Access Google’s most capable multimodal models. Train, test, and deploy AI with 200+ foundation models on one platform.
Vertex AI gives developers access to Gemini 3—Google’s most advanced reasoning and coding model—plus 200+ foundation models including Claude, Llama, and Gemma. Build generative AI apps with Vertex AI Studio, customize with fine-tuning, and deploy to production with enterprise-grade MLOps. New customers get $300 in free credits.
Try Vertex AI Free
Easily Host LLMs and Web Apps on Cloud Run
Run everything from popular models with on-demand NVIDIA L4 GPUs to web apps without infrastructure management.
Run frontend and backend services, batch jobs, host LLMs, and queue processing workloads without the need to manage infrastructure. Cloud Run gives you on-demand GPU access for hosting LLMs and running real-time AI—with 5-second cold starts and automatic scale-to-zero so you only pay for actual usage. New customers get $300 in free credit to start.
UnityCA is a Certificate Authority "front end" based on the Community-Oriented CA (COCA) model, which was primarily developed for non-profit "free CAs." Organizational and end-user interfaces provide trusted web management of the installed CA (eg ElyCA).
Aiakos is a suite of software components that together provide a collaborative Single-Signon System across multiple trusted websites. A simple open protocol is provided for collaboration, and working libraries are provided for ASP and Zope.
PyGestPayCrypt is the Python implementation of GestPayCrypt and GestPayCryptHS classes for italian Banca Sella GestPay online credit card payment system.
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
This is a program that watches your system log files, looking for hack attempts. It instanty reacts to potential security breaches by (for instance) adding firewall rules to cut off the attacker.
An alternative Identification system that is a replacement for Microsoft's Passport and the Liberty Alliance. Its a simple architecture that is setup so anyone can run a server and thereby have control over their online identification.
A Python/Gtk application to manage groups of users stored in an LDAP database, using data from X509 certificates imported from files or LDAP servers maintained by certificate authorities. These groups are used to create grid-map files used by the Globus
The Secure Remote Log Monitor (SRLM) project provides client and server
utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.
Python OpenSSL Wrappers(POW), a Python wrapper for OpenSSL. X590v3 and CRL encoding is now also support is now via a pure Python module, which will include support for PKCS in the near future.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Multi-threaded host name and technical contact lookup tool.
Reads a list of counted IP addresses (as outputted by uniq -c) from stdin or a file. Resolves their hostnames and (whois) technical contacts. Writes info to stdout.
PYSSH (Secure Shell) is a implementation of SSH1 protocol in Python. It provides strong authentication and secure communications over insecure networks.
Shadow Watcher is a Peer to Peer log sharing tool for the security analyst. Consider it a "community watch" program which allows you to keep your system secure from the threats on the internet and help others do the same.
Midnight Xen is a project to finish the Xen project manager for zope. We also intend to implement Gantt and Pert Chart features. The first priority is to make a build that works right on improt into Zope and then re-initiate the security later.
... aims to be a library providing access to a base of extensions related to specific computer security tasks (scanning, vulnerability checks etc) implemented as Extensions (in Python for now), which are interdependent due to the provide/require mechanism
This is a Firewall and IDS front-end, the main purpose is simplify configuration of Iptables and Fwsnort and Psad management. The Firewall provides an experimental feature to decide in real-time about each outgoing connection.