Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Try Auth0 for Free
Train ML Models With SQL You Already Know
BigQuery automates data prep, analysis, and predictions with built-in AI assistance.
Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
ThorsenCode is a client-server system, that allows you and your buddies to share files in a safe way. It features encrypted filetransfers and encrypted chatrooms.
Saint Lawless is a pentetration toolkit. It will be part Cheops and part Nessus with an isometric game-like GUI. Saint Lawless will attempt to gain as much information about a network environment with the least amount of probes. Saint Lawless