With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Cryproc is module for the Linux kernel 2.6 which allows user space programs to access the kernel's CryptoAPI functions via a file called "cryproc" created in the /proc filesystem.
Emulate filesystem security on Windows 9x systems with FAT16/32 filesystems. Files, directories, and drives can be assigned read/write/execute permissions which are enforced by a kernel-mode driver. Configuration file is locked while the driver is loaded
The WOLKs are stable and development kernels, containing many useful patches from
many projects. Goal: Stability, Scalability, Performance and most important: Security.
Development area for GNU/Linux 2.6.x for the KS8695 ARM SoC. Covers kernel patches, drivers for serial, Ethernet, PCI, GPIO, watchdog subsystems, and drivers for optional PCI based devices such as USB, WiFi, WiMAX, IPSec, SSL, and RSA devices.
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
Qryptix consists of a PAM object and utilities for session- and key-management for encrypted home directories using the International Kernel (CryptoAPI) patches for Linux. It simplifies login/logout, mounting/unmounting, and key generation and changing.
AUTHd: Admission control daemon is a system aiming to provide authentication and authorisation services to other services. Uses the keynote trust management system. It is accessible via IPC, network (OpenSSL support) and kernel-space.
A "Theoretically Secure Operating System", focused on information protection, that is provably secure provided that a specific part of the kernel would be free of bugs.
In particular, bugs in application can't be exploited to attack the system.
Status Module is a daemon which forwards vital system information (memory usage, active processes, etc.) into the kernel logs by using a kernel module. This is very useful for logging or security purposes.
Fwpass is a daemon that executes commands in response to specific sequence of incoming IP packets. It does not use TCP/IP sockets but relies on ULOG functionality of Netfilter (Linux kernel built in firewall).
KISS is a kernel-side host-oriented security tool, which may bring you file integrity checking, file and process hiding and actions handling on special internal events (using a tiny scripting language).
A linux kernel module and supporting user space environment which allow interception and modifying system calls that match user defined criteria. Think of it as strace on steroids.
stands for Active Integrity Software, provide quick alert of elf file modifications.
Based on Gnu/Linux OS, with a daemon to analyse datas give by the kernel module, written in C.
ProSum is a terminal based program that protects your files, sys_call_table and IDT like tripwire way (All in user space, without kernel modules) In addition, database with files etc. could be encrypted with Blowfish algorythm and more.
RSA-IP is a Linux kernel net _protocol_ which encrypts IPv[4;6] using RSA public/private key.Think of it as a kernel level implementation of ssl. RSA needs prime number so we release a prime searcher.
The Linux Transparent Encryption project aims for integrating transparent read/write access to encrypted data into the linux
kernel. This enables any application to use encrypted data
without modifying the application itself.
LinuxBSM-2 introduces auditing features in Linux kernel to achieve better security and keep an eye on system activities.
Any kernel-derived data can be audited.
This is an add on for the Linux Kernel Patch named Medusa DS9 developed by Marek Zelem, Milan Pikula, and Martin Ockajak. This program will activate and deactivate medusa protections securely. Medusa is at http://medusa.fornax.sk/
Smack is the the Simplified Mandatory Access Control Kernel.
Smack is a kernel based implementation of mandatory access
control that includes simplicity in its primary design goals.
This project is a implementation of layers. Use Virtual machines & virtual adapters alike an onion! Another operating solution instead of Microsoft Windows Server operating system. It is to be used via remote controlling. The special new "Cktool32" will make it easy to handle *Ck64Krnl*.