Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
A Simple Middlebox Configuration Protocol (RFC 4540) implementation for Linux.
SIMCO is a signaling protocol that can be used by applications (such as SIP B2BUAs) to dynamically control firewalls and Network Address Translators (NATs).
This project is an open source linux-based router with highly advanced features. It has very sophisticated and state of the art routing , firewalling and security capabilities.
PULSE provides the basis for, and a working example of, a modular,
dynamic and user-centric security environment for Linux. The Linux Security Modules interface provides mandatory enforcement of security policy, as specified by user-space components.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Raksha is an open source platform for hardware dynamic information flow tracking (DIFT). The project encompasses a full open source SPARC V8 CPU for use on an FPGA, a modified Linux 2.6 kernel, and Gentoo.
A dynamically loadable binary object for the linux security framework PAM.
Bluepam is an extension for the common pam modules, give the user the ability for authenticaten via a bluetooth compatible devices (e.g. cell phones).
Checking the integrity of a file on a remote and local untrusted or compromised server is to be achieved with minimal computational and storage requirements on part of a healthy verifier.
Wargame Hackademic est un ensemble de composants à ajouter sur un liveCD linux, devenant un wargame; à partir d'un compte classique, vous devez, par divers objectifs et techniques d'exploitation, trouver les failles du cd pour accéder au mode 'su'
Open-source tool for Linux that can be used as part of live information gathering during an incident response to allow for after the fact in depth analysis of the running system.
USBKey is an attempt to provide 2 factor authentication for Linux systems
1) What the user has
2) What the user knows
A USB drive (uniquely identified by a vendor id and product id) should be inserted for a particular user to authenticate
openssl is well-known allover the world,but it is huge,complex.our target is develop a tinytls,it is small,simple,good understanding,and usually for embedded system.But it can support most openssl features.You can add some other features easily.
Lrzip is a lossless compression application designed to scale with modern hardware resources using a variety of different back end compression algorithms with the ability to have unlimited size compression windows and optional high grade encryption. The larger the file the better the compression possible and the more powerful the hardware the faster it can compress with a heavily multithreaded design.
Usb-Defensor is a cross-platform USB-Disk encrypt solution. It can be used to encrypt the whole USB-Disk. There is no different between common USB-Disk and encrypted(Usb-Defensor) USB-Disk in opterating.
Huskarl is an alternative authentication and key exchange schema for Bluetooth devices.Huskarl produces secure shared link keys between two devices using public key cryptography.
NetBox is a software programmed in C for testing vulnerabilities in the network. Using this software you can attack your network using a combination of differents known attacks (ARP or DNS Spoofing, MITM, ...) and detect bugs of security.
pam-openvpn is a Linux PAM-module which works together with OpenVPN. With this pam-module it is possible to establish vpn connections when a user logs into a system and tear down the connection when the user logs off. This is ideal for mobile systems.
Tulihänd is a security tool that aims to protect files on a filesystem. It collects information about them and compares with a specification in order to highlight modifications.