Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
This project is intended to provide a means by which one can insert data other than packet data into the snort/ACID IDS system.
We have scrapped the perl version - since some systems don't have perl - or don't have the ram, cpu or diskspace to run the ho
E-Dot (which means Encryption and Decryption Of Texts) is a very small tool for encrypting textfiles. E-Dot doesn't use Keyfiles: A password is enough. This tool is available for Linux and Windows, too.
A client/server application designed to let the user monitor a directory
tree on a remote machine by creating snapshots of current file status in order
to later detect file modification, addition and/or removal.
Komoku implements an intrusion detection system using embedded system. Unlike other integrity tools, as tripwire, it does not rely on the operating system. The IDS is actually implemented in an INtel EBSA-285 board.
The main idea behind the Security tool is to analize
network traffic, packets and maybe configuration errors (something like SATAN).
Intended platform is Linux. I'm seeking help to write this tool
from scratch, maybe with a GUI under kde. The textmod
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Secure local and Network based authentication using pluggable backends which provide authentication and user/groupnames, uidmappings, tokensupport and the lot.
Yavipind is a secure tunnel aka 2 peers securely forwarding
packets toward each other.It is what most people calls a VPN (virtual private
network).
It forwards any kind ofpacket (IPv4, IPv6 or other) sent over the virtual
network interface (e.g. t
A RTLinux X10 CM11 Driver using RT_COM. Plan on having a configuration file for input and control. In addition, plan on having output via HTML/CGI. Possibly have some control items via the web page.
Remote Access Session is a security tool to analyze the integrity of systems. The program tries to gain access to a system using the most advanced tecniques of remote intrusion. It lets to work on normal mode (fast) and hard mode (more intensive).
Nift - (Network Intrusion Footprinting Tool) is graphical front-end (written in gtk+) for footprinting tools and methods already freely avaliable. It's purpose is to aid sys-admins in securing their site by allowing them to quickly check their network
A number of tools to enhance management/coding of NFR (http://www.nfr.net) IDA, and various other admin tools that can be used for both NFR and hand coding other appliance scripts.
Firestorm is an extremely high performance network intrusion detection
system (NIDS). At the moment it just a sensor but plans are to include
real support for analysis, reporting, remote console and on-the-fly
sensor configuration. It is fully pluggab
A lightweight (distributed?) network security monitor for TCP/IP+Ethernet LANs. It will capture certain network events and record them in a relational database. The recorded data will be available for analysis through a CGI based interface.
dkbf is a distributed, keyboard, brute-force program for Linux clusters that attacks Windows NT Lanman and NT hashes using the Message Passing Interface (MPI).
yafingerd is a new concept in finger daemons. Created with security in mind, if offers various features that makes it the best choice for security, without loosing features that one might want.
Fully tested on AIX, Linux, Solaris and FreeBSD.
The Hackers Lab is aimed to provide hackers, system audits, system and server and network administrators with applications to secure their own servers.
Perl Secure Conf (PSC) is a suid C program which reads a protected configuration file (containing passwords, secret data, whatever) and then drops its privilege. Now, in unpriviledged mode PSC execs a perl
script, leaving a handle to the protected conf.
This project will provide a library for using the AES round 3 cipher candidates (Mars, RC6, Rijndael, Serpent, and Twofish) in an easy to use API. Support for MD5, SHA.
Noid is a system for controlling the environment of individual processes in a Unix system. Today, it can provide per-process namespaces and disable suid/sgid under Linux 2.4. This project has moved. See the homepage for information, file releases and news
IMPORTANT -- This is an old project that is no longer supported and should not be relied upon for serious applications. If your looking for encryption software, I suggest OpenSSL or GnuPG which are better equipped.