Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
The Free Digital Money project aims to promote ideas and stimulate further innovation in the field of digital money. It provides a e-money implementation that can be used by anyone to try out ideas, build sample applications, or for further development.
The Algebraic Toy Cipher is a toy cipher for algebraic research. It is scalable in the number of bits and in the number of rounds. Works over two fields GF(2)/P, being one for the s-box invertion and the other for the mixing layer linear transformation.
The Eclipse XML-Security Plug-In allows you to experiment with the W3C recommendations on digital signatures and encryption and to learn all about their background. Arbitrary XML documents can be canonicalized, signed, verified and en- or decrypted.
Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform.
Geographic restrictions, eligibility, and terms apply.
INTIX-JSIGNER is a java web application for signing documents (XML and/or PDF) of unattended way and in the server side. It has as main modules the following: Authentication, XML and PDF Signing and Keys and Certificates Management.
A linux liveCD for the non-invasive, non-destructive detection and analysis of WiFi (802.11) networks. It also provides mechanisms to set up a PC as an 802.11 Access Point.
EverCrack cryptanalysis engine. The goal is cryptanalysis of any class of cipher. The focus now is the kernel - cryptanalysis of unilateral monalpha substitution ciphers extremely quickly, and later, cryptanalysis of complex ciphers for the kernel.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Enigweb is a firefox extension similar to the Thunderbird Enigmail extension. It will encrypt or sign textareas, and decrypt/verify OpenPGP data. Additionally extensions will be provided for major webmail providers.
Bash shell scripts to run an OpenSSL Certificate Authority (CA) and issue self-signed HTTPS server certificates (or cert signing requests) for intranets. Scripts: genrootca, genservercert, genusercert, revokecert, csv2usercerts, certificate-mailer.
NewPKI is a PKI based on the OpenSSL low-level API, all the datas are
handled through a database, which provides a much more flexible PKI than
with OpenSSL, such as seeking a certificate with a search engine.
The Moonbounce API is a set of high level objects that encapsulate pieces of the Bouncycastle lightweight crypto API. Moonbounce significantly simplifies RSA key generation, signing, encryption/decryption and verification of both byte arrays and files.
Imagine being able to send an encrypted message as a single file to someone working on any Operating System, without them having to install any software to decrypt it. Just send them an Inkjar. Or you can store your own passwords on a usb key anywhere.
Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
Compute shared RSA keys for two parties using Gilboa's protocol. Other protocols may be added. Contains JAVA source for Benaloh, Naccache-Stern and Goldwasser-Michali crypto-algorithms. Oblivious transfers and BiPrimaliy tests also implemented.
Tristero is a framework for creating distributed peer-to-peer file sharing applications. It uses standard technologies for each component, reducing the work of implementing a particular network architecture to the novel aspects of that system and eliminat
StreamSec Tools 2.1 is collection of cryptographic security related components, classes and routines for the Borland (R) Delphi (TM) development environment. The product includes modular clean room implementations of SSL/TLS, S/MIME and X.509.
gSTM is a front-end for managing SSH-tunneled port redirects. It stores tunnel configurations in a simple XML format. The tunnels (local, remote and dynamic) can be managed and individually started/stopped through one simple interface.
USSI is the Universal SAFE Signing Interface. USSI provides web services for the application of SAFE digital signatures for PDF, text, xml, etc. Please see http://www.safe-biopharma.org for more information on SAFE.
Odyssi PKI aims to be a complete PKI suite written in Java, and designed from the ground up with security in mind. When completed, it will be fully standards compliant with PKIX, XKMS, OCSP, and other PKI standards.
Securing mails without involving user. Secures them as often as possible if it is possible. Shows security-state and process of mails and mail-partners.