{"count":51892,"next":"https://ports.macports.org/api/v1/ports/?format=json&ordering=updated_at&page=986","previous":"https://ports.macports.org/api/v1/ports/?format=json&ordering=updated_at&page=984","results":[{"name":"skipfish","portdir":"security/skipfish","version":"2.10b","license":"Apache-2","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://code.google.com/p/skipfish/","description":"web application security scanner","long_description":"A fully automated, active web application security reconnaissance tool.","active":true,"categories":["security"],"maintainers":[],"variants":[],"dependencies":[{"type":"build","ports":["clang-18"]},{"type":"lib","ports":["zlib","openssl10","pcre","libidn"]}],"depends_on":[]},{"name":"smimesign","portdir":"security/smimesign","version":"0.2.0","license":"MIT","platforms":"darwin freebsd linux","epoch":0,"replaced_by":null,"homepage":"https://github.com/github/smimesign","description":"An S/MIME signing utility for use with Git","long_description":"Smimesign is an S/MIME signing utility for macOS and Windows that is compatible with Git. This allows developers to sign their Git commits and tags using X.509 certificates issued by public certificate authorities or their organization's internal certificate authority. Smimesign uses keys and certificates already stored in the macOS Keychain or the Windows Certificate Store.","active":true,"categories":["devel","security"],"maintainers":[{"name":"herby.gillot","github":"herbygillot","ports_count":1053}],"variants":[],"dependencies":[{"type":"build","ports":["go","clang-18"]}],"depends_on":[]},{"name":"sniffglue","portdir":"security/sniffglue","version":"0.16.1","license":"GPL-3","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://github.com/kpcyrd/sniffglue","description":"Secure multithreaded packet sniffer","long_description":"sniffglue is a network sniffer written in rust. Network packets are parsed concurrently using a thread pool to utilize all cpu cores. Project goals are that you can run sniffglue securely on untrusted networks and that it must not crash when processing packets. The output should be as useful as possible by default.","active":true,"categories":["net","security"],"maintainers":[{"name":"judaew","github":"judaew","ports_count":655}],"variants":["universal"],"dependencies":[{"type":"build","ports":["cargo","legacy-support","rust","clang-20"]},{"type":"lib","ports":["libunwind"]},{"type":"run","ports":["libpcap"]}],"depends_on":[]},{"name":"softhsm","portdir":"security/softhsm","version":"2.7.0","license":"BSD","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://www.softhsm.org/","description":"SoftHSM is an implementation of a cryptographic store accessible through a PKCS #11 interface.","long_description":"SoftHSM is an implementation of a cryptographic store accessible through a PKCS #11 interface. You can use it to explore PKCS #11 without having a Hardware Security Module. SoftHSM Version 2 is using openssl for its cryptographic operations.","active":true,"categories":["security"],"maintainers":[{"name":"jaap","github":"Jakker","ports_count":9}],"variants":["universal"],"dependencies":[{"type":"build","ports":["clang-18","libtool","pkgconfig","autoconf","automake","cppunit"]},{"type":"lib","ports":["openssl","sqlite3"]}],"depends_on":[{"type":"build","ports":["pkcs11-provider"]}]},{"name":"sops","portdir":"security/sops","version":"3.12.2","license":"MPL-2","platforms":"darwin freebsd linux","epoch":0,"replaced_by":null,"homepage":"https://github.com/mozilla/sops","description":"Simple and flexible tool for managing secrets","long_description":"Simple and flexible tool for managing secrets. sops is an editor of encrypted files that supports YAML, JSON, ENV, INI and BINARY formats and encrypts with AWS KMS, GCP KMS, Azure Key Vault and PGP.","active":true,"categories":["security"],"maintainers":[{"name":"herby.gillot","github":"herbygillot","ports_count":1053}],"variants":[],"dependencies":[{"type":"build","ports":["go","clang-18"]}],"depends_on":[]},{"name":"sqlmap","portdir":"security/sqlmap","version":"1.10","license":"GPL-2+","platforms":"{darwin any}","epoch":0,"replaced_by":null,"homepage":"https://sqlmap.org/","description":"Automatic SQL injection and database takeover tool","long_description":"sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches including database fingerprinting, over data fetching from the database, accessing the underlying file system, and executing commands on the