BigQuery automates data prep, analysis, and predictions with built-in AI assistance.
Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
Try Free
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.
Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
A user-space solution for configurably disabling the ability of a process to access the internet. It is especially useful for foiling code that is suspected of containing spyware.
Simple XOR Encryption is written in c++ and can encrypt files using insecure XOR encryption.
Could be used to form framework for implementing XOR encryption in other programs, such as encrypting save game files in games, etc.
Tested on Windows + Linux.
Chaosreader is a freeware tool to fetch application data from snoop or tcpdump logs. Supported protocols include TCP, UDP, IPv4, IPv6, ICMP, telnet, FTP, HTTP, SMTP, IRC, X11, VNC, ...
Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
Execution monitor for Java Applications.<br/>
BERSERK implements the Intercepting Filter design pattern. <br/>
Allows composing and runtime editing of execution flow and intercept services with access control, logging or any user-defined filters.
Blingd is a multi-purpose daemon for UNIX/Linux that listens on an arbitrary TCP port. When queried, blingd will return a configurable message or random blings.
sfick (pronounced as "s-fick") is a two part software system whose function is to assist system administrators with the process of verifying the integrity of critical files. Given a system compromise, system administrators must be able to verify the integ
A full-featured, Java-based back-office suite specifically designed for use in global financial institutions to facilitate straight-through-processing and other much-needed operational efficiencies. Built using best-of-breed, open-source technologies.
NoFault is a library written in C used to encrypt or decrypt data with XOR encryption. KNoFault, NoFault32 and CLNoFault are direct applications of the library, which is easy to use in your own programs.
Aiakos is a suite of software components that together provide a collaborative Single-Signon System across multiple trusted websites. A simple open protocol is provided for collaboration, and working libraries are provided for ASP and Zope.
This project provides an interface to Sun's JCE (Java Cryptographic Extensions) as a JSP taglib. It brings strong encryption algorithms such as AES and Blowfish to your JSP applications. It uses the bouncycastle.org cleanroom JCE 1.2.1 implementation as
UnderMP3Cover is a mp3 steganography tool. It will allow you to write and read hidden messages within mp3 files without creating any audible differences to the mp3. The messages could be a text file, jpg or any other file depending on the mp3's size.
Syscheck monitors the reliability/integrity of critical system files (config files and
binaries) by identifying changes made to them. It does this through an "automated
verification regimen run at regular intervals" against a local or remote database
This is a multiplatform general utility suite for use with existing network stumbling software, such as Kismet or NetStumbler. The program will convert between multiple output logs, including the popular wi-scan format, between platforms.
PACIE (Perl Analysis Console for Intrusion Events) Attempts to be a complete replacement for ACID. Place this cgi script on your internal webserver and receive powerfull reporting on your current snort database.
Java Mechanic can modify public, private and protected fields and activate methods of live running apps. Also decompiles,or saves any objects or source code. Using a built in java code interpreter, objects can be created on the fly. Contains many tools.
This is passwords, a free program to store passwords and additional data in an encrypted database. Passwords main focus is on quick and easy usage as well as robustness and flexibility in terms of the encryption technique.