Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.
Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
Try it free
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
An implementation of a system for anonymizing the configuration files for routers.
Currently supports Cisco devices.
A paper describing the method implemented by this code is available.
A firewall knocking mechanism that is loosely based on tumbler (tumbler.sourceforge.net) instead it is written in python. A focus of this implementation will be on multiple client implementations (OSX Widget, XP taskbar, etc.)
wss4j + a set of patches to support kerberos token profile. One of the goals of the project is to be merged in wss4j, but in the meantime this library can be used as a drop-in replacement of wss4j.jar
WebLOQ IO is a Java NIO framework which allows for tens of thousands of concurrent TCP/IP connections through a very small thread pool (assuming proper OS and network settings). There is built in support for SSL and non-SSL connections.
This is an Android front end for the PasswordSafe password management utility. This utility allows you to easily and securely manage multiple passwords, in a format that is compatible with the original PasswordSafe utility.
Easy Encryptor is a cross-platform encryption program designed to be of high secure standard, and easy to use even for users with no knowledge of cryptography algorithms.
Streamline Azure Security with Palo Alto Networks VM-Series
Centrally manage physical and virtualized firewalls with Panorama
Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
The Fenrir Morph Signature project aims to provide existing signatures standards with a morph capability: "Sign once, distribute many". This capability allows to use the same signature for authenticating modified, but authorized, versions of a document
Speakeazy is a product already based on TrueCrypt 7.0a specifically for USB flash drives. The goal of this open source project is to enhance the encryption user interface and provide enterprise level tools similar to those of IronKey.
Java Chaotic Random Number Generator - Inspired by chaos theory, the intent of this generator is to produce unseeded, unpredictable numbers. The numbers will not follow a predictable sequence and will not rely on a pseudorandom algorithm.
gPassword Manager, a password manager written in GTK. Lets you store all of your passwords in an encrypted file so you only need to remember 1 master password.
A secure PKI-based client/server encrypted chat engine under development in Java. Encryption will be supported via JCE and PKCS#11. A simple Java interface can be implemented by other projects wishing to develop a Java GUI or CLI for the client.
Final year project with dissertation. This will host my project for my final year dissertation. All of the features of SF will be used to the best of my ability. The tools provided by SF will assist greatly!
cryptshell is a shell used for analysable code (eg anything before wwII). It automates letter substitution, transposition, and has modules useful for breaking various weak ciphers (enigma, substitution, vinigre). It has no real practical value.
odfsec is a toolset for validating digital signatures in odf (open document format) files. The tools are independent of any office suite software and may be integrated into backend workflow processes.
Cross-platform distributed password cracking tool, used to carry out brute-force attacks on common encryption protocols. Client/server based with administrative web interface.
Portable, optimised implementation of Bruce Schneier's 64-bit symmetric block cipher, Blowfish. Includes support for ECB, CBC, CFB, OFB and CTR block cipher modes, weak key detection and parallelisation using OpenMP.
Applet loader for the Cyberflex Access Developer 32k and e-gate 32k cards. Will allow you to load the MuscleCard applet onto the smartcard and use it as cryptographic token.