One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Try Free
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Code name 'Monkey Juice' is an attempt to create versatile, modular remote security scanner for the Win32 platform. Written in C#, 'Monkey Juice' will incorporate an XML plugin database of C# libraries that will be loaded at scan time.
Using the Linux partition of a dual boot system, this software will provide the capability to eliminate spyware, adware, and other malware from the windows partition. Additional capabilities include the ability to tweak and improve windows from linux.
Signelf is a toolset written in c++ for signing elf binaries, specifically linux shared object, though in theory, any elf binary may be signed. It uses openssl's libcrypt to RSA sign the library, and the same to validate the signature.
ClamSMTP is an SMTP filter that allows you to check for viruses using the ClamAV anti-virus software. It accepts SMTP connections and forwards the SMTP commands and responses to another SMTP server. Works well with Postfix.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
...It relies on a Plug-in interface to access its Cryptography functions, allowing the user maximum customisation, thus allowing them to download what they want, not bloated software.
AED Ž (Arash's Encryption/Decryption) is a perfect software for encrypting/decrypting any kind of files using a "Password" (which is optional and you can enter an space in the password field.) and a "Digital Key" which is a necessary file.
The MOdelchecking Programs for Security(MOPS) project produces software you can
use to find security bugs in your C programs. Examples include time to check to time of use bugs, abuses of setuid, and more.
Prismstumbler is a software which finds 802.11 (WLAN) networks.
It is designed to be a flexible tool to find as much information about wireless LAN installations as possible. It comes with an easy to use frontend suitable for both PC and PDA displays.
Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an
Enables a user to view & alter
all aspects of comunications with a web site via a proxy. Primarily used for security
based penetration testing of web sites, it can also be used for
debugging during development. Seen as part of a hacker toolkit.
crcRepair is a utility that is able to fix corrupt files by consulting a database and file mirrors. It is written in pure Java, so it can be used on all platforms with the Java JRE installed.
Multiprecision unsigned number template library (MUNTL).
The program is intended for the organization of calculations with the big
precision for unsigned numbers. Program is very fast because do not use any heap call (new, malloc etc.)
- language perl / library Graph, XML::LibXML
- OS platforms, all platform that support perl and lsof tool
- This software aims to realize an HIDS, based on programs behaviour modelling.
Network Asset Management Archive: NAMA is a set to tools to track network assets. It uses SNMP to monitor assets added to your network and stores the information in an odbc compliant database. Assets can then be tracked through a PHP frontend.
Fwall is a professional firewall software for Linux (Newt interface). The software has been adopted by private and governmental companies in Brazil. Fwall can be used with clients, servers, and (mainly) gateway machines.
An Open Source Computer Aided Dispatch (CAD) system. This project aims to provide Open Source dispatch software that police, fire, and emergency services departments can use to help fully utilize their resources.
StegoGO is an open source software that allows the embedding of hidden data in GO games, using GNUGo. It allows both the embedding of hidden data in an already existing GO game, and the creation of new GO games to hide data.
Please note: not having time to complete jSai myself; I came across the ACEGI project which I now recommend instead.
jSai; a Servlet Authentication Implementation. jSai aims to allow easier to use, more powerful authentication for Java Servlets.
A robust and reliable user management sub-system is critical to an enterprise application system. Esecurity is a web services-based user management component that provides services for user authentication, access control, user profile management etc.
The Aegis VM Project is an on-going effort to implement a lightweight,
secure virtual machine for executing Java bytecode. It will eventually feature a
modular architecture, Proof Linking, that supports pluggable
verification modules.
PMVAdmin is network managment software designed for use with Linux servers. Features include user/group managment, login scripts, authentication, printer managment and a directory service.
Open En/decryption software. Current version allows for 2 keys, 1 at 32 bytes, and 1 at 20 bytes. Supports ASCII and Binary files in a multiple-executable polylithic architecture.