Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Start Free
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
A python binding for the iptables tools.
The binding allows direction manipulation of the iptables through an object oriented and transaction based manner.
The binding removes the need to call iptable on the command line in python applications.
Set of tools and libs for
managing structured data
in a very flexible way:
Imp./Exp. ASCII, XML, SQL,
PS, Tex/LaTex, RTF
GUI: X-Windows, MS-Windows
Interface to C++, DBs, Perl,
PHP, Java, TCP/IP
LISP-like interpreter
written in C++ using C-LIB
FireWise Utilities (FWU) is a suite of tools for dynamically generating firewall tables in either binary or script format for several operating systems. Features in dev: iptables, ip6tables, ipfw, pf, SHA2 bin hashing and LZO bin compression
Authenticated network access: a lightweight network firewall authentication tool. Horatio is built around a custom Perl webserver and the Linux firewall tools.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Automated SecurityTools (autosec) aims to provide
automatic tools which network administrators may use
to help check and test the security of their network.
Network Asset Management Archive: NAMA is a set to tools to track network assets. It uses SNMP to monitor assets added to your network and stores the information in an odbc compliant database. Assets can then be tracked through a PHP frontend.
Live Security/Forensics Linux Distribution, built from scratch and packed full of tools useful for vulnerability analysis, penetration tests, and forensic analysis.
P.A.T.H is a collection of tools for inspecting and hijacking network connections written in Perl.
By now it includes a packetgenerator, a rst deamon, a sniffer, an ICMP redirection tool, an ARP redirection tool, an IDS testing tool and an automatic hij
Picky - a selective syslog to mysql database daemon. Allows completely dynamic specific translation of syslog data to dynamic mysql table(s). The other projects under this one are tools that take advantage of the flexibility of Picky and demonstrate it
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
A suite of tools (a sniffer, a TCP hijacker, an ARP poisoner and a TCP tunnel through ICMP/IGMP packets) created for testing TCP/IP weakness and using them in a non-conventional way. [Up to now I've done only the sniffer-related part]
The SitRep project provides sysadmins with tools to quickly and easily list all machines on a net that match specific port criteria. It can be used to document (un)authorized servers and printers for maintenance and security reasons.
Security-Tools Database is an easy to use tool to manage tool-tipps (e.g. from the SecurityFocus.com Newsletters and other sources). Simply copy + paste tipps from the newsletter or enter tipps manually. Finds tools by any combinations of search criteria.
Krome Shield is designed to fool remote fingerprinting tools (using ICMP & TCP), making them think you're running a different OS. It runs under Linux, using the netlink device and ipchains. In the future it will act like an IDS too, detecting attacks a
The IP Personality project is a patch to the Linux kernels that adds netfilter features: it enables the emulation of other OSes at the network level, thus fooling remote OS detection tools such as nmap that rely on network fingerprinting.
A number of tools to enhance management/coding of NFR (http://www.nfr.net) IDA, and various other admin tools that can be used for both NFR and hand coding other appliance scripts.
DevSecure is a web based log analyser designed for "OpenBSD".
It can be installed with most of BSD/Linux systems. The main goal is to provide a web based console for security monitoring, including searching tools through IDS/FireWall/SYSLOG database.
A command line tool written in C++ that analyzes the source files of a C program to represent the pattern of its system calls in terms of a LALR(1) grammar.