Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Start Free
Auth0 B2B Essentials: SSO, MFA, and RBAC Built In
Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
The file recovery process is not an easy task to run on Linux and Unix based OSes and there`s almost no good user interfaces for end users, so that`s why, El Recuperador, is intended to make a generic Web-based GUI framework based on forensics informatic
Tecnotel is a project that seeks security and comodity to the end-user, controlling your house through the telephone line, internet or remote-controller. The software available controls the electronic-equipment and others.
The BigFish Firewall is a suite PHP5 scripts for generate iptables scripts extremely customisables and flexibles. Here are some of the standout features of Bigfish Firewall: Kernel Vars adjust: Tunning the linux kernel proc variables to securing your sys
INTIX-JSIGNER is a javaweb application for signing documents (XML and/or PDF) of unattended way and in the server side. It has as main modules the following: Authentication, XML and PDF Signing and Keys and Certificates Management.
Tristero is a framework for creating distributed peer-to-peer file sharing applications. It uses standard technologies for each component, reducing the work of implementing a particular network architecture to the novel aspects of that system and eliminat
A Java based HTTP/HTTPS proxy for assessing web application vulnerability. It supports editing/viewing HTTP messages on-the-fly. Other featuers include spiders, client certificate, proxy-chaining, intelligent scanning for XSS and SQL injections etc.
GuerillaTactics is an effort to bring "Computer Education Through Security Analysis". We aim to create a security education "lab kit" including management software and a curriculum framework.
phpRADmin is a web tool written in PHP to allow configuration, administration and provisioning of RADIUS server (FreeRADIUS), clients (NAS, AP, etc) and users (PPP, PPPoE, EAP, etc) with MySQL as backend.
InterLDAP is a middleware for identity management, completed with management tools. It is divided in subprojects, all designed for one objective: manage electronic identities, from their creation, trough their life in organization, until their deletion.
USSI is the Universal SAFE Signing Interface. USSI provides web services for the application of SAFE digital signatures for PDF, text, xml, etc. Please see http://www.safe-biopharma.org for more information on SAFE.
Odyssi PKI aims to be a complete PKI suite written in Java, and designed from the ground up with security in mind. When completed, it will be fully standards compliant with PKIX, XKMS, OCSP, and other PKI standards.
The VSC is a PHP/MySQL/Apache Interface for Nessus 2.x. It allows users to hierarchically manage hosts, scanning policies, and request automated immediate, future/reccuring scans of a host or group of hosts, view scan reports and generate metrics.
Open WS-Policy,an Open Source Web Services Policy Framework implementation,is a set of open source Java libraries that implement the ws-policy specifications.
using PHP (and some ShellScript) to protect your linux server against bruke force attacks(http://en.wikipedia.org/wiki/Brute_force_attack).
also keep a log in MySQL and have email reporting
RADAR is a pluggable network monitoring platform that allows for reporting and searching at the application layer. Out of the box, RADAR lets you capture SMTP, AIM, YahooIM and YMail traffic. Find out more at: http://www.optaros.com/solutions_radar.html
YASeMI (Yet Another Security Monitoring Interface) consists of a Web interface that can be of aid to SysAdmins and Security Admins, in detecting possible anomaly or intrusion behaviour in their network, based on Netflow data their routers emit.
A statistical view of the recorded activity on a Honeynet. A mechanism for a honeynet to present some information about its findings over the web. This is done by a statistical analysis on the inbound firewall logs recorded by the honeynet's firewall.
SIGOF (Security Information Graphics Oriented Forensic) aims at synthetizing security log, stored in a acid/base database schema, in order to provide a graphical / visual oriented security forensic and statistical analysis.
deface-no-tnx is an anti-defacement system that monitors your Web files and notifies you about unallowed changes. It also replaces the defaced page with a standard "error" page,so that no offensive/joking content can be frauodolently added to your site
The goal of the project is to develop Role Based Access Control software which can be used in any application. The software can be deployed as a server which can cater to multiple applications. Rules can be written for fine grained access control.
OpenIdM project will develop scalable, full-featured, commercial-grade Identity Management solution, based on open standards, such as SAML, XACML, SPML, DSML and SOAP.