BigQuery turns your data warehouse into an AI platform. No new languages required.
Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
Try Free
AI-generated apps that pass security review
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
The dude is a UNIX debugging package independent of the ptrace() system call; it consists of a kernel module [the_dude.o], a library to interface with the module [libduderino.so], and an ncurses client [ddbg] .
The WOLKs are stable and development kernels, containing many useful patches from
many projects. Goal: Stability, Scalability, Performance and most important: Security.
It moves by itself inside networks like virus infection & plagues, it is being written to solve computer virus problem drastically and responsibly. It is legal, free and open for public domain to improve W3 ICT Security.
K is a C++ library featuring Genetic Programming, cryptography, 64 bits arithmetic, cross-platform macros and unicode conversion routines. It compiles on NewtonOS, Mac < X, Unix and Windows and it makes little use of C++ templates.
The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an
The purpose of this project is to provide a biometric security solution by using voice print, fingerprint and/or facial recognition along with a password and/or smart card support using AES to protect data. Please read forums for if interested.
An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
Strength in numbers. Existing products we're involved in include port to Linux of Tony Forbes' MFAC for brute-force factorization of MM61 for relatively small factors, and further development and improvement of Tim Charron's ECMnet distributed computing f
Fingerprint Laboratory - a portable and layered package of libraries and tools for academic research and productive use that allows people to easily integrate Automatic Fingerprint Recognition technology into their software or system with little know-how.
Software for a van eck phreaking device. Please use to test security only.
<a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550525,00.html">Here</a>'s an explanation if you don't know what van eck phreaking is.
Bouncer en localhost o lan, que permite capturar el trafico hacia un determinado canal de irc, cifrandolo con Rijndael, Serpent o Twofish. Y mostrando una salida por el canal en base64. Ideal para paranoicos.
Este software provee mecanismos de seguridad a sistemas Linux. Entre ellos podemos citar ACL, control centralizado de seguridad, ocultación de procesos, módulos, etc...
Podemos usar programas externo como antivirus muy facilmente.
_malloc is a library able to randomize normal malloc and to make it more secure from possible memory reading; thanks to it, data are allocated in bits with random keys without increasing dimension and access data needed time.
The goal of the Stik's Security Module project is to provide a vehicle for implementation of a label based security policy complimentary to the existing Linux security model. The module is implemented by hooking the Linux 2.4.x system call table.
Komoku implements an intrusion detection system using embedded system. Unlike other integrity tools, as tripwire, it does not rely on the operating system. The IDS is actually implemented in an INtel EBSA-285 board.
A library implementing the AES (American Encryption Standard) or Rijndael algorithms, intended to provide a neat packaged solution
for other projects to use.
Package includes C and Intel Pentium/MMX assembler versions
of AES, along with an extensive
The Hackers Lab is aimed to provide hackers, system audits, system and server and network administrators with applications to secure their own servers.
Immune Security Architecture For your Enterprise --
Host-Based Intrusion detection for UNIX based systems, at the process level.
Detect changes in the normal behavior of processes, advanced features to detect Buffer Overflows.
Cryptofon - a safe phone with integrated encryption.
The Cryptofon is designed to enable safe and secure communication trough a regular PSTN line. It supports narrowband connections (~2400 bit/s and lower).
Wargame Hackademic est un ensemble de composants à ajouter sur un liveCD linux, devenant un wargame; à partir d'un compte classique, vous devez, par divers objectifs et techniques d'exploitation, trouver les failles du cd pour accéder au mode 'su'