Level Up Your Cyber Defense with External Threat Management
See every risk before it hits. From exposed data to dark web chatter. All in one unified view.
Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
Try for Free
AI-based, Comprehensive Service Management for Businesses and IT Providers
Modular solutions for change management, asset management and more
ChangeGear provides IT staff with the functions required to manage everything from ticketing to incident, change and asset management and more. ChangeGear includes a virtual agent, self-service portals and AI-based features to support analyst and end user productivity.
Live Security/Forensics Linux Distribution, built from scratch and packed full of tools useful for vulnerability analysis, penetration tests, and forensic analysis.
Web Portal System ,is an highly configurable code, created for users with basic skills in php who're looking for a solution where they can easy include their own code.Intranet module also in Borland C++, Delphi/Kylix, with ERP & CRM.
STAT is a framework for building modular, stateful signature-based intrusion detection systems. STAT provides a means to develop sensors which operate in different domains and environments.
Secure and customizable compute service that lets you create and run virtual machines.
Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
An alternative Identification system that is a replacement for Microsoft's Passport and the Liberty Alliance. Its a simple architecture that is setup so anyone can run a server and thereby have control over their online identification.
The Secure Remote Log Monitor (SRLM) project provides client and server
utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.
XmlRpcStream is designed for the situation where a persistant
connection between client and server is required. XmlRpcStream
is not complient with the XML RPC spec as it doesn't use HTTP
as the transport protocol.
Scalable Cluster Environment (SCE) is a set of interoperable opensource tools that enable users to build and use Beowulf cluster effectively to solve their problems.
Total Network Visibility for Network Engineers and IT Managers
Network monitoring and troubleshooting is hard. TotalView makes it easy.
This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
Originally written by Paul Vixie in 1986 and distributed through mod.sources, "display" is a program which will repeatedly execute a command and display the output through curses. The purpose of this project is to maintain and extend display.
the sitter is a network monitoring suite written in perl. the main focal points are module (plugin) based testing for extensibility, xml configuration file, perl module based for new scripts, and other goodies.
A peer-to-peer chat program that uses public key encryption (via Gnu Privacy Guard) to keep your conversations from the eyes of packet sniffers (*Cough* Carnivore *Cough*)
Pimp is a modular proxy written in C++ with modularity in mind. So pimp is just a basic proxy and all the protocol logic is implemented in loadable modules. Currently there is a POP3 and SMTP protocol module and a SpamAssassin helper module.
This is a Firewall and IDS front-end, the main purpose is simplify configuration of Iptables and Fwsnort and Psad management. The Firewall provides an experimental feature to decide in real-time about each outgoing connection.
Hatohol collects monitoring information from running monitoring systems and shows their integrated data on one screen. This feature enables to consolidate monitoring centers and the operators even when monitored devices are being used in different places or with different monitoring software.
chill is a heavy-module-based web-application with a core supporting many features. writing own modules for... everything. modules for webmail, firewall/router-administration, server-administration are planned natively.