Streamline Azure Security with Palo Alto Networks VM-Series
Centrally manage physical and virtualized firewalls with Panorama
Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
Learn more
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Simple but Powerful, Cross-Platform Password Management Utility
A simple but powerful cross-platform utility for managing and accessing your most secret data. It stores passwords and whole files, so it can literally store any information you want to keep secret. Access your most-used passwords/URLs right out of a desktop tray icon.
For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter.
Although...
Cross-platform encrypted password and file database
A user-friendly, cross-platform utility for managing and accessing your most secret data. It stores passwords and whole files, so it can literally store any information you want to keep secret. Access your most-used passwords/URLs right out of a desktop tray icon.
For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter.
It's not just...
...some uses encryption keys and some dont. there are AES , 4DES , RC2 ,
RC4 , MD5 , SHA1 , SHA2 , SHA3 , SHA4 , XoR , Crypt , HeX , BINARY ,
Rijndael 256 , Obfuscation String , RSA , BASE64. The password
manager anything saved WILL NOT BE ENCRYPTED so it is smart to
protect the program from others not using it.
How do you find anything in the mountain of data on your PC? How do you organise, maintain, archive and protect your files? How do you avoid surrendering to the Powers of Darkness? Checkpoint Commander, the vital tool for Information Management!
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
Haskell User-Submitted Libraries includes anything we can get our hands on and clean up for general use, as well as new libraries that would be useful to the general Haskell community. Submit your libs, or join the project to create needed libs!
cryptshell is a shell used for analysable code (eg anything before wwII). It automates letter substitution, transposition, and has modules useful for breaking various weak ciphers (enigma, substitution, vinigre). It has no real practical value.