Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build generative AI apps with Vertex AI. Switch between models without switching platforms.
Waste.net is a .NET-driven application geared towards providing a secure online encrypted file-sharing service. This is a purely managed .NET 2.0 port of the original Waste client/server.
A.L.A.R.M. is A Laptop A/C Removal Monitor for Windows XP and later. If your workstation is locked and A/C power is being removed, it loudly plays a warning signal for theft protection. Slim, sound file can be specified.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
FZBFD is Brute Force Detection for Filezilla ftp server. fzbfd.pl looks at the logs from filezilla and will auto ban or block ips from accessing your FTP server. FZBFD can be setup to run hourly using task manager and uses dshield.org's top offenders...
TC-Wrapper is a Windows service which opens/closes TrueCrypt containers automatically using an USB-Stick with a key file. Containers are even mounted if you are not logged into your system.
Viralator enhances your network's squid proxy server with a virus scanner. Before a user can download a file, the proxy passes the file to the Viralator script which, in turn, uses a virus scanner to scan, disinfect, or delete the download.
EyeLog is a flexible and extensible log analyzer for any type of log file. It allows one to define custom regular expressions (perl-style) for pattern matching and custom printf formats for reporting. The goal is to provide a universal log analysis tool.
This program allows you to use SSH, TELNET, VNC, FTP and any other Internet application from behind HTTP(HTTPS) and SOCKS(4/5) proxy servers. This "proxifier" provides proxy server support to any app.
DNA is an open, flexible and extensible deep network analyzer software server and software architecture for gathering and analyzing network packets, network sessions and applications protocols, passively off enterprise class networks.
Map local drive to remote Windows network share (or Samba server) on the Internet. Connection is secured by using an encrypted SSH connection as transportation.
Antispyd is an HTTP/HTTPS threats filtering proxy server written in pure C under Linux. The main goal of the project is to develop a free, secure, fast and extensible solution to fight against current Web threats, anonymize and control web traffic.
The J-WASTE project aims at the implementation of a platform independent client/server Java implementation of the WASTE protocol. This project started as a mandatory project course in networking at the Luleĺ University of Technology in Sweden.
SPipe (Secure Pipe) is a patch of mod_ssl package which allows the same corporate web server to be used as a secure access door to internal servers that do not use HTTPS protocol, while also retaining normal web server functionality for all HTTP requests
Malware-Blocker blocks communication from your computer to any server that is known to be a malicious one. It does that by replacing your HOSTS file (deep inside Windows directory) with a blacklist of malicious servers, which are redirected to 0.0.0.0
GNet Server - Network compression client/server software. Compresses data over slow networks to save on the cost of bandwidth. Server is developed for Unix and Windows platforms, The client will run on Windows based PCs.
The algorithm allows any kind of weights (costs, frequencies), including non-numerical ones. The {0, 1, ..., n-1} alphabet is used to encode message. Built tree is n-ary one.The algorithm is based on a set of template classes : Cell(SYMBOL, WEIGHT), Node(
Combined coded remote-administrative service with SSL secure port scan, anonymous routing and third-party plugin inbuilt for quick and automatic "scan and install" process. Easy to use and will work under firewalls and up to 1024 bit strong cipher
Logcheck is software package that is designed to automatically run and check
system log files for security violations and unusual activity. Logcheck
utilizes a program called logtail that remembers the last position it read
from in a log file.
sud is a daemon to execute interactive and non-interactive processes with special (and customizable) privileges in a nosuid environment
It is based on a client/server model and on the ability to pass file descriptors between processes.
mod_stego is a module for the popular Apache Web Server. It steganograph a file or a message inside the html pages. If you want the message, you should use a a de-steganography software to take it out.