operating system via out-of-band connections.","active":true,"categories":["databases","security","python"],"maintainers":[{"name":"judaew","github":"judaew","ports_count":655}],"variants":["python27","python310","python311","python312","python313","python314"],"dependencies":[{"type":"build","ports":["clang-18","py314-build","py314-installer","py314-setuptools","py314-wheel"]},{"type":"lib","ports":["python314"]}],"depends_on":[]},{"name":"sqlninja","portdir":"security/sqlninja","version":"0.2.6-r1","license":"GPL-3+","platforms":"any","epoch":0,"replaced_by":null,"homepage":"http://sqlninja.sourceforge.net/","description":"Microsoft SQL Server SQL Injection vulnerability tester","long_description":"Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end.","active":true,"categories":["net","security"],"maintainers":[],"variants":["perl5_28","perl5_30","perl5_32","perl5_34"],"dependencies":[{"type":"build","ports":["clang-18"]},{"type":"lib","ports":["p5.34-io-socket-ssl","p5.34-net-dns","p5.34-net-pcap","p5.34-net-rawip","p5.34-netpacket"]}],"depends_on":[]},{"name":"ssdeep","portdir":"security/ssdeep","version":"2.14.1","license":"GPL-2","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://ssdeep-project.github.io/ssdeep/","description":"Recursively compute fuzzy hashes on files","long_description":"ssdeep is a program for computing fuzzy hashes on files. These hashes can be used for finding similar files.","active":true,"categories":["sysutils","security"],"maintainers":[],"variants":["universal"],"dependencies":[{"type":"build","ports":["clang-18"]}],"depends_on":[]},{"name":"sqlninja-devel","portdir":"security/sqlninja","version":"0.2.999-alpha1","license":"GPL-3+","platforms":"any","epoch":0,"replaced_by":null,"homepage":"http://sqlninja.sourceforge.net/","description":"Microsoft SQL Server SQL Injection vulnerability tester","long_description":"Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end.","active":true,"categories":["net","security"],"maintainers":[],"variants":["perl5_28","perl5_30","perl5_32","perl5_34"],"dependencies":[{"type":"build","ports":["clang-18"]},{"type":"lib","ports":["p5.34-dbi","p5.34-io-socket-ssl","p5.34-net-dns","p5.34-dbd-sqlite","p5.34-net-rawip","p5.34-netpacket","p5.34-net-pcap"]}],"depends_on":[]},{"name":"ssh-askpass","portdir":"security/ssh-askpass","version":"1.5.1","license":"ISC","platforms":"{darwin any}","epoch":0,"replaced_by":null,"homepage":"https://github.com/theseal/ssh-askpass","description":"ssh-askpass for OS X/macOS","long_description":"ssh-askpass for OS X/macOS","active":true,"categories":["devel","security"],"maintainers":[{"name":"judaew","github":"judaew","ports_count":655}],"variants":[],"dependencies":[{"type":"build","ports":["clang-18"]}],"depends_on":[]},{"name":"ssh-audit","portdir":"security/ssh-audit","version":"3.3.0","license":"MIT","platforms":"{darwin any}","epoch":0,"replaced_by":null,"homepage":"https://github.com/jtesta/ssh-audit","description":"ssh-audit is a tool for ssh server & client configuration auditing.","long_description":"ssh-audit is a tool for ssh server & client configuration auditing.","active":true,"categories":["security","python"],"maintainers":[{"name":"mps","github":"Schamschula","ports_count":1419}],"variants":["python310","python311","python312","python313"],"dependencies":[{"type":"build","ports":["clang-18","py313-build","py313-installer","py313-setuptools","py313-wheel"]},{"type":"lib","ports":["python313"]}],"depends_on":[]},{"name":"ssh-manager","portdir":"security/ssh-manager","version":"1.102.0","license":"Apache-2","platforms":"darwin freebsd linux","epoch":0,"replaced_by":null,"homepage":"https://github.com/omegion/ssh-manager","description":"SSH Key Manager for Bitwarden and 1Password","long_description":"SSH Key Manager for Bitwarden and 1Password","active":true,"categories":["security"],"maintainers":[{"name":"herby.gillot","github":"herbygillot","ports_count":1053}],"variants":[],"dependencies":[{"type":"build","ports":["go","clang-18"]}],"depends_on":[]},{"name":"ssss","portdir":"security/ssss","version":"1.0.1","license":"Apache-2","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://github.com/okoeroo/ssss","description":"Shamir's Secret Sharing Service","long_description":"Shamir's Secret Sharing is an algorithm in cryptography. It is a form of secret sharing, where a secret is divided into parts, giving each participant its own unique part, where some of the parts or all of them are needed in order