Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.
Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
exploit.co.il Vulnerable Web app designed as a learning platform to test various SQL injection Techniques This is a fully functional web site with a content management system based on fckeditor. You can download it as source code or a pre configured
This is is a modular, test driven website that tries to break web clients of all kind. If you are developing applications that interact with websites you might want to throw it at this website first and see if it survives.
Backup script for Windows based on robocopy Fast backup, syncs changed files only. Space efficient, all duplicate files are Hardlinked. Easy Overview of destination folder Structure: Computer Name > Date_Time > Drive > Folder > File
This is a highly configurable and flexible testing tool capable of generating different streams of network packets based on set of parameters user provides, for performance & robustness testing on a NIDS - Network Intrusion detection System.
An undetectable Remote Administration Tool -OR- trojan, an all new approach. Easily usable, Client just requires any Web Browser to control remote machine via WebPage. Fooling firewalls/ids/ips security solutions, as it operates like any web-site.
BlueOxygen Debus is the security implementation of tree for BlueOxygen Cimande. Originally this is a Cimande Security, but we found that there is several security that we can implement and we must test it, so we decouple it.
A simple security tool to test for the integrity of a computer installation. SdT constructs a signature of the current system state and checks installation state with a previously made signature. Is intended to work on a compromised system.
Dark Cracker is a dictionary based brute-force DES-encrypted password cracker written in PERL which allows *nix system administrators to test password files against a dictionary of common passwords and detect accounts without a password.
rjudge is a judge system for the Olympiad in Informatics. It can be also used as a problem test tool in the programming contest and daily practice. It provides many security features to ensure the smooth implement of judgement.
Zivios is a web based control panel which brings together vital open source technologies needed by medium and large enterprises. Zivios provides identity management,user, group and computer provisioning, as well as remote management of services.
In your web applications wherever user registration is required, use this checker script to strictly enforce users to select stronger passwords. It tests cracking passwords against 4 rules. It has also built-in smoke test page.
This project is a long time ago project made to destroy the autoruns that we haven't decided in the hard disk or a floppy disk. It destroys the VBScript and JavaScript on the root of each drive excepts the CD's (we can't do yet) and secure the computer.
acegi usage example which contains some extended features:
1.get permission from db,
2.tag to test if the user has permission for an url
3.the permission can be refreshed when permission changes.
Cnc's IP Data Volume Report:
Logs IP to IP contact, number of packets, bytes, time of contact, Ethernet too!
View via local web interface.
Very simple for those who want to view who your computer is contacting the most!
This project aims to develop a prototype system that explores how we should re-invision computer system design based on changes in how people get the software that they run, as well as advances in static analysis of software.
Computer Breaker is a network testing tool that allows networking administrators to test if a computer is vulnerable to malicious attacks. Using the Nessus scanner, computer-breaker scans the remote host and automaticaly exploits its vulnerabilities.
Vcn = Virtual computer Network will protect your computer from all malware and hackers by setting up 3 virtual empty computers and the integrated vpn for privacy will protect you from isp eavesdropping and other people interrested in tracking you
GuerillaTactics is an effort to bring "Computer Education Through Security Analysis". We aim to create a security education "lab kit" including management software and a curriculum framework.
Tomahawk is a command line utility that supports high speeds bidirectional replay (300-750 Mbps) of saved tcpdump(8) files. Tomahawk is great for testing the throughput and blocking capabilities of network-based intrusion prevention
systems (NIPS).
iPod Tracker will enable iPod owners to be able to trace their iPod through a small program that runs on every Internet-Enabled iPod-to-Windows Computer connection. This was created mainly for iPod owners who are fearful of theft.
Sussen is a tool that checks for vulnerabilities and configuration issues on computer systems. It is based on the Open Vulnerability and Assessment Language.