Build VMs, containers, AI, databases, storage—all in one place.
Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
Get Started
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
A revision of an Admin page Finder perl script found online. We have added a new list of admin pages to search for and we also added hits logging to an external file to the script. This script is good for Penetration testers who wish to see if an Admin page is visible or easily found by intruders.
Original Script found here:
--------------------------------------
http://www.hackforsecurity.net/2012/01/admin-finder-perl-script.html
...It is For BackTrack
This Script Contains This tools :
Local File Disclource (LFD) Checker
Scanning the whole netmask and returning IP and MAC
BackConnect Tools
Proxy Checker
Reverse IP
Add a User With Admin Access (Windows)
Add a User With r00t Access (Unix)
Grab Cpanel Users
Remote Port Scanning With NetCat
SQL Injection Scanner
MD5 Hash Cracker (Online)
Admin Page Finder
Make Uploader With Echo Method (Linux Servers)
Service Scanning
BruteForce Services With Medusa And Hydra (Backtrack)
Test Lfi With php:// Bypass Method
Cms Analyzer (Beta Version)
Server Scanning With Nmap
Remote Command Execution Console
Fck Editor Scanner
Phage_Finder is a heuristic computer program written in PERL that uses BLASTP data, HMM results, and tRNA/tmRNA information to find prophage regions in complete bacterial genome sequences.
Command line duplicate file finder for Linux machines, which finds the duplicate files by its content, name & directories by its name. Easy usage and efficient too.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Join Finder helps locate joins by blasting contig end sequence probes and looks for link-supported joins. Probes are BLASTed against 2KB ends of contigs, strict matches are examined against link information and potential joins are outputed to file.
netleak is a collection of small perlscripts that detects connectivity between network segments. It is mostly useful to detect "leaks" in large organizations that have private network segments physically separated from the Internet.
MacFinder is software designed to communicate with various brands of network devices, record currently connected MAC addresses, and potentially associate them with IPAddresses, DNS Names, Locations, etc.
Maximal Clique Motif Reduction (MCMR) is a software program for running and then combining the output of multiple motif finder programs, such as MEME, AlignACE and Weeder, into a set of consensus predictions with associated confidence rankings.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.