to reconstruct the secret. Counting on all participants to combine together the secret might be impractical, and therefore sometimes the threshold scheme is used where any k of the parts are sufficient to reconstruct the original secret.","active":true,"categories":["security"],"maintainers":[{"name":"okoeroo","github":"","ports_count":2}],"variants":["universal"],"dependencies":[{"type":"build","ports":["autoconf","automake","libtool","clang-18"]},{"type":"lib","ports":["openssl"]}],"depends_on":[]},{"name":"stegdetect","portdir":"security/stegdetect","version":"0.6","license":"BSD-old and SSLeay and Permissive and IJG","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"http://www.outguess.org/detection.php","description":"tool for detecting steganographic content in jpeg images.","long_description":"Stegdetect is an automated tool for detecting steganographic content in images. It is capable of detecting several different steganographic methods to embed hidden information in jpeg images.","active":true,"categories":["graphics","security"],"maintainers":[],"variants":["universal"],"dependencies":[{"type":"build","ports":["clang-18"]}],"depends_on":[]},{"name":"steghide","portdir":"security/steghide","version":"0.5.1","license":"GPL-2+","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"http://steghide.sourceforge.net/","description":"Steghide is a steganography program","long_description":"Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests.","active":true,"categories":["security"],"maintainers":[{"name":"cforkin","github":"","ports_count":1}],"variants":["universal"],"dependencies":[{"type":"build","ports":["libtool","clang-18"]},{"type":"lib","ports":["libmcrypt","mhash","zlib","libiconv","libjpeg-turbo","gettext"]}],"depends_on":[]},{"name":"step-ca","portdir":"security/step-ca","version":"0.30.2","license":"Apache-2","platforms":"darwin freebsd linux","epoch":0,"replaced_by":null,"homepage":"https://github.com/smallstep/certificates","description":"A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH.","long_description":"step-ca is an online Certificate Authority (CA) for secure, automated X.509 and SSH certificate management. It's the server counterpart to step CLI. It is secured with TLS, and it offers several configurable certificate provisioners, flexible certificate templating, and pluggable database backends to suit a wide variety of contexts and workflows. It employs sane default algorithms and attributes, so you don't have to be a security engineer to use it securely.","active":true,"categories":["security"],"maintainers":[{"name":"wyuenho","github":"wyuenho","ports_count":1}],"variants":[],"dependencies":[{"type":"build","ports":["go","clang-18"]}],"depends_on":[]},{"name":"step-cli","portdir":"security/step-cli","version":"0.30.2","license":"Apache-2","platforms":"darwin freebsd linux","epoch":0,"replaced_by":null,"homepage":"https://github.com/smallstep/cli","description":"A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.","long_description":"step is a toolkit for working with your public key infrastructure (PKI). It's also the client counterpart to the step-ca online Certificate Authority (CA).","active":true,"categories":["security"],"maintainers":[{"name":"herby.gillot","github":"herbygillot","ports_count":1053}],"variants":[],"dependencies":[{"type":"build","ports":["go","clang-18"]}],"depends_on":[]},{"name":"stunnel","portdir":"security/stunnel","version":"5.78","license":"GPL-2+","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"http://www.stunnel.org/","description":"SSL tunneling program","long_description":"Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code.","active":true,"categories":["net","security"],"maintainers":[{"name":"mps","github":"Schamschula","ports_count":1419}],"variants":["openssl1","openssl3","libwrap","mimalloc","universal"],"dependencies":[{"type":"build","ports":["pkgconfig","clang-18"]},{"type":"lib","ports":["tcp_wrappers","openssl3"]}],"depends_on":[]},{"name":"tcpcrypt-devel","portdir":"security/tcpcrypt-devel","version":"0.5","license":"BSD","platforms":"darwin freebsd","epoch":0,"replaced_by":null,"homepage":"https://github.com/scslab/tcpcrypt","description":"encrypt (almost) all of your network traffic","long_description":"Tcpcrypt is a protocol that attempts to encrypt (almost) all of your network traffic. Unlike other security mechanisms, Tcpcrypt works out of the box: it requires no configuration, no changes to applications, and