Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
StegSharp is an application built on C# 2.0 that explains the basic principles of steganography. With StegSharp the user can hide and recover text or files from image files. Supported image extensions are: jpeg and bmp.
Dm-crypt + LUKS encrypted device manager. Available functions : open, close, create, show info, add key, remove key, change key. Most important functions : change encryption parameters and reencryption with new master key - both in-place & failsafe.
Discover hidden files you never seen before! NTFS ADS is an forensic/security utility to reveal, list, delete, determine contents, extract and copy hidden files from NTFS Alternate Data Streams.
OW.NET -- 1-Wire API port from Java (and J#) to C#. Use the Dallas 1-Wire and iButton chips with standard C# using a serial adapter (also CF.net) or the TMEX drivers on the Windows platform. No J# distribution installation required.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
stproxy is small, fast and efficient HTTP/SSL proxy, features: high-anonymous, basic http authorization, user management using web interface, asynchronous dns resolver, single-threaded (only one process-thread)
Kasai is a 100% Java based authentication and authorization framework. It allows you to integrate into your application a granular, complete and manageable permission scheme.
Deobscufates .NET assemblies, primarily by rearranging IL code (basic block reordering) and removing junk.
Designed to be modular, it is built from reusable pieces.
NMAP Configurator is a GUI frontend for NMAP on Windows systems. User must have installed NMAP for this program to work properly. New version fixes the problem of inability to access buttons if display is set to 800x600.
wssecure Application Monitor is a free software that can monitor processes in real time. It will alert automatically whenever a new process is detected and it will again alert if it becomes modified.
Sniper is a powerful keylogger component that can be easily integrated in applications. It is a small,easy-to-use ActiveX control that encapsulates all the complexity for logging keys and exposes a few important properties and methods.
Grained Login is a fine-grained login system for Qt applications. It uses SHA1 hashed passwords to retrieve user rights from a SQLite database. An administration dialog handles the maintenance of the users, the roles, the rights and the password history.
This project is based off of Sam Rape. The final product is a bootable floppy which copies the sam file, compresses it and puts it on a disk. A detailed description can be found at datastronghold.com/archive/t10429.html
Bildsoft releases under GPL License the Blackhorse Algorythm, used by all its software.
Blackhorse provides high-level encryption for any file.
Blackhorse is very quick to encrypt/decrypt data, thanks to a particular technology.
The Inside Security Rescue Toolkit is a multi-purpose disaster recovery and network analysis system. It runs from a credit card-sized CD-ROM for convenient transport or download. It has read-write support for NTFS-partitions, full partition handling supp
home-firewall.sourceforge.net -- Sets up a basic firewall using Linux iptables. Provides a way to add allowed sites dynamically. Home-firewall makes extensive use of shell scripts and Linux's cron utility. Maintain order in your school. ChamTech.net
A simple, secure and free tool for encryption and signature for Microsoft Windows and Unix. Part of the IDEALX "OpenTrust" suite (IDX-PKI, IMC, IDX-smbldap-tools...), it provides confidentiality and security through X.509-PKCS certificates. Languages: