Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Start Free
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Trace2ip is to hold one trace of all connections IP, memory the information into the file. The file to have like unique key ip_source and like associate data header IP. Alternative Key:Audit, Trace, Monitor, Dump, IP.
SecureVNC is a development/add-on to the TridiaVNC sourcecode base which provides strong authentication, strong symmetric encryption, and fewer security vulnerabilities than existing VNC implementations.
KCrypto is a KDE2 file encryptor.
It uses the Rijndael ( block cipher algorithm AES winner ) public domain c++ class implementation written by Szymon Stefanek , and it is capable of
encrypting and decrypting every kind of file ( text and binary ) i
This is a project that simulates the German Military Enigma machine during WWII.. It is a project for beginers to learn to program and to meet people. If anyone is interested in helping, please email me @ dustin@rockhill.org
Free Crypto Token will be a free, operating system independent and standard driven interface to smartcards, key files and other hard- and software crypto tokens. In fact FCT will be a framework for PKCS#11 modules that will also include some implementati
The Small Crypto Library is a collection of C++ classes for public and private key cryptography. The Small Secure Socket Library uses SCL for maintaining secure IP connections.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
sectar: a program that creates encrypted tape archives(tar files), using the AES algorithm Rijndael. Encryption exported under exemption TSU 740.13.
Was star, now sectar.
Whisper is for keeping your private communications private. Whisper is designed to be easy to use (no PKI). Also Whispers can be written on paper if you have to. You don't need your correspondent to generate a key before you can Whisper.
QNmap is just another X nmap frontend. The main difference, as far as I know, is that it can be run as a non-root user with some functionality It will eventually incorporate all of nmap's documented features and will be updated to reflect newer versions.
An easy to use GUI for cryptanalysis of pre-digital ciphers. Usefull for historical researchers, the rabidly paranoid, or those who do crypto for fun. Future releases will move upwards towards more modern cyphers.
Buffer0verfl0w Security is a team of skilled security developers, who are
authoring security applications, whitepapers, and discovering security flaws in
software, publicly disclosing their projects and encouraging volunteers to help improving them.
"konspire2b" is a peer-to-peer filesharing system that is markedly different from any existing system (k2b is the first "sink-discovery" system). k2b is being developed in platform-independent C++. It compiles natively for five major platforms.
A peer-to-peer chat program that uses public key encryption (via Gnu Privacy Guard) to keep your conversations from the eyes of packet sniffers (*Cough* Carnivore *Cough*)
A Simple Middlebox Configuration Protocol (RFC 4540) implementation for Linux.
SIMCO is a signaling protocol that can be used by applications (such as SIP B2BUAs) to dynamically control firewalls and Network Address Translators (NATs).
Arduino Home System project aims to connect systems in the home and provide access and control of those systems. The initial goal of this project is to make a home security system using Arduinos and a Linux server.