your network connections will continue to work even if the remote end does not support Tcpcrypt, in which case connections will gracefully fall back to standard clear-text TCP. Install Tcpcrypt and you'll feel no difference in your every day user experience, but yet your traffic will be more secure and you'll have made life much harder for hackers.","active":true,"categories":["security","www"],"maintainers":[],"variants":["universal"],"dependencies":[{"type":"build","ports":["autoconf","automake","libtool","clang-18"]},{"type":"lib","ports":["openssl"]}],"depends_on":[]},{"name":"testssl","portdir":"security/testssl","version":"3.2.3","license":"GPL-2","platforms":"any","epoch":0,"replaced_by":null,"homepage":"https://testssl.sh","description":"Test TLS/SSL encryption anywhere on any port","long_description":"testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.","active":true,"categories":["security"],"maintainers":[{"name":"makr","github":"mohd-akram","ports_count":83}],"variants":[],"dependencies":[{"type":"build","ports":["clang-18"]}],"depends_on":[]},{"name":"tfsec","portdir":"security/tfsec","version":"1.28.14","license":"MIT","platforms":"darwin freebsd linux","epoch":0,"replaced_by":null,"homepage":"https://github.com/tfsec/tfsec","description":"Security scanner for your Terraform code","long_description":"Security scanner for your Terraform code. tfsec uses static analysis of your Terraform templates to spot potential security issues.","active":true,"categories":["sysutils","security"],"maintainers":[{"name":"herby.gillot","github":"herbygillot","ports_count":1053}],"variants":[],"dependencies":[{"type":"build","ports":["go","clang-18"]}],"depends_on":[]},{"name":"tinyca2","portdir":"security/tinyca2","version":"0.7.5","license":"GPL-2+","platforms":"any","epoch":0,"replaced_by":null,"homepage":"https://salsa.debian.org/cpt_nemo-guest/tinyca","description":"GUI Certificate Authority tool.","long_description":"TinyCA is a simple graphical user interface for managing a small CA (Certification Authority). TinyCA works as a frontend for openssl.","active":true,"categories":["net","security"],"maintainers":[],"variants":["perl5_28","perl5_30","perl5_32","perl5_34"],"dependencies":[{"type":"build","ports":["clang-18"]},{"type":"lib","ports":["zip","gettext","openssl","p5.34-gtk2","p5.34-locale-gettext"]}],"depends_on":[]},{"name":"tor-devel","portdir":"security/tor-devel","version":"0.4.8.13","license":"BSD","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://www.torproject.org/","description":"anonymizing overlay network for TCP","long_description":"Tor provides a distributed network of servers (onion routers). Users bounce their TCP streams (web traffic, FTP, SSH, etc.) around the routers. This makes it hard for recipients, observers, and even the onion routers themselves to track the source of the stream.","active":true,"categories":["net","security"],"maintainers":[],"variants":["universal"],"dependencies":[{"type":"build","ports":["pkgconfig","clang-18"]},{"type":"lib","ports":["zlib","libevent","openssl3"]}],"depends_on":[]},{"name":"tor","portdir":"security/tor","version":"0.4.8.17","license":"BSD","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://www.torproject.org/","description":"anonymizing overlay network for TCP","long_description":"Tor provides a distributed network of servers (onion routers). Users bounce their TCP streams (web traffic, FTP, SSH, etc.) around the routers. This makes it hard for recipients, observers, and even the onion routers themselves to track the source of the stream.","active":true,"categories":["net","security"],"maintainers":[{"name":"i0ntempest","github":"i0ntempest","ports_count":271}],"variants":["universal"],"dependencies":[{"type":"build","ports":["pkgconfig","clang-18"]},{"type":"lib","ports":["zlib","libevent","openssl3"]}],"depends_on":[{"type":"lib","ports":["Vidalia","py39-torrequest","py38-torrequest","py310-torrequest","py311-torrequest","py312-torrequest","py313-torrequest","py314-torrequest"]},{"type":"run","ports":["onioncat"]}]},{"name":"totp-cli","portdir":"security/totp-cli","version":"1.9.2","license":"MIT","platforms":"darwin freebsd linux","epoch":0,"replaced_by":null,"homepage":"https://github.com/yitsushi/totp-cli","description":"Authy/Google Authenticator like TOTP CLI tool written in Go.","long_description":"A simple TOTP (Time-based One-time Password) CLI tool. TOTP is the most common mechanism for 2FA (Two-Factor-Authentication). You can