No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
Start Free
Earn up to 16% annual interest with Nexo.
More flexibility. More control.
Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform.
Geographic restrictions, eligibility, and terms apply.
Deobscufates .NET assemblies, primarily by rearranging IL code (basic block reordering) and removing junk.
Designed to be modular, it is built from reusable pieces.
Generic file fuzzer. It has some "advanced" features like deep tracing into child child's and also it can "recognize" text format of the input files (if they are ASCII).
Software repository of the hack://src project. Includes security related software for crypto, vulnerability/patch notification & management, and ultra low level system access for stealth forensics & intrusion detection or malware removal.
FSFS is a secure distributed file system in user space built over FUSE and OpenSSL. It stores AND transfers data between clients and server in secure form, leaving most of the cryptography to the clients, thus relieving the server of the additional work.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Steganography tool which establishes a full-duplex steganographic data transfer protocol utilizing Real-time Transfer Protocol (RTP) packet payloads as the cover medium. The tool provides interactive chat, file transfer, and remote shell access.
IP address anonymization, traffic trace anonymization, network monitor, traffic process.
This software will provide a ip address anonymization scheme with multiple access security levels. can operate in wire speed.
ettercap-gg is a Gadu-Gadu IM ettercap dissector. It is a patch for ettercap sniffer that adds the ability to sniff Gadu-Gadu logins, passwords and messages. Gadu-Gadu (www.gadu-gadu.pl/) is the most widely used IM network in Poland with ~6mln users.
integrit is a simple yet secure alternative to products like tripwire. It has a small memory footprint, uses up-to-date cryptographic algorithms, and has features that make sense (like including the MD5 checksum of newly generated databases in the report
stegotools is a suite of UNIX command-line applications to read/write hidden information from/in files using steganography. It currently fully supports 24bpp bitmap images.
Remote Sniffer Detection Tool is a utility to detect sniffers running on other machines in the same network (Ethernet) segment. This project is still in a very early beta stage and currently is only a PROOF-OF-CONCEPT for further development.
uboot.zip is a linux server micro image able to run native from cd, usb-drive or emulated under windows, linux or macosx. uboot.c is a crunched and crypted init procedure to protect a linux server image.
FedStage FedSAML is a software aiming to implement security SAML2.0 standard, supporting low ((de)serialization) and higher level (easy way of creating and verifying security-related data, own extension elements,...) of creating SAML-related data for Web
Linux Kernel Immune System (KIS).
KIS is a immune-inspired Intrusion Prevention System (IPS) developed as part of the Linux kernel. It's a hybrid of anomaly and signature based approaches.
DAXFi is a Python package that helps configure several different kinds of firewalls in a consistent way. The rules are described in XML. It comes with a Python package, useful to build other applications and includes some useful example programs.
A framework for information security management. It has the centralized server for managing the IDS sensors, log consolidation and correlation, report generation etc. Also it has customized IDS sensor based on snort.
IDS-probing Project is a testing project for IDS evasion.Using libnetdude API and other plugins to do IDS assessment.Sending different mutant exploits to check IDS's defensive ability.
PIX Logging Architecture correlates Cisco PIX system logs into a MySQL database and provides a web-based frontend for displaying, searching, and managing Cisco PIX logged events, traffic, and IDS logs (More info at http://www.logging-architecture.net ).
EM stands for enforcement module. It is a security module which create bastion host machine. the process involved reading an XML policy file and translate it into Linux/Unix system call set. the translation process is created by CSG(command set generator
GNUWire is a centrally managed, multi threaded file integrity checker / intrusion detection tool. It was written from the ground up with security, portability, scalability, performance and user interface in mind.
BRUTALIS - BRUTeforce ALternative Is Stupid. Brutalis generate brute force passwords. It can be integrated in any command line for an attack and support resume, character panel, minimum and maximum length, special separating characters and more.
Q5 is a complete fully open linux based router / network appliance, including hardware. It supports up to four wireless minipci cards and two 10/100 Mbps NICs. The hardware is build around AMD's AU1500 MIPS processor, running at 264 MHz.
An Enhanced version of gnu dd with features useful for forensics and security. Key features include on-the-fly hashing, status output and faster disk wiping.