sourceforge.net/",
"description": "DenyHosts is a utility to help sys admins thwart ssh hackers",
"long_description": "DenyHosts is a python program that automatically blocks ssh attacks by adding entries to /etc/hosts.deny. DenyHosts will also inform Linux administrators about offending hosts, attacked users and suspicious logins.",
"active": true,
"categories": [
"sysutils",
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18",
"py314-build",
"py314-installer",
"py314-setuptools",
"py314-wheel"
]
},
{
"type": "lib",
"ports": [
"python314"
]
}
],
"depends_on": []
},
{
"name": "driftwood",
"portdir": "security/driftwood",
"version": "1.0.1",
"license": "Apache-2",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/trufflesecurity/driftwood",
"description": "A tool that can enable you to lookup whether a private key is used for things like TLS or as a GitHub SSH key for a user.",
"long_description": "A tool that can enable you to lookup whether a private key is used for things like TLS or as a GitHub SSH key for a user. driftwood performs lookups with the computed public key, so the private key never leaves where you run the tool. Additionally it supports some basic password cracking for encrypted keys.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1053
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "easy-rsa",
"portdir": "security/easy-rsa",
"version": "3.1.5",
"license": "GPL-2",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/OpenVPN/easy-rsa",
"description": "Command-line CA tool",
"long_description": "Command-line CA tool from OpenVPN project",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "dottedmag",
"github": "dottedmag",
"ports_count": 1
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "run",
"ports": [
"openssl"
]
}
],
"depends_on": []
},
{
"name": "enigma4",
"portdir": "security/enigma4",
"version": "2022.07.02",
"license": "MIT",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/m3sserschmitt/enigma4",
"description": "Onion Routing App",
"long_description": "Onion Routing App",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [],
"variants": [
"debug",
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"cmake",
"pkgconfig",
"clang-20"
]
},
{
"type": "fetch",
"ports": [
"git"
]
},
{
"type": "lib",
"ports": [
"openssl3"
]
}
],
"depends_on": []
},
{
"name": "exploitdb",
"portdir": "security/exploitdb",
"version": "2022-10-18",
"license": "GPL-2",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.exploit-db.com",
"description": "Offensive Security’s Exploit Database Archive",
"long_description": "Offensive Security’s Exploit Database Archive",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "judaew",
"github": "judaew",
"ports_count": 655
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "run",
"ports": [
"bash"
]
}
],
"depends_on": []
},
{
"name": "fail2ban",
"portdir": "security/fail2ban",
"version": "0.9.4",
"license": "GPL-2+",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.fail2ban.org/",
"description": "Fail2ban protects computer against brute-force attacks",
"long_description": "Fail2ban scans log files (e.g. /var/log/apache/error_log) and bans IPs that show the malicious signs -- too many password failures, seeking for exploits, etc. Generally Fail2Ban then used to update firewall rules to reject the IP addresses for a specified amount of time, although any arbitrary other action (e.g. sending an email, or ejecting CD-ROM tray) could also be configured. Out of the box Fail2Ban comes with filters for various services (apache, curier, ssh, etc).",
"active": true,
"categories": [
"security",
"python"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"python27"
]
}
],
"depends_on": []
},
{
"name": "fcrackzip",
"portdir": "security/fcrackzip",
"version": "1.0",
"license": "GPL-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://oldhome.schmorp.de/marc/fcrackzip.html",
"description": "Portable, fast and featureful ZIP password cracker",
"long_description": "Portable, fast and featureful ZIP password cracker",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"perl5",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "fetch-crl",
"portdir": "security/fetch-crl",
"version": "3.0.21",
"license": "Apache-2",
"platforms": "any",
"epoch": 0,
"replaced_by": null,
"homepage": "https://wiki.nikhef.nl/grid/FetchCRL3",
"description": "Download tool for Certificate Revocation Lists",
