Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Try Auth0 for Free
Fully Managed MySQL, PostgreSQL, and SQL Server
Automatic backups, patching, replication, and failover. Focus on your app, not your database.
Cloud SQL handles your database ops end to end, so you can focus on your app.
Ungoliant is a system utilizing open-sourced backends to isolate problematic (virus-infected or otherwise) hosts from a network. Focuses on vpmsd, snort, and nmap for detection and containment.
Dark/sk sources are kernel patchset projects created by predatorfreak (Brett G.), focused on maintaining stablity and scalabliy. Everything that goes into these patchsets is selected based on these goals.
OPIAM stands for Open Identity and Access Management. This Suite will provide modules for user & right centralized management: user profile management, ldap content consultation, access control based on RBAC & provisioning policies, and Web SSO.
Libdejector is a database tool which defeats SQL injection attacks by performing context-free validation of queries. While written in C, SWIG wrappers exist for Python and other languages will be following soon.
Cryptographically secure your files with asymmetric and symmetric keys, as well as password based encryptions and file/text checksums. Use upto 6 different keys to encrypt/decrypt and get checksums using MD2, MD5, SHA1, CRC32, etc..
InsecureWebApp is a web app that includes common web application vulnerabilities including SQL&Html Injection- see owasp.org. It is a target for automated and manual penetration testing, source code analysis, vulnerability assessments and threat modeling.
This PAM module provides the ability for users to have encrypted directories which are mounted automatically on login and unmounted after logout. The Device Mapper's CRYPT target provides the encryption.
Streamline Azure Security with Palo Alto Networks VM-Series
Centrally manage physical and virtualized firewalls with Panorama
Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
Ce module en PHP permet de gérer les accčs ŕ des pages web de maničre trčs simple. Il repose sur une base de données MySQL et est livré avec une interface de gestion accessible via un navigateur internet.
Proxmox Firewall (Proxwall) is a flexible Linux firewall based on Shorewall and many other open source tools. It is designed to install on commodity hardware within minutes. It can handle complex and fast changing network environments.
A low cost software and hardware KVM over IP and remote Console monitoring
solution running on Linux. Secure administration and access to remote
keyboard/video/mouse and serial console output. Easily configured and
customised to suit user needs.
Uberviewer is a java/swt log processor for Uberlogger (a kernel-based observatory). It allows real-time analysis of a remote OS, including process and I/O monitoring.
This tool is intended to be helpful for security researchers and malware analysts.
SecretBox is an open-source, high-safety password manager for Windows/Linux/J2ME devices. You can build the passwords list conveniently in PC side, encrypt it by a master password, and upload to your mobile phone.
Win32 Delphi applciation allows convienent editing of external signatures database in windows executable packer finder program PEID (http://peid.has.it/). Allows sorting, editing, adding, removal, searching and duplicate signature finding in "userdb.txt".
Proxy Glue lets users glue together socks5, socks4, connect, http, and cgi proxies into one big field of potential paths, with configuration done right from the browser.
Ascii based Encryption/Decrypt Software. Allows you to Encrypt/Decrypt Ascii and Ascii based files. Passwords can be of any length. Simple and easy User Interface. Allows other VB6 developers to encrypt in thier programs. (v2 only)
iDVR (formerly Devolution Security System) is a video surveillance system which can handle up to 16 cameras with motion detection, notification and record on motion to mp4. Stream over the LAN (Multicast) or Over the Net (Unicast).
The MACA objective is to provide user authentication, session management and authorization services independently of platform. Authorization servive is based on a contextual role-based access control model that extends NIST RBAC
Multispoof exploits weak authentication method based on IP-MAC pairs checking, implemented frequently in Ethernet networks by ISPs. This program allows to multiply user's throughput and serves as a demonstration of spoofing effectiveness.
Java Based Cryptographic P2P Messaging Client, is based on a client-server architecture. The Client is made in SWING. The server is text based. Server keeps tabs on presense and the users public keys. Presentation: http://varun.accosted.net/talks.php
Ethereal Network Traffic Session Reconstruction for Internet Protocols. Management Console to reconstruct emails, web sessions, VOIP sessions, FTP, and all known supported Internet Protocols for Network Forensics. ***UPDATE*** Project release scheduled.