8 Monitoring Tools in One APM. Install in 5 Minutes.
Errors, performance, logs, uptime, hosts, anomalies, dashboards, and check-ins. One interface.
AppSignal works out of the box for Ruby, Elixir, Node.js, Python, and more. 30-day free trial, no credit card required.
Start Free
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
CECID is a PHP script designed to anonymize and cloak HTTP requests on restrictive connections. CECID is run on a remote, unrestricted server, and accesses pages for users, editing the page's source in realtime to evade content filtering software.
Being that Sun\'s Java Cryptography Extension (JCE) is not well-documented and has a steep learning curve, the vH Crypto API for Java is being created to abstract the procedures which are commonly used in cryptography.
Distributed session caching tools and APIs, primarily for SSL/TLS servers though perhaps useful for other (non-SSL/TLS) circumstances. Also includes a self-contained network abstraction library (libnal), and the sslswamp SSL/TLS benchmark/test utility.
tumbler is a protocol and implementation that provides a stealthy and secure way to execute a predefined command on a remote machine. tumbler is intended to allow remote reconfiguration of firewalls or services in a similar manner to port knocking.
Signelf is a toolset written in c++ for signing elf binaries, specifically linux shared object, though in theory, any elf binary may be signed. It uses openssl's libcrypt to RSA sign the library, and the same to validate the signature.
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
Secure Message eXchange (SMX) is a web-based interface to PGP/GPG, allowing users to create PGP/GPG keys, encrypt, sign, view, and exchange messages. Ideal for password storage or exchange of other sensitive information.
This is an experimental program that encrypt/decrypt/divide/join files. This program uses a new algorithm made by me, this algorithm is experimental and I working on it, every day this algoritm will be better.
warnsmtpd provides a warning message to the desktop of the user about SMTP activity. Would that activity be a result of the user operation then nothing is wrong. But if the SMTP activity is not initiated by the user then....
Access Point Utilites for Unix - it's a set of utilites to configure and monitor Wireless Access Points under Unix using SNMP protocol. Utilites knownly compiles and run under Linux, FreeBSD, NetBSD, OpenBSD, MacOS-X, AIX, QNX.
Qryptix consists of a PAM object and utilities for session- and key-management for encrypted home directories using the International Kernel (CryptoAPI) patches for Linux. It simplifies login/logout, mounting/unmounting, and key generation and changing.
A Java program to encrypt files and make them relatively safe for transfers across networks. Currently just in commandline form, but an application is in the works.
SLOP is a PERL and PHP based engine for the collection of and reporting
on logs from various network based devices such as firewalls, switches,
and web servers. So far, SLOP supports Checkpoint firewalls and
Cisco 2900 and 3500 switches.
Ganzúa is a cryptanalysis tool for classical ciphers (mono and polyalphabetic) that lets the user define almost completely arbitrary cipher and plain alphabets, allowing for the proper cryptanalysis of cryptograms obtained from non-English texts.
Secure Key is an uncrackable security mechanism that minimizes trust given to stored keys, and obfuscates key data in random noise. The Secure Key itself is a hardware device that plugs into your PC (and the server the other end). The key is sent to user
Prismstumbler is a software which finds 802.11 (WLAN) networks.
It is designed to be a flexible tool to find as much information about wireless LAN installations as possible. It comes with an easy to use frontend suitable for both PC and PDA displays.
Junto is a Java-based peer-to-peer framework which allows using, simulating, and testing different trust management models which can be employed in peer-to-peer networks. Junto is available for free under the terms of the GPL.
JWall is not just a java gui for iptables. JWall is a multi firewall management client. A secure rulebase can be built with graphical objects. Rulesets can be pushed to remote firewalls (via ssh). The remote firewall just needs to be Linux with sshd
Security Advisor is a program designed to analyze and report security issues beyond application vulnerabilities. The program will analyze system and network configurations to recommend ways for improving security.