manage and organize your accounts with namespaces and protect your data with a password.","active":true,"categories":["security"],"maintainers":[{"name":"herby.gillot","github":"herbygillot","ports_count":1053},{"name":"smanojkarthick","github":"manojkarthick","ports_count":10},{"name":"amtor","github":"RobK88","ports_count":11}],"variants":[],"dependencies":[{"type":"build","ports":["go","clang-18"]}],"depends_on":[]},{"name":"tripwire","portdir":"security/tripwire","version":"2.4.3.7","license":"GPL-2+","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://github.com/Tripwire/tripwire-open-source","description":"integrity assurance and intrusion detection tool","long_description":"Tripwire software is a tool that checks to see what has changed on your system. The program monitors key attributes of files that should not change, including binary signature, size, expected change of size, etc. Tripwire is originally known as an intrusion detection tool, but can be used for many other purposes such as integrity assurance, change management, policy compliance and more.","active":true,"categories":["security"],"maintainers":[],"variants":["anacron","universal"],"dependencies":[{"type":"build","ports":["clang-18"]},{"type":"lib","ports":["openssl"]}],"depends_on":[]},{"name":"trivy","portdir":"security/trivy","version":"0.70.0","license":"Apache-2","platforms":"darwin linux freebsd","epoch":0,"replaced_by":null,"homepage":"https://github.com/aquasecurity/trivy","description":"A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI","long_description":"A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI. Trivy detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn, etc.). Trivy is easy to use. Just install the binary and you're ready to scan. All you need to do for scanning is to specify a target such as an image name of the container.","active":true,"categories":["sysutils","security"],"maintainers":[{"name":"herby.gillot","github":"herbygillot","ports_count":1053}],"variants":[],"dependencies":[{"type":"build","ports":["go","goreleaser","clang-18"]},{"type":"fetch","ports":["git"]}],"depends_on":[]},{"name":"trufflehog","portdir":"security/trufflehog","version":"3.94.1","license":"AGPL-3","platforms":"darwin freebsd linux","epoch":0,"replaced_by":null,"homepage":"https://github.com/trufflesecurity/trufflehog","description":"Find credentials all over the place","long_description":"trufflehog scans for credentials in Github & Gitlab repositories, filesystems, and S3 buckets. It utilizes 700 credential detectors that support active verification against their respective APIs.","active":true,"categories":["security"],"maintainers":[{"name":"herby.gillot","github":"herbygillot","ports_count":1053}],"variants":[],"dependencies":[{"type":"build","ports":["go","clang-18"]}],"depends_on":[]},{"name":"uacme","portdir":"security/uacme","version":"1.8.0","license":"GPL-3+","platforms":"any","epoch":0,"replaced_by":null,"homepage":"https://github.com/ndilieto/uacme","description":"ACMEv2 client written in plain C with minimal dependencies","long_description":"lightweight client for the RFC8555 ACMEv2 protocol, written in plain C with minimal dependencies (libcurl and OpenSSL).","active":true,"categories":["security"],"maintainers":[{"name":"lmkrawiec","github":"lmkra","ports_count":3}],"variants":["universal"],"dependencies":[{"type":"build","ports":["clang-18","pkgconfig","asciidoc","autoconf","automake","libtool"]},{"type":"lib","ports":["curl","openssl"]}],"depends_on":[]},{"name":"unhash","portdir":"security/unhash","version":"1.1","license":"GPL-2","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"http://www.dxp2532.info/","description":"brute force attack against MD5 or SHA1 hashes","long_description":"UnHash is a program that tries a brute force attack against a given hash. The hash can be MD5 or SHA1, and the program will auto-detect which one is given.","active":true,"categories":["security"],"maintainers":[],"variants":[],"dependencies":[{"type":"build","ports":["clang-18"]},{"type":"lib","ports":["openssl"]}],"depends_on":[]},{"name":"usign-devel","portdir":"security/usign-devel","version":"20190920","license":"ISC","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://openwrt.org/docs/guide-user/security/keygen#generate_usign_key_pair","description":"OpenWrt signature verification utility","long_description":"OpenWrt signature verification