"long_description": "The fetch-crl utility will retrieve certificate revocation lists (CRLs) for a set of installed trust anchors, based on crl_url files or IGTF-style info files. It will install these for use with OpenSSL, NSS or third-party tools.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [
{
"name": "petr",
"github": "petrrr",
"ports_count": 612
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
}
],
"depends_on": [
{
"type": "run",
"ports": [
"fetch-crl-launchd",
"igtf-ca-bundle"
]
}
]
},
{
"name": "ffuf",
"portdir": "security/ffuf",
"version": "2.1.0",
"license": "MIT",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/ffuf/ffuf",
"description": "Fast web fuzzer written in Go",
"long_description": "Fast web fuzzer written in Go. Supports virtual host discovery, directory discovery, GET & POST parameter fuzzing, and more.",
"active": true,
"categories": [
"security",
"www"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1053
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "fetch-crl-launchd",
"portdir": "security/fetch-crl",
"version": "3.0.21",
"license": "Apache-2",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://wiki.nikhef.nl/grid/FetchCRL3",
"description": "Creates a launchd entry for fetch-crl utility",
"long_description": "Creates a launchd entry for fetch-crl utility. The fetch-crl utility will retrieve certificate revocation lists (CRLs) for a set of installed trust anchors, based on crl_url files or IGTF-style info files. It will install these for use with OpenSSL, NSS or third-party tools.",
"active": true,
"categories": [
"net",
"security"
],
"maintainers": [
{
"name": "petr",
"github": "petrrr",
"ports_count": 612
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "run",
"ports": [
"fetch-crl"
]
}
],
"depends_on": []
},
{
"name": "flawz",
"portdir": "security/flawz",
"version": "0.3.0",
"license": "(MIT or Apache-2)",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/orhun/flawz",
"description": "A Terminal UI for browsing security vulnerabilities (CVEs)",
"long_description": "flawz is a Terminal User Interface (TUI) for browsing the security vulnerabilities (also known as CVEs). As default it uses the vulnerability database (NVD) from NIST and provides search and listing functionalities in the terminal with different theming options.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1053
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"cargo",
"legacy-support",
"rust",
"clang-20"
]
},
{
"type": "lib",
"ports": [
"libunwind"
]
}
],
"depends_on": []
},
{
"name": "fusil",
"portdir": "security/fusil",
"version": "0.7",
"license": "GPL-2",
"platforms": "{darwin any}",
"epoch": 0,
"replaced_by": null,
"homepage": "https://web.archive.org/web/20090406033503/http://fusil.hachoir.org/trac",
"description": "A tool to fuzz various software",
"long_description": "Fusil is a fuzzing framework easing the discovery of problems in software data input, using a technique known as fuzzing, wherein a system is fed corrupted data in order to see how it reacts.",
"active": true,
"categories": [
"security"
],
"maintainers": [],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"python27"
]
}
],
"depends_on": []
},
{
"name": "git-credential-azure",
"portdir": "security/git-credential-azure",
"version": "0.3.1",
"license": "Apache-2",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/hickford/git-credential-azure",
"description": "git-credential-azure is a Git credential helper that authenticates to Azure Repos (dev.azure.com) Azure Repos is part of Azure DevOps.",
"long_description": "git-credential-azure is a Git credential helper that authenticates to Azure Repos (dev.azure.com) Azure Repos is part of Azure DevOps.",
"active": true,
"categories": [
"devel",
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1053
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "git-credential-email",
"portdir": "security/git-credential-email",
"version": "5.9.2",
"license": "Apache-2",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/AdityaGarg8/git-credential-email",
"description": "git credential helpers for email providers",
"long_description": "Git credential helpers for Microsoft Outlook, Gmail, Yahoo, AOL and Proton Mail accounts.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "makr",
"github": "mohd-akram",
"ports_count": 83
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "lib",
"ports": [
