A graphical application created in C# .Net 1.1 that helps the penetration tester to inject SQL commands on a web page. Its main strength is its capacity to automate tedious blind SQL injection with several threads. Under Clarified Artistic License
Changetrack logs modifications of a set of files, and allows recovery of the tracked files from any stage of development. The changes are presented in a powerful web-based form, a text file, or an email message. A handful of options allow situation-specif
augrok is a Linux audit log analysis tool written in Perl that provides searches based on real and effective user/group ids along with login id, executable name, terminal, within a time range, regular expression matching, and so much more.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
HTML Purifier is a standards-compliant HTML filter library written in PHP. HTML Purifier removes all malicious code (better known as XSS) with a thoroughly audited and secure yet permissive whitelist, and ensure standards compliance.
The Cookie-revolver framework provides J2EE web-applications with two-factor authentication security, “something I know” (userid/password) and “something I have” (encrypted one-time cookie).
PHP Security Scanner is a tool written in PHP intended to search PHP code for vulnarabilities. MySQL DB stores patterns to search for as well as the results from the search. The tool can scan any directory on the file system.
Web reverse proxy for Single Sign On (SSO). It can apply a security policy (profiles stored in a LDAP directory) to an existing set of applications, consolidate websites, encrypt all communications, rewrite simple URLs...
devialog is a behavior/anomaly-based syslog intrusion detection system which detects unknown attacks via anomalies in syslog. It can generate signatures for ease of management, act upon anomalies in a predefined fashion or perform as a standard log parser
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
The Web Application Reliability and Defense (WARD) framework is a two-part security solution composed of a vulnerability detection component, SecureUnit, and a vulnerability protection component, SecureFilter.
Sniper is a powerful keylogger component that can be easily integrated in applications. It is a small,easy-to-use ActiveX control that encapsulates all the complexity for logging keys and exposes a few important properties and methods.
This application authenticates data from network by creating a short password from all transferred bytes which can be manually compared. Based on a paper by Moni Naor, Gil Segev and Adam Smith. See www.wisdom.weizmann.ac.il/~gils/papers/TightBounds.pdf
TURing human IDentification, a textual highly accessible alternative to image CAPTCHAs involving the usage of simple phrases and based on the language recognition features of the user, supposedly human.
Smoothwall GUI Styles selection. Mod to Smoothwall 2.0 provides Web interface color/style selection from the stock orange. Various styles implemented along with the capability to easily add your own styles. Smoothies Style Select has a built in css edito
Grained Login is a fine-grained login system for Qt applications. It uses SHA1 hashed passwords to retrieve user rights from a SQLite database. An administration dialog handles the maintenance of the users, the roles, the rights and the password history.
This project is based off of Sam Rape. The final product is a bootable floppy which copies the sam file, compresses it and puts it on a disk. A detailed description can be found at datastronghold.com/archive/t10429.html
Smoothwall Mod for Dansguardian User group editing. Creates five initial groups; everybody, child, preteen, teen and adult. Intended to automated the editing of filtergroupslist and exceptionuserlist via the web interface of Smoothwall. Inserts as a new
A framework for information security management. It has the centralized server for managing the IDS sensors, log consolidation and correlation, report generation etc. Also it has customized IDS sensor based on snort.
PIX Logging Architecture correlates Cisco PIX system logs into a MySQL database and provides a web-based frontend for displaying, searching, and managing Cisco PIX logged events, traffic, and IDS logs (More info at http://www.logging-architecture.net ).