Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform.
Geographic restrictions, eligibility, and terms apply.
Get started with Nexo.
Fully Managed MySQL, PostgreSQL, and SQL Server
Automatic backups, patching, replication, and failover. Focus on your app, not your database.
Cloud SQL handles your database ops end to end, so you can focus on your app.
Capture is a high interaction honeypot client that finds malicious servers on a network. Capture monitors the systems state, and checks for changes which malicious resources may cause. THIS PROJECT HAS MOVE TO HTTP://www.nz-honeynet.org/capture.html
Exploits some of the known vulnerabilities of Oracle. Includes SID Enumeration, Passwords tests [common/ dictionary]. Supports attachment of malformed shell codes with TCP packets for crashing the remote server or gain DBA privileges on it.
Waste.NET is a complete rewrite of the now defunct W.A.S.T.E. project. It aims to become a highly secure file sharing application, as well as a secure chat/VOIP platform.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
RC4.NET is a library that adds support for encrypting/decrypting using the symmetric RC4 algorithm in the .NET environment. The library is written in C# language, and performs equally well on both the Microsoft CLR and Mono platform.
Hasher is a .NET class library to help programmers implement standard hashing and checksum algorithms into their own software. Written entirely in C#, Hasher providers a uniform interface to easily use any of the algorithms contained within this library
"mASN1" - mini ASN.1 framework is a light ASN.1 framework written in C# for .NET
framework. It can be used for creating classes that model ASN.1 types and
are capable of encoding/decoding themselves to BER/DER codes. PER support is planned.
KINEC Is Not Encrypted Chat is a client/server chat program designed to keep you secure. It uses strong algorithms for encryption and authentication and will not compromise security.
Project Identity aims to develop an Open source Biometric Solution i.e. complete set of tools and libraries for Biometric identifiction systems.
This project has intial code done by students as their summer project at Echo IT Labs Pvt. Ltd.
This project will hold many subprojects all of them based on the .NET platform. The main purpose of this project is to keep the MVP comunity connected and working together in an open source project.
It moves by itself inside networks like virus infection & plagues, it is being written to solve computer virus problem drastically and responsibly. It is legal, free and open for public domain to improve W3 ICT Security.
Verifier is a file verification utility that supports the major file checksum formats such as SFV and MD5 sums. It also has native support for the new VerifyXML format, as well as a built-in interactive hash and checksum calculator.
This project is an attempt to design strongly typed langauge like C# or Java using capability security model. This is an reseach project. This project is also a temporary home for async-objects projects which is prototype of classes for asynchronous inte
Ano (Anonymous Network Overlay) is a decentralized IP router based on relaying principle. In Ano all IP traffic is anonymized, including TCP, UDP, ICMP and DNS protocols. Each node acts as a relay and NAT for external traffic.
Projeto de ferramenta OpenSource para Gerência/Análise de Riscos. Implementação de módulos para conformidade com normas, como ISO, COBIT, integração com ferramenta de inventário (GLPI), Gerência de PSI.
The Fenrir Morph Signature project aims to provide existing signatures standards with a morph capability: "Sign once, distribute many". This capability allows to use the same signature for authenticating modified, but authorized, versions of a document