Build VMs, containers, AI, databases, storage—all in one place.
Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
Get Started
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
STAT is a framework for building modular, stateful signature-based intrusion detection systems. STAT provides a means to develop sensors which operate in different domains and environments.
C++ template classes for Multi-Value Logic support arbitrary precision and user defined Multi-Value Logic types. This library comes with pre-defined data types: integer, boolean, bit, logic, std_logic, bit_vector, logic_vector and std_logic_vector.
This project\'s goal is to provide a usable progam to enable network administrators to log certain instant messaging activity (namely, login / logout). AIM currently supported, more protocols are in the works.
Wrapper library for PyCrypto, which simplifies usage of PyCrypto considerably, while still not barring the programmer from the underlying functionality.
Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
The sandbox system call API is a simple yet powerful mechanism for
confining untrusted code. It is similar to chroot() and BSD jails, but has
much greater flexibility and expressive power. The code is mostly complete
but not yet fully functional.
To develop an auditing package that is compliant with the U.S. Governments C2 standards for security and, if possible, provides a mechanism for allowing the information collected to be admissible as evidence in a court of law.
Password generator. The user can choice the characters, write the results in text file, make pronunceable passwords, choice the number of digits and codes. Visual version made in Java and non-visual version in C. Great performance.
A web-based system for aiding in the tracking and capturing of International Fugitives. Features include Fugitive profiles, Submiting new alerts, local fugitives, and member state profiles. The First open-source fugitive tracking system on the market!
Gobbler: A tool to audit DHCP networks
Includes DHCP rogue server detection, DHCP DoS, distributed spoofed port scanner using DHCP to obtain many source IP addresses, mulitple arp scans, filtered port detection, spoofed OS detection (nmap + port 0)
Crypto.mod is a simple LOADABLE cryptographic module for tcl 8.3+ (possibly older, not tested). The module supports the blowfish, twofish and rijndael ciphers.
A modular, flexible and extensible Identity and Access Management system for integrated login, access and profile management across disparate security domains. Supports Apache, PAM, Webcrossing, XMLRPC and SOAP from C, Perl, and Java with more to come.
The development of a biometric system and applications e.g. Access Control based on the system to recognize and verify people. The primary goal is face recognition, but other human attributes might get used too in the future.
Encrypted Messaging and Authentication Protocol, Client and Server. This project is meant to further the development of the Encrypted Messaging and Authentication Protocol.
The Smart Linux Firewall will provide IP filtering, Network Address Translation, Vistual servers, mail relay and DNS cache.
We will use existing network tools as much as possible, and produce a web interface to administrate this tools.
The MuPPIT is cross-platform, open source Multi-Purpose Peons Internet Toolkit written in Java and C++, providing a collection of new, useful applications for the average internet user.
The suid-ed wrapper which executes CGI scripts with owner rights.
It also cleans environment variables, modifies resources limits and drops Linux capabilities.
php-backdoor all-in-one administration tool designed as a single phpscript for linux and windows os. features are: browse filesystem, download, upload, create dirs and run phpcode. this tool also can be used to test server security.
OpenAnonymity consists of a module for apache 2.0 Webserver and a framework that enables you to control search engine spider indexing on a word level, contrary to on file level as in Robots exclusion. OA could force Spiders to follow this rules.
The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
Gherkin is a web-enabled, multi-threaded, centralized security scan manager incorporating Nessus vulnerability scanning, dns and nmblookup host resolving, and nmap fingerprinting and scanning.
Remote Nmap (Rnmap) package contains both client and server programs.
Actual idea for this sofware is that various Rnmap clients can connect to
one centralized Rnmap server and do their portscannings.
Server utilize Nmap scanner.
A criteria selection for guiding and assuring activities concerned with the analysis of digital evidence, It covers legal, police and operational aspects. It is not a technical manual for computer forensic analysis, It is a criteria-based manual.
A single compilation of source, binaries, scripts and whitepapers on Intrusion Prevention Systems. Modified scripts available to get an IPS started in a matter of minutes. Comprehensive documentation & regular updates available to stay on the EDGE