Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Start Free
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
jpcap is a set of Java classes which provide an interface and system for network packet capture. A protocol library and tool for visualizing network traffic is included.
jpcap utilizes libpcap, a widely deployed system library for packet capture.
Prismstumbler is a software which finds 802.11 (WLAN) networks.
It is designed to be a flexible tool to find as much information about wireless LAN installations as possible. It comes with an easy to use frontend suitable for both PC and PDA displays.
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
Combined coded remote-administrative service with SSL secure port scan, anonymous routing and third-party plugin inbuilt for quick and automatic "scan and install" process. Easy to use and will work under firewalls and up to 1024 bit strong cipher
Shoki is a free, open source network intrusion detection system. The fundamental design goals are simplicity and modularity, and the focus is on traffic analysis rather than content inspection.
Live Security/Forensics Linux Distribution, built from scratch and packed full of tools useful for vulnerability analysis, penetration tests, and forensic analysis.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
ThreatMan is an IDMEF compliant threat manager application which makes use of a multi-tier architecture.
It aims in event and vulnerability correlation from alerts sent by IDSs, firewalls and other IDMEF compliant applications.
The John Darm project aims at developping a software that can tests a brute force attack on weak UNIX passwords. It s a multi-client application that dispatches the calculations between the different clients.
sntm is a Qt based GUI snort monitor. Currently, it is capable of monitoring
multiple snort sensors in a centralized monitor screen. Each snort sensor
creates a SSL encrypted communication thread to connect to the moniter server.
SIPES (Security Incident Pollicy Enforcement System) aims to provide an automated e-mail,XML and PKI based system for automated security policy enforcement based on statefull risk assesment and open exchange formats.
The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
The .Net CP Project has the goal to create a totally free web hosting control panel that works with .NET technology on windows 2000/2003 servers. The panel will control aspects as: webspace, bandwith, dns, mail, news, and more.
Password generator. The user can choice the characters, write the results in text file, make pronunceable passwords, choice the number of digits and codes. Visual version made in Java and non-visual version in C. Great performance.
QT based Linux web security tool that it is designed to test targets for weak passwords using crack, leech and URL testing functions. Plugins allow potentially any protocol (eg http, ftp) or server to be attacked, while remaining anonymous using proxys.
An alternative Identification system that is a replacement for Microsoft's Passport and the Liberty Alliance. Its a simple architecture that is setup so anyone can run a server and thereby have control over their online identification.
The X Supervisor Extension is a patch for the popular XFree86 X server to make X11 forwarding with openSSH safer when the remote host can not be trusted.
bns is a network simulator.
You can create a complete network, add services to host, ... It can be usefull to study network behavior, make presentations, learn hacking techniques, ...