utility","active":true,"categories":["security"],"maintainers":[{"name":"l2dy","github":"l2dy","ports_count":97}],"variants":["debug","universal"],"dependencies":[{"type":"build","ports":["cmake","clang-18"]}],"depends_on":[]},{"name":"vault","portdir":"security/vault","version":"2.0.0","license":"Commercial and Permissive","platforms":"darwin freebsd linux","epoch":0,"replaced_by":null,"homepage":"https://www.vaultproject.io","description":"A Tool for Managing Secrets","long_description":"HashiCorp Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault handles leasing, key revocation, key rolling, and auditing. Through a unified API, users can access an encrypted Key/Value store and network encryption-as-a-service, or generate AWS IAM/STS credentials, SQL/NoSQL databases, X.509 certificates, SSH credentials, and more.","active":true,"categories":["security"],"maintainers":[{"name":"herby.gillot","github":"herbygillot","ports_count":1053}],"variants":["ui"],"dependencies":[{"type":"build","ports":["go","clang-18"]},{"type":"fetch","ports":["git"]}],"depends_on":[]},{"name":"vcs_blackbox","portdir":"security/vcs_blackbox","version":"2.0.0","license":"BSD","platforms":"any","epoch":0,"replaced_by":null,"homepage":"https://github.com/StackExchange/blackbox","description":"Safely store secrets in git/hg/svn repos using GPG encryption","long_description":"Storing secrets such as passwords, certificates and private keys in Git/Mercurial/SubVersion is dangerous. Blackbox makes it easy to store secrets safely using GPG encryption. They can be easily decrypted for editing or use in production.","active":true,"categories":["security"],"maintainers":[{"name":"tal","github":"","ports_count":1},{"name":"audvare","github":"Tatsh","ports_count":25}],"variants":[],"dependencies":[{"type":"build","ports":["clang-18"]}],"depends_on":[]},{"name":"volatility","portdir":"security/volatility","version":"2.6.1","license":"GPL-2+","platforms":"darwin","epoch":0,"replaced_by":"volatility3","homepage":"https://www.macports.org","description":"Obsolete port, replaced by volatility3","long_description":"This port has been replaced by volatility3.","active":true,"categories":["security"],"maintainers":[],"variants":[],"dependencies":[{"type":"build","ports":["clang-18"]},{"type":"extract","ports":[null]},{"type":"fetch","ports":[null]},{"type":"lib","ports":[null]},{"type":"patch","ports":[null]},{"type":"run","ports":[null]},{"type":"test","ports":[null]}],"depends_on":[]},{"name":"volatility3","portdir":"security/volatility3","version":"2.26.2","license":"VSL","platforms":"{darwin any}","epoch":0,"replaced_by":null,"homepage":"https://www.volatilityfoundation.org/","description":"Memory forensics framework","long_description":"The Volatility Framework is a completely open collection of tools for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer unprecedented visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.","active":true,"categories":["security"],"maintainers":[],"variants":[],"dependencies":[{"type":"build","ports":["py314-build","clang-18","py314-wheel","py314-setuptools","py314-installer"]},{"type":"lib","ports":["python314","py314-pefile"]},{"type":"run","ports":["py314-yara","py314-pycryptodome","py314-Pillow","capstone"]}],"depends_on":[]},{"name":"voms","portdir":"security/voms","version":"2.0.9","license":"Apache-2","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://github.com/italiangrid/voms","description":"create a proxy with VOMS extensions","long_description":"The voms-proxy-init generates a proxy with the VOMS information included in a non-critical extension.","active":true,"categories":["security"],"maintainers":[{"name":"okoeroo","github":"","ports_count":2}],"variants":["universal"],"dependencies":[{"type":"build","ports":["autoconf","automake","libtool","clang-18"]},{"type":"lib","ports":["openssl","expat"]}],"depends_on":[]},{"name":"vsh","portdir":"security/vsh","version":"0.14.0","license":"MIT","platforms":"darwin freebsd linux","epoch":0,"replaced_by":null,"homepage":"https://github.com/fishi0x01/vsh","description":"HashiCorp Vault interactive shell and cli tool","long_description":"vsh is a HashiCorp Vault interactive shell and cli tool. It comes with multiple common operations and treats paths like directories and files.","active":true,"categories":["security"],"maintainers":[{"name":"herby.gillot","github":"herbygillot","ports_count":1053}],"variants":[],"dependencies":[{"type":"build","ports":["go","clang-18"]}],"depends_on":[]},{"name":"vulnx","portdir":"security/vulnx","version":"2.0.1","license":"MIT","platforms":"darwin