Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.
Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
Build an app in Retool
Find Hidden Risks in Windows Task Scheduler
Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
Derived from TrueCrypt 6.3 release, I added some command line options to "TrueCrypt Format.exe" to allow TrueCrypt volumes to be created without using the graphical user interface
Cryptic is a cryptographic applications suite for encryption/decryption of data, calculating cryptographic hashes or message digests and securing user passwords using a master password in a password safe.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Ourmon is a network monitoring and anomaly detection system and displays the data for multiple BPF expressions via RRDTOOL-based graphs. It also helps the user identify various kinds of network anomalies using various flow analysis tools and logging.
Encrypted Message Exchange by using Diffie-Hellman key exchange algorithm and Advanced Encryption Standard(AES) encryption algorithm with Cipher-block chaining(CBC) mode using User Datagram Protocol(UDP)port server-client application in C, Ansi-style
SpaceMonkey is a Web application auditing tool. It can detect bugs or security flaws without using a knowledge database. It uses fault injection technics ('fuzzing') in order to reveal the flaws (SQL injection, XSS, File inclusion, command execution ).
A configurable system for synchronising multiple passwords of different types. Password quality can be imposed by using histories, cracklib based tests, and forcing certain passwords to be distinct. CGI and PAM modules exist for tight integration.
Fight skyrocketing paid media costs by turning your customers into a primary vehicle for acquisition, awareness, and activation with Extole.
The platform's advanced capabilities ensure companies get the most out of their referral programs. Leverage custom events, profiles, and attributes to enable dynamic, audience-specific referral experiences. Use first-party data to tailor customer segment messaging, rewards, and engagement strategies. Use our flexible APIs to build management capabilities and consumer experiences–headlessly or hybrid. We have all the tools you need to build scalable, secure, and high-performing referral programs.
SHA PadLock computes SHA-1 or SHA-256 file checksums using VIA Nano's processors hardware PHE engine. Currently it can only be run on VIA Nano processors (in Samsung NC20 netbook for example) under Windows. It was build using VIA PadLock SDK.
Pidgin-paranoia is a plug-in for Pidgin (formerly known as Gaim) that provides information-theoretically secure encrypted conversations using one-time-pads.
Raiden block cipher: An extremely lightweight and fast block cipher, developed using genetic programming, with the intention to be an alternative to TEA. This cipher is as fast as TEA, and without many of its known weaknesses.
Clam AntiVirus Client Library provides a simple API to the ClamAV daemon. ClamAVC does not require ClamAV to be installed. ClamAVC communicates with clamd using clamd's documented protocol using either TCP or a local Unix domain socket.
Python wrapper around a small subset of the OpenSSL library. Includes: X509 Certificates, SSL Context objects, SSL Connection objects using Python sockets as transport layer. The Connection object wraps all the socket methods and can therefore be use
GNIPS is a network intrusion prevention system for Linux using Snort and iptables. It alerts user of incoming attacks on their network and allows them to block any offending hosts. It's also possible to configure GNIPS to send out alert emails.
Recently, security is becoming a social issue. Security patch of Microsoft was cracked in several days after releasing. This kind of binary cracking is composed by debugging and reverse engineering technique.
Authenticating proxy server software for Mac OS X. The front-end is written in Obj-C using the Cocoa framework, but the actual proxy daemon application is written in C using plain BSD sockets.
Open Legacy Storage Document: Generic Document Archiving on Disk and Network(using MINA) Framework in Java for huge number of docs(up to 2^192 documents), efficient(Java NIO), crypto, net transfert, web retrieve, J2EE and eMail archiving compatible.
stproxy is small, fast and efficient HTTP/SSL proxy, features: high-anonymous, basic http authorization, user management using web interface, asynchronous dns resolver, single-threaded (only one process-thread)
PHP Screw is a PHP script encryption tool. When you are developing a commercial package using PHP, the script can be distributed as encrypted up until just before execution, preserving your intellectual property.
Pseudo Random Number Generator (PRNG) frontend using libtomcrypt. It simply writes pseudorandom data (using sober-128, fortuna, yarrow or rc4 algorithm) on standard output. The output may be encoded to base64, base85 or hex or just left binary.
Figaro's Password Manager (FPM) is a GNOME application that allows you to securely store & categorize your passwords, which are encrypted using the blowfish algorithm. It can launch applications using the host names, user names, and passwords you supply.