Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Try Auth0 for Free
Train ML Models With SQL You Already Know
BigQuery automates data prep, analysis, and predictions with built-in AI assistance.
Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
A linux liveCD for the non-invasive, non-destructive detection and analysis of WiFi (802.11) networks. It also provides mechanisms to set up a PC as an 802.11 Access Point.
cpm is a small console tool to manage passwords and store them public key encrypted in a file - even for more than one person.
The encryption is handled via GnuPG so you can access the programs data via gpg as well.
The Realtime Linux Security Module (LSM) is a loadable extension for Linux 2.6
kernels. It selectively grants realtime permissions to specific user groups or
applications.
Automated Incident Reporting (AirCERT) is an Internet-scalable infrastructure to automatically receive, process, and analyze security event information reported from across administrative domains.
The WSGW (Web Security GateWay) is a security-centric HTTP/s proxy, based on the Apache web server and some bundled third party modules.
The goal of the WSGW project is to provide a web application and XML "firewall" for the masses.
ClamMail is POP3 email proxy for Windows with integrated ClamAV antivirus engine.
ClamMail is an Windows antivirus that protects your PC from viruses transferred via mail. Works with Outlook,Thunderbird,Eudora and many others using popular POP3 protocol
This project is a collection of Open Source crypto cores and implementations relating to high speed cryptanalysis/cracking and complex implementations.
Ircproxy is transparent IRC content-filtering application. It may be used whenever there is a need of monitoring IRC connections.It may be used to deny specific connections or to behold suspicious IRC traffic.
Streamline Azure Security with Palo Alto Networks VM-Series
Centrally manage physical and virtualized firewalls with Panorama
Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
tpm4java is a java-library which makes it easy to use your trusted plattform module (tpm chip) in your java applications. A tpm chip offers a random number generator, a secure keystore, an rsa-engine and some other cryptographic functionality.
PAM module which will authenticate user by X509 certificates. Keys must be provided in some automountable location. As storage may be used usb steaks, bluetooth storage devices... Mainly intended for password-less authentication on single user clients pc
Real-Time Proactive Secret Sharing Library for RTAI is an implementation of the Shamir's secret sharing scheme and Herzberg's proactive secret sharing algorithm. The library uses a port of GNU GMP in order to make multiple precision arithmetic operatio
brutesshd is an application written in c/php in order to prevent bruteforce attacks through ssh. Brutesshd uses iptables/pfctl tools to block this type of attacks
Network Threat Simulation Tool (NTST) will be able to effectively simulate any network security threat including worms, Trojans, spywares, & exploits. It will help in testing the effectiveness of network security devices like IDS/IPS/Firewall.
deface-no-tnx is an anti-defacement system that monitors your Web files and notifies you about unallowed changes. It also replaces the defaced page with a standard "error" page,so that no offensive/joking content can be frauodolently added to your site
Polydish is a polymorphic Internet server capable of accepting pluggable protocols (written in Python or Ruby), and can thereby serve any type of content imaginable. The backend code is a fast, secure, C-based server, employing thread pools and OpenSSL.
sudosh is a sudo shell, filter and can be used as a login shell. Sudosh records all keystrokes and output and can play back the session as just like a VCR.
Iron Bars Shell is a restricted Unix shell. The user can not step out of, nor access files outside the home directory. It is written in C for Linux. No libraries used. It is small, fast, secure. Two ascii configuration files for more control.
ext2hide allows users and administrators to utilize the reserved space of the ext2/3 superblocks to store hidden data on their filesystems, rendering it inaccessible to any normal viewing, yet still residing in permanent storage on disk.
Tomahawk is a command line utility that supports high speeds bidirectional replay (300-750 Mbps) of saved tcpdump(8) files. Tomahawk is great for testing the throughput and blocking capabilities of network-based intrusion prevention
systems (NIPS).
fswatch is a small, simple utility that detects changes in a filesystem. it watches for a file system integrity. it checks inode, links, uid, gid, mode, size, flags, ctime, checksum (SHA1).