Your top-rated shield against malware and online scams | Avast Free Antivirus
Browse and email in peace, supported by clever AI
Our antivirus software scans for security and performance issues and helps you to fix them instantly. It also protects you in real time by analyzing unknown files before they reach your desktop PC or laptop — all for free.
Free Download
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
The ONLY hacker friendly proxy for webapp pentests
Proxenet is a hacker-friendly, DIY web proxy designed for web application penetration testing. Written in C, it allows interaction with higher-level languages like Python and Ruby for on-the-fly modification of HTTP requests and responses.
Remote control a Windows machine without bluetooth using a java (j2me) mobile device. Either use a direct intenet connection, or a bluetooth-net proxy server (resolving bluetooth/802.11g interference while streaming).
ProxyCat supplies a whole solution of Proxy, including proxy server exploration, validation, scoring and proxy list exchanging by means of peer-to-peer.
User can surf the internet via the auto-generated fast and stable proxy. HTTP/HTTPS SOCKS are both
Shweby is a new ICAP enabled proxy server. This proxy passes HTTP requests and responses through one or many ICAP servers in order to be modified in their way to the origin server or to the client.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.