Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
This is the worlds first and probably only FLOSS project aimed to create a lowbudget, based on availble technology, cruise missile. No this is not a Joke, its for real. Why? Since no one has tried to do this before and certainly not under the GPL.
The ELF-Encrypter program suite is a collection of programs to encrypt your ELF binaries using various algorithms. GnuPG is required in order to use some encryption techniques.
The suite also contains programs to inject code into ELF binaries.
Tecnotel is a project that seeks security and comodity to the end-user, controlling your house through the telephone line, internet or remote-controller. The software available controls the electronic-equipment and others.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
This project aims to pool together as many kernel projects as possible, ironing out conflicts where possible, so that experimental kernel projects can get greater exposure, safely, and so that those projects can be tested under much more varied conditions
This is a very powerfull criptography project that basicaly can be used to transmit or store secure data and study some cipher, hash and compression algorithms to understands how it works.
The WOLKs are stable and development kernels, containing many useful patches from
many projects. Goal: Stability, Scalability, Performance and most important: Security.
The purpose of this project is to provide a biometric security solution by using voice print, fingerprint and/or facial recognition along with a password and/or smart card support using AES to protect data. Please read forums for if interested.
An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
Strength in numbers. Existing products we're involved in include port to Linux of Tony Forbes' MFAC for brute-force factorization of MM61 for relatively small factors, and further development and improvement of Tim Charron's ECMnet distributed computing f
Fingerprint Laboratory - a portable and layered package of libraries and tools for academic research and productive use that allows people to easily integrate Automatic Fingerprint Recognition technology into their software or system with little know-how.
Bouncer en localhost o lan, que permite capturar el trafico hacia un determinado canal de irc, cifrandolo con Rijndael, Serpent o Twofish. Y mostrando una salida por el canal en base64. Ideal para paranoicos.
Este software provee mecanismos de seguridad a sistemas Linux. Entre ellos podemos citar ACL, control centralizado de seguridad, ocultación de procesos, módulos, etc...
Podemos usar programas externo como antivirus muy facilmente.
_malloc is a library able to randomize normal malloc and to make it more secure from possible memory reading; thanks to it, data are allocated in bits with random keys without increasing dimension and access data needed time.
The goal of the Stik's Security Module project is to provide a vehicle for implementation of a label based security policy complimentary to the existing Linux security model. The module is implemented by hooking the Linux 2.4.x system call table.
Komoku implements an intrusion detection system using embedded system. Unlike other integrity tools, as tripwire, it does not rely on the operating system. The IDS is actually implemented in an INtel EBSA-285 board.
The Hackers Lab is aimed to provide hackers, system audits, system and server and network administrators with applications to secure their own servers.
Immune Security Architecture For your Enterprise --
Host-Based Intrusion detection for UNIX based systems, at the process level.
Detect changes in the normal behavior of processes, advanced features to detect Buffer Overflows.
Wargame Hackademic est un ensemble de composants à ajouter sur un liveCD linux, devenant un wargame; à partir d'un compte classique, vous devez, par divers objectifs et techniques d'exploitation, trouver les failles du cd pour accéder au mode 'su'