No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
Start Free
Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure
Native application identity and user-based security for your Azure cloud
Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
Chrome Privacy Guard is a small tool that automatically deletes the unique Client ID before each run of Google Chrome. This tool scans the "Local State" file inside the Chrome directory, removes all Client ID related info and automatically starts Chrome.
Steel Rats is a gui wrapper for the command line source code auditing tool RATS. It examines C, Perl, php and python code for keywords that could cause security holes and provides a report for you to further investigate the possible security holes.
Skavenger analyzes HTTP traffic logged by various Web proxies (including WebScarab and Burp) for indications of common web vulnerabilities such as XSS, CRLF injection and various kinds of information disclosure.
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Finally a usefull, free and opensource graphical tool to handle memory (synchronous) smartcards like Siemens SLE4428 and SLE4442 and T0-T1 asynchronous cards. Application is again beta but it works and you can execute Apdu commands in few seconds!
T-SQL Script Generator for SQL Server 2000/2005 to Allow Auditing on Database Tables using Triggers and Additional tables for Auditing. SQL Audit is made up of two .NET 2.0 Assemblies: SqlAudit.dll and SqlAuditGenerator.exe.
Crypto.Net is a free and open cryptography library for C# and .Net. AES (Rijndeal), Twofish, Blowfish, RSA, Diffie-Hellman, SSL/TLS, X509-Certificate builder, stream cipher modes or a secure netowrk stream are only some features of this library.
WHIPS (Windows Host Intrusion Prevention System) is a Host Intrusion Prevention System for Windows NT/XP/2003. WHIPS uses the system call interposition technics and it is developed as a kernel module.
platform independent solution to encrypt files on a portable Device. Files will be encrypted with TripleDES and hold in an XML-File. No local Installation needed.
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Nayatel Intrusion Detection System is a windows based system written in C#. It Automatically detects any hosts attempting to intrude into your network. It shows the IP address and a level reading to show the level of threat it is posing.
A platform for security data analysis.It focus on the quantitative analysis for securities,and research these problem:What and How decided to a trading,and can be believe.So,it include technical analysis,financial model,other to help to profit making.
SKIF ppds - Personal Password and Data Sentinel- password manager and data security-tools. Single file (main database) encrypted Blowfish-cipher - for storage user acсounts and any text data. "Crypto" tools - Blowfish-cipher,SHA,MD5,DIFF,MAC and other
The Open System Management for Organization, Security and Identity Integration is a suite of enterprise grade services that follow the directives of Identity Management Forum of The Open Group consortium.
CapPacketDecryptor is a MapleStory packet decrypting solution which reads .pcap files, decrypts the packets in them, and dumps them to another .pcap file, while reconstructing TCP information.
StegSharp is an application built on C# 2.0 that explains the basic principles of steganography. With StegSharp the user can hide and recover text or files from image files. Supported image extensions are: jpeg and bmp.
Corporate Data Protection and Network Security is a IT project targeting policy-based and fully-automated data protection, encryption and transmission. We plan to create self-diagnostic risk-predict enterprise environment with artificial intelligence.
BizTalk components for e-Invoice
Set of add-on components, such as pipeline-components to address e-Invoice specific needs in the supply-chain sollution.
A "programming language" that can generate random strings. Useful for creating password, but has many other uses (it can generate IP addresses, fully random but pronounceable words, ..., anything that a string can represent). Written in C#
The MD5Revolution is a small tool to calculate the MD5 checksum of entered strings. More features and additionally information about the tool, can be found under: http://md5r.x303.cc/
This is a VNC Administration application that uses active directory security groups and credentials matched against a SQL database to decide what computers an end user can connect too.