Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform.
Geographic restrictions, eligibility, and terms apply.
Get started with Nexo.
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
sectar: a program that creates encrypted tape archives(tar files), using the AES algorithm Rijndael. Encryption exported under exemption TSU 740.13.
Was star, now sectar.
An API and test suite, or possibly an application unto itself, to manage keys and allow mail user agents (such as pine or mutt) to use encryption and authentication systems (such as S/MIME) via the services of external encryption suites (such as OpenSSL)
iSSL is a minimalistic cryptographical API that uses the ciphers RSA and AES to establish SSL-alike, secure encrypted
communications between two peers communicating through a network socket, including session key generation and public key exchange.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Dave's Naughty Stuff Blocker. This is an open source solution to allow administrators to filter and redirect selected "inappropriate" sites based on a list of specific sites and/or strings.
This is an add on for the Linux Kernel Patch named Medusa DS9 developed by Marek Zelem, Milan Pikula, and Martin Ockajak. This program will activate and deactivate medusa protections securely. Medusa is at http://medusa.fornax.sk/
kkp is a security tool based on a vulnerability in handling of the NetBIOS protocol by the Microsoft Windows 9x platform. It is meant to be the most reliable and efficient tool for this use. It has been tested on POSIX, and might work under Win32.
Linids is a modular, highly configurable, network IDS.
Almost stateful and soon to be able to connect to a management server (different agents).
Linids is rulebased (passive filters) and has active filters (portscan detection etc).
SMSID provides a Linux PAM that allows the use of a GSM cellular phone with SMS capabilities as a hardware token in a strong authentication system.
In addition to the Linux PAM module, an extensible SMS server is included. This server is written in Java
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
gpkcs11 is an free implementation of the PKCS#11 Interface standard for cryptographics token. It includes one software-only token and will aid in writing support for hardware token. It also includes a test suite that will be extended to serve as a compreh
Buffer0verfl0w Security is a team of skilled security developers, who are
authoring security applications, whitepapers, and discovering security flaws in
software, publicly disclosing their projects and encouraging volunteers to help improving them.
A peer-to-peer chat program that uses public key encryption (via Gnu Privacy Guard) to keep your conversations from the eyes of packet sniffers (*Cough* Carnivore *Cough*)
Enkript is an user-friendly file ciphering program. It uses the popular algorithms MD5 and IDEA (used in PGP, for example). It detects automatically whether to encrypt or decrypt the given file, and badly deciphered files.
Bypass is an IP forwarding/tunneling tool which can be used where limited bypassing of a firewall is necessary, but relaxing the restrictions in the actual firewall is not an option. The aim is for bypass to be automatic and transparent.
hping2 is an interactive packet costructor and responses analyzer that uses the same CLI of the ping program (but with a lot of extensions). It can be used to performs a lot of tasks, like testing of firewall rules, (spoofed) port scanning, et cetera.
Fastspy is a multithreaded network port scanner. It minimizes connection idle time performing fast subnet service search, classic port range scan, hosts list scan, and also send user data over a connection to log servers response.
artraced is a multithreaded traceroute detector.
It reveals the tracing ip and hostname. If in promiscuous mode it reveals all incoming traceroute attempts to any workstation on its subnet.
Run as daemonize (-d ) if specified in command line.
Sportal is made for people that need to know what is going on in their systems. It monitors files that you select, for "hot words" that you also select, through a graphical interface.This is work in progress, i spect it to grown to a full IDS.
We at GCD are here to bring you ease in decoding your friends CRYPTIC GeekCode .signature files -=). Also sometime in the future we plan to eventualy start an ENCODER to help you even more!
A perl server that accepts plain text mails for users and sends them out encrypted. Could be used in a company so that your accountant can be in contact with the salerperson in a secure way, without you needing to tell the accountant everything about PGP
The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide
Smack is the the Simplified Mandatory Access Control Kernel.
Smack is a kernel based implementation of mandatory access
control that includes simplicity in its primary design goals.