Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
$300 in Free Credit Towards Top Cloud Services
Build VMs, containers, AI, databases, storage—all in one place.
Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
mod_antihak is an Apache Module designed to eliminate the CodeRed and Nimda
worm\'s network bandwidth consumption. We're working to make
it as easy as writing a line of text to add more worms! :)
GAIM encryption plugin using GPG (PGP clone). It works transparently and smoothly. Automatically establishes secure conversations with other enabled users, passes keys (if enabled) and eventually will allow you to specify your own keys to use.
Open Source file encryption, written to learn about cryptograpy, programming, etc. And hopefully come up with some new encryption techniques that might benefit the public.
Trace2ip is to hold one trace of all connections IP, memory the information into the file. The file to have like unique key ip_source and like associate data header IP. Alternative Key:Audit, Trace, Monitor, Dump, IP.
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
A project to provide a GUI toolkit to facilitate (and where possible, automate) the breaking of classical (pen-and-paper) cryptosystems. Initial focus is on the cryptanalysis of monoalphabetic substitution ciphers.
Prelude is an Hybrid Intrusion Detection system. It is composed of differents sensors and of a Manager. Currently distributed is an NIDS sensor. the Manager is for reporting attacks in an user readable form. Prelude is completly modulable and distributed.
Blaster Scan is a TCP port scanner. It can extract users exploiting vrfy or expn, check anonymous access on FTP, check brute force on FTP and POP3, extract daemons\' versions, and scan for CGI bugs. It also has a SYN port scan, the ability to ping hosts t
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
This program is an automated administration tool that allows stranger (or worse, your friends) to connect to you host and create user accounts in a secure manner.
ISP Controller is a project aimed at designing a complete sollution for a ISP-wide management system. Basically, we want the use to be able to configure any daemon, on any machine, using a central PHP/Apache backend.
Sidecar is a Kerberos authentication utility used at Cornell University and several other universities. This project is designing a secure GTK+/Gnome utility that is functionally equivalent to the Windows/Mac versions.
The newssnarf software is a sample extension of the popular "dsniff" package in that it will automatically track and log NNTP connections by USENET group and article number.
SecureVNC is a development/add-on to the TridiaVNC sourcecode base which provides strong authentication, strong symmetric encryption, and fewer security vulnerabilities than existing VNC implementations.
This is intended for those lazy security administrators that are tired of wasting their time doing the same things over and over again. This will make your life *much* easier!
checkps is a program to detect rootkits by detecting falsified output and
similar anolomies. The ps check should work on anything with /proc, the
(currently incomplete) netstat check is more linux specific
a *simple* libpcap program that dumps network packets in a variety of formats. If you are a programmer, this is a good starting point for you to build your own programs.
[NOTE: In the CVS repository there is a version with *alot* of features added]
This is a project that simulates the German Military Enigma machine during WWII.. It is a project for beginers to learn to program and to meet people. If anyone is interested in helping, please email me @ dustin@rockhill.org
BFBTester is great for doing quick, proactive, security checks of binary programs. BFBTester will perform checks of single and multiple argument command line overflows and environment variable overflows. Versions 2.0-BETA and higher can also watch for tem
The purpose of this project is to develop and maintain a Virtual Reality network interface to provide for network management and security for heterogenous networks of all types.
This interface will allow you to monitor and actively scan your network.
Immune Security Architecture For your Enterprise --
Host-Based Intrusion detection for UNIX based systems, at the process level.
Detect changes in the normal behavior of processes, advanced features to detect Buffer Overflows.