freebsd linux","epoch":0,"replaced_by":null,"homepage":"https://github.com/projectdiscovery/vulnx","description":"Modern CLI for exploring vulnerability data","long_description":"Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities","active":true,"categories":["security"],"maintainers":[{"name":"herby.gillot","github":"herbygillot","ports_count":1053}],"variants":[],"dependencies":[{"type":"build","ports":["go","clang-18"]}],"depends_on":[]},{"name":"xca","portdir":"security/xca","version":"2.9.0","license":"Permissive","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://www.hohnstaedt.de/xca/","description":"X Certificate and Key management","long_description":"XCA is a CA & PKI management tool that supports creating and managing X.509 certificates, certificate requests, RSA, DSA and EC private keys, Smartcards and CRLs.","active":true,"categories":["security","crypto"],"maintainers":[],"variants":["debug","RemoteSQL"],"dependencies":[{"type":"build","ports":["cmake","pkgconfig","clang-18"]},{"type":"lib","ports":["qt5-qtmacextras","qt5-qtmultimedia","qt5-qttools","qt5-qtbase","qt5-sqlite-plugin","libtool","openssl11","qt5-qttranslations","qt5-qtdeclarative","qt5-qtsvg"]}],"depends_on":[]},{"name":"xml-security-c","portdir":"security/xml-security-c","version":"2.0.4","license":"Apache-2","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"http://santuario.apache.org/","description":"XML Signing/Encryption for C++","long_description":"The C++ library is an implementation of the XML Digital Signature specification. It is designed to be easily ported to new platforms, and has been tested on Solaris, Linux, FreeBSD, NetBSD and Windows.","active":true,"categories":["textproc","security","shibboleth","xml"],"maintainers":[{"name":"snc","github":"nerdling","ports_count":157},{"name":"scantor","github":"scantor","ports_count":6}],"variants":["universal"],"dependencies":[{"type":"build","ports":["pkgconfig","clang-18"]},{"type":"lib","ports":["openssl","xercesc3"]}],"depends_on":[{"type":"lib","ports":["wt","opensaml","shibboleth","xmltooling"]}]},{"name":"xmlsec","portdir":"security/xmlsec","version":"1.3.11","license":"MIT","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://www.aleksey.com/xmlsec/","description":"XML Security Library is a C library based on LibXML2.","long_description":"XML Security Library is a C library based on LibXML2.. The library supports major XML security standards. XML Signature, XML Encryption, Canonical XML and Exclusive Canonical XML.","active":true,"categories":["devel","textproc","security"],"maintainers":[{"name":"mps","github":"Schamschula","ports_count":1419}],"variants":[],"dependencies":[{"type":"build","ports":["pkgconfig","clang-18"]},{"type":"lib","ports":["libgcrypt","libtool","nspr","gnutls","nss","libxml2","libxslt","openssl","icu"]}],"depends_on":[{"type":"lib","ports":["py27-xmlsec","py36-xmlsec","py38-xmlsec","py39-xmlsec","qore-xmlsec-module","libreoffice","py310-xmlsec","py311-xmlsec","py312-xmlsec","py313-xmlsec","py314-xmlsec","oath-toolkit"]}]},{"name":"xmlsec-1.2","portdir":"security/xmlsec-1.2","version":"1.2.42","license":"MIT","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://www.aleksey.com/xmlsec/","description":"XML Security Library is a C library based on LibXML2.","long_description":"XML Security Library is a C library based on LibXML2.. The library supports major XML security standards. XML Signature, XML Encryption, Canonical XML and Exclusive Canonical XML.","active":true,"categories":["devel","textproc","security"],"maintainers":[{"name":"mps","github":"Schamschula","ports_count":1419}],"variants":[],"dependencies":[{"type":"build","ports":["pkgconfig","clang-18"]},{"type":"lib","ports":["libgcrypt","libtool","nspr","gnutls","nss","libxml2","libxslt","openssl","icu"]}],"depends_on":[{"type":"lib","ports":["py37-xmlsec"]}]},{"name":"xmltooling","portdir":"security/xmltooling","version":"3.2.4","license":"Apache-2","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://www.shibboleth.net","description":"XMLTooling library for C++","long_description":"Toolkit for security-aware XML