Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
Get started with Nexo.
Go From AI Idea to AI App Fast
One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
The VII is intended to be used in firewall/IPS testing and stressing testing by simulate IP/TCP/ARP/... packets. VII is a c script based tool which can send any kinds of customized packets. It support random protocol/port/ip.
Black scalpel is an advanced graphical (Swing gui) security and analysis tool written in Java, C and Assembler (platform independent). Current stage is early alpha, many features are still missing. Use SVN!
A hardware supported hypervisor originally built for malware analysis. Features: Linux VM introspection, minimal detectability, small (~150KB), simple, and well documented. Can be used for other purposes. Support for Intel-VT & Windows coming soon.
This is a highly configurable and flexible testing tool capable of generating different streams of network packets based on set of parameters user provides, for performance & robustness testing on a NIDS - Network Intrusion detection System.
LibIDMEF is an implementation of the Internet Engineering Task Force (IETF), Intrusion Detection Exchange Format Charter Working Group (IDWG), draft standard Intrusion Detection Message Exchange Format (IDMEF) protocol.
Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
Recently, security is becoming a social issue. Security patch of Microsoft was cracked in several days after releasing. This kind of binary cracking is composed by debugging and reverse engineering technique.
The kernel network stack may behave not as expected, especially in the case of receiving packets. With Ianus it is possible to bypass the kernel network stack and to develop your own network stack in user space or other tools.
Minarke Is Not A Real Kriegsmarine Enigma
But it will allow you to communicate with one. Command line enigma machine emulator. Full M4 compatability, can be used to decode WWII U-boat messages, or send your own.
Al2 is a language, close to C++ and Java, designed for use in mathematics and science, but is procedural unlike Mathematica and Maple. Like C++, class operators can be defined. Like Java, there is no need for header files. Aled is an interface to AL2.
This project aims to develop a prototype system that explores how we should re-invision computer system design based on changes in how people get the software that they run, as well as advances in static analysis of software.
Cnc's IP Data Volume Report:
Logs IP to IP contact, number of packets, bytes, time of contact, Ethernet too!
View via local web interface.
Very simple for those who want to view who your computer is contacting the most!
BruteNet is a system of the distributed brute force and distributed calculations built on user extensions capable to solve a great number of problems related to the partition on a lot of machines.With sample extention you can distribute brute md5-hash
Bio-SPHERE aims to create a flexible, secure and multimodal biometric platform for applications that require biometrics. Bio-SPHERE is formed by a network of interacting nodes that interface with biometric hardware and offer biometric functions.
MpNT is a multi-precision number theory library that provides a base for building cryptographic applications. It may however be used in any domain where efficient integer, modular, and floating-point computations involving large numbers are required.
LightCrypto is C cryptography library. It contains Big Number Library, basic crypto algorithms (3DES, DSA, RSA, ECDSA, etc), Internet Voting Scheme, and many more. Current librarie's binary is less than 1MB and it can even be smaller by user config.
This is the worlds first and probably only FLOSS project aimed to create a lowbudget, based on availble technology, cruise missile. No this is not a Joke, its for real. Why? Since no one has tried to do this before and certainly not under the GPL.
Shade is a versatile LSB (least significant bit) manipulation and analysis tool used to hide/retrieve files from within other files, such as images. The goal is to make the existence of the hidden file completely undetectable, and optionally encrypted.
DelFileLock is a Win32-only Software and tries to delete or only unlock a file, which is still used and locked by another process. Normal deletes do not work, because of window's generated filesystem-errors.
Real-Time Proactive Secret Sharing Library for RTAI is an implementation of the Shamir's secret sharing scheme and Herzberg's proactive secret sharing algorithm. The library uses a port of GNU GMP in order to make multiple precision arithmetic operatio
The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.