Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
Use prime numbers and pseudorandom number generators to create pseudorandom permutations to "shuffle" bits of given data (passwords, logins, PINs, files, directories). It is designed to be very secure (I hope so).
psmd listens on an interface and writes the syslog messages that it sees to disk along with a hash. In addition, it can forward system messages to another system as though the messages came from the original device.
TIMS is a multithread-capable high speed TCP & ICMP network scanner and reverse-DNS resolver aiming at scanning very large ranges of IP addresses in a short amount of time. Thread number, timeouts and delay values are highly configurable.
Programm zur einfachen Chiffrierung von eingegebenen Text sowie Textchiffrierung.
Das Programm verwendet einfache Algorithmen zur Verschlüsselung. Es werden weitere sicherere Algorithmen und integrierung in diverse andere Programme folgen.
viewstate is a decoder and encoder for ASP .Net viewstate data. It supports the different viewstate data formats and can extract viewstate data direct from web pages. viewstate will also show any hash applied to the viewstate data.
Slightly modified BSD telnet client with STARTTLS command support, allowing to establish SSL session at current communication point. Also STOPTLS command implemented.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
SELinux Policy Editor(seedit) is a tool to make SELinux easy. It is composed of Simplified Policy and its tools. The main feature is Simplified Policy. Simplified Policy hides detail of SELinux.
OCTV it is a robust and complete solution of security and monitoring.It has support for different models of cameras IP.Among its functions includes playback, recording, motion detection, event scheduling and can work simultaneously with many cameras
stproxy is small, fast and efficient HTTP/SSL proxy, features: high-anonymous, basic http authorization, user management using web interface, asynchronous dns resolver, single-threaded (only one process-thread)
This project aims to develop a prototype system that explores how we should re-invision computer system design based on changes in how people get the software that they run, as well as advances in static analysis of software.
Honeytrap is a network security tool written to observe attacks against network services. As a low-interactive honeypot, it collects information regarding known or unknown network-based attacks and uses plugins for automated analysis.
POLUS, a software maintenance tool capable of iteratively evolving running software into new versions, aims to retain backward binary compatibility, support for multithread software and recover already tainted state of running software with low overhead.
LDAP bind SLAPI plugin for CAS authentication. Plugin has been tested and is working in a real system since march 2007. It is developed for Fedora DS, and should also work with no changes or minimal ones in RedHat DS and SUN. Openldap port is in progress
BruteNet is a system of the distributed brute force and distributed calculations built on user extensions capable to solve a great number of problems related to the partition on a lot of machines.With sample extention you can distribute brute md5-hash
This is a simple LDAP benchmark tool. It creates a number of threads and every thread tries to connect to the Server and does a different query x times. Then all the errors and the time are counted. Through this the religability of LDAP should be tested.
This software is a set of tools that hides C source code in txt files. Also the software is able to restore the txt files to C source code again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
Pseudo Random Number Generator (PRNG) frontend using libtomcrypt. It simply writes pseudorandom data (using sober-128, fortuna, yarrow or rc4 algorithm) on standard output. The output may be encoded to base64, base85 or hex or just left binary.
Figaro's Password Manager (FPM) is a GNOME application that allows you to securely store & categorize your passwords, which are encrypted using the blowfish algorithm. It can launch applications using the host names, user names, and passwords you supply.
Anticeptron is an attempt to do what people expect from every captcha: a strong system with the ability to prevent bots from doing unauthorized access.
ccsrch is a tool that searches for and identifies unencrypted and contiguous credit card numbers (PAN) and track data on windows and UNIX operating systems. It will also identify the location of the PAN data in the files and record MAC times.