processing","active":true,"categories":["textproc","security","shibboleth","xml"],"maintainers":[{"name":"snc","github":"nerdling","ports_count":157},{"name":"scantor","github":"scantor","ports_count":6}],"variants":["universal"],"dependencies":[{"type":"build","ports":["pkgconfig","boost176","clang-18"]},{"type":"lib","ports":["xml-security-c","zlib","xercesc3","log4shib","openssl","curl"]}],"depends_on":[{"type":"lib","ports":["wt","opensaml","shibboleth"]}]},{"name":"yara","portdir":"security/yara","version":"4.5.6","license":"GPL-2+","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://github.com/VirusTotal/yara","description":"Malware identification and classification tool","long_description":"YARA is a tool aimed at helping malware researchers to identify and classify malware samples.","active":true,"categories":["security"],"maintainers":[],"variants":["universal"],"dependencies":[{"type":"build","ports":["clang-18","autoconf","automake","libtool","pkgconfig"]},{"type":"lib","ports":["jansson","openssl","pcre","protobuf-c","libmagic"]}],"depends_on":[{"type":"lib","ports":["py27-yara","py35-yara","py36-yara","py38-yara","py39-yara","py37-yara","py310-yara","py311-yara","py312-yara","py313-yara","py314-yara"]}]},{"name":"ykpers","portdir":"security/ykpers","version":"1.20.0","license":"BSD","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://developers.yubico.com/yubikey-personalization/","description":"Easily personalize Yubico's USB keys.","long_description":"Yubico's USB keys (called Yubikeys) need to be personalized. This project's purpose is to create a library that makes this an easy task.","active":true,"categories":["security"],"maintainers":[{"name":"cal","github":"neverpanic","ports_count":60},{"name":"snc","github":"nerdling","ports_count":157}],"variants":["universal"],"dependencies":[{"type":"build","ports":["clang-18"]},{"type":"lib","ports":["libyubikey"]}],"depends_on":[{"type":"lib","ports":["KeePassXC","KeePassXC-devel","yubico-pam"]}]},{"name":"py310-yara","portdir":"security/yara","version":"4.5.5","license":"GPL-2+","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://github.com/VirusTotal/yara-python","description":"yara bindings for python 3.10","long_description":"Malware identification and classification tool. This subport provides bindings for python 3.10","active":true,"categories":["security","python"],"maintainers":[],"variants":[],"dependencies":[{"type":"build","ports":["py310-setuptools","clang-18"]},{"type":"lib","ports":["yara","python310"]}],"depends_on":[]},{"name":"py311-yara","portdir":"security/yara","version":"4.5.5","license":"GPL-2+","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://github.com/VirusTotal/yara-python","description":"yara bindings for python 3.11","long_description":"Malware identification and classification tool. This subport provides bindings for python 3.11","active":true,"categories":["security","python"],"maintainers":[],"variants":[],"dependencies":[{"type":"build","ports":["py311-setuptools","clang-18"]},{"type":"lib","ports":["yara","python311"]}],"depends_on":[]},{"name":"py312-yara","portdir":"security/yara","version":"4.5.5","license":"GPL-2+","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://github.com/VirusTotal/yara-python","description":"yara bindings for python 3.12","long_description":"Malware identification and classification tool. This subport provides bindings for python 3.12","active":true,"categories":["security","python"],"maintainers":[],"variants":[],"dependencies":[{"type":"build","ports":["py312-setuptools","clang-18"]},{"type":"lib","ports":["yara","python312"]}],"depends_on":[]},{"name":"py313-yara","portdir":"security/yara","version":"4.5.5","license":"GPL-2+","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://github.com/VirusTotal/yara-python","description":"yara bindings for python 3.13","long_description":"Malware identification and classification tool. This subport provides bindings for python 3.13","active":true,"categories":["security","python"],"maintainers":[],"variants":[],"dependencies":[{"type":"build","ports":["clang-18","py313-setuptools"]},{"type":"lib","ports":["yara","python313"]}],"depends_on":[]},{"name":"py314-yara","portdir":"security/yara","version":"4.5.5","license":"GPL-2+","platforms":"darwin","epoch":0,"replaced_by":null,"homepage":"https://github.com/VirusTotal/yara-python","description":"yara bindings for python 3.14","long_description":"Malware identification and classification tool. This subport provides bindings for python 3.14","active":true,"categories":["security","python"],"maintainers":[],"variants":[],"dependencies":[{"type":"build","ports":["clang-18","py314-setuptools"]},{"type":"lib","ports":["yara","python314"]}],"depends_on":[{"type":"run","ports":["volatility3"]}]}]}