Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Start Free
Build Securely on Azure with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
gPassword Manager, a password manager written in GTK. Lets you store all of your passwords in an encrypted file so you only need to remember 1 master password.
Enpct (Easy Network Packet Crafting Tool) allows you to generate network packets to check firewalls or other network equipment. The packets can be precisely described in configuration files. It also supports fragmentation based network attacks.
Lrzip is a lossless compression application designed to scale with modern hardware resources using a variety of different back end compression algorithms with the ability to have unlimited size compression windows and optional high grade encryption. The larger the file the better the compression possible and the more powerful the hardware the faster it can compress with a heavily multithreaded design.
Cross-platform distributed password cracking tool, used to carry out brute-force attacks on common encryption protocols. Client/server based with administrative web interface.
Usb-Defensor is a cross-platform USB-Disk encrypt solution. It can be used to encrypt the whole USB-Disk. There is no different between common USB-Disk and encrypted(Usb-Defensor) USB-Disk in opterating.
Remote Web Logger is a remote web transaction logging daemon. It operates by passive monitoring of web server traffic to translate web session data to transaction log entries that are written to standard log services such as syslog.
This daemon is exclusively used by the L2TP over IPsec Manager GUI application in order to execute openswan and xl2tp commands as root on behalf of the GUI client.
Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
A command line tool written in C++ that analyzes the source files of a C program to represent the pattern of its system calls in terms of a LALR(1) grammar.
KomodoPGMP is a cryptographic protection and compression tool for executable files. The project takes malicious code enhanced privacy to the next level.
KFW aims to be a simple to use but powerful Firewall/IDS. That will have a GUI designed since its origins, and will use state of the art firewalling and intrusion detection techniques to achieve maximum performance.
Library dedicated to the parsing of network protocols and designed to be fast, auto-adaptive, asynchronous, modular and completely independent from client/server code.
Licence server is designed to licence your own terminal application. You can integrate these codes into your client program by a few simple changes in a code.
S.T.R.E.S.S.(Stress Testing and Reverse Engineering for System Security) is a framework for functional testing, conventional testing and security assessment about network software and firmware device.
CSI PC2 is a project for verification and identification of biometrical information that scales up to tens of millions of entries. Several algorithms are implemented. It includes testbeds, benchmarks and genetic algorithms for optimization.