"python314",
"py314-requests",
"py314-keyring"
]
}
],
"depends_on": []
},
{
"name": "git-credential-gopass",
"portdir": "security/git-credential-gopass",
"version": "1.16.1",
"license": "MIT",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.gopass.pw",
"description": "Gopass git-credentials helper",
"long_description": "Gopass git-credentials helper",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "sikmir",
"github": "sikmir",
"ports_count": 44
},
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1053
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "git-credential-oauth",
"portdir": "security/git-credential-oauth",
"version": "0.17.2",
"license": "Apache-2",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/hickford/git-credential-oauth",
"description": "A Git credential helper that securely authenticates to GitHub, GitLab and BitBucket using OAuth.",
"long_description": "A Git credential helper that securely authenticates to GitHub, GitLab and BitBucket using OAuth.",
"active": true,
"categories": [
"devel",
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1053
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "gitleaks",
"portdir": "security/gitleaks",
"version": "8.30.1",
"license": "MIT",
"platforms": "darwin freebsd linux",
"epoch": 1,
"replaced_by": null,
"homepage": "https://github.com/gitleaks/gitleaks",
"description": "Scan git repos (or files) for secrets using regex and entropy",
"long_description": "Gitleaks is a SAST tool for detecting and preventing hardcoded secrets like passwords, api keys, and tokens in git repos. Gitleaks is an easy-to-use, all-in-one solution for detecting secrets, past or present, in your code.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1053
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "gitsign",
"portdir": "security/gitsign",
"version": "0.14.0",
"license": "Apache-2",
"platforms": "darwin freebsd linux",
"epoch": 0,
"replaced_by": null,
"homepage": "https://github.com/sigstore/gitsign",
"description": "Keyless Git signing using Sigstore",
"long_description": "Keyless Git signing using Sigstore",
"active": true,
"categories": [
"devel",
"security"
],
"maintainers": [
{
"name": "herby.gillot",
"github": "herbygillot",
"ports_count": 1053
}
],
"variants": [],
"dependencies": [
{
"type": "build",
"ports": [
"go",
"clang-18"
]
}
],
"depends_on": []
},
{
"name": "gnomint",
"portdir": "security/gnomint",
"version": "1.2.1",
"license": "GPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "http://gnomint.sourceforge.net/",
"description": "Single-user PKI with graphical (GTK) and CLI interface",
"long_description": "gnoMint provides a GUI and a CLI to manage a simple PKI. Supports multiple root certificates, intermediate certificates, creating/importing and signing of CSRs and certificate revokation. Stores the whole PKI in a single SQLite file.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "fgp",
"github": "",
"ports_count": 2
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"autoconf",
"automake",
"libtool",
"pkgconfig",
"gnome-common",
"intltool",
"clang-18"
]
},
{
"type": "lib",
"ports": [
"gconf",
"zlib",
"gtk2",
"sqlite3",
"gettext",
"glib2",
"gnutls",
"libgcrypt",
"readline"
]
}
],
"depends_on": []
},
{
"name": "gnu-pw-mgr",
"portdir": "security/gnu-pw-mgr",
"version": "2.7.4",
"license": "GPL-3+",
"platforms": "darwin",
"epoch": 0,
"replaced_by": null,
"homepage": "https://www.gnu.org/software/gnu-pw-mgr/",
"description": "password manager to reconstruct difficult passwords",
"long_description": "gnu-pw-mgr is a password manager designed to make it easy to reconstruct difficult passwords when they are needed, while limiting the risk of attack. The user of this program inputs a very long initial password \"seed\" and a self-defined transformation of a web site URL to obtain both the password and a user name hint for that web site. The seed is stored in a hidden file. However, the passwords and the URL transforms are never stored anywhere. You must remember this transform (password id), or the password is lost forever.",
"active": true,
"categories": [
"security"
],
"maintainers": [
{
"name": "ryandesign",
"github": "ryandesign",
"ports_count": 2085
}
],
"variants": [
"universal"
],
"dependencies": [
{
"type": "build",
"ports": [
"clang-18"
]
},
{
"type": "extract",
"ports": [
"xz"
]
},
{
"type": "lib",
"ports": [
"gettext"
]
}
],
"depends_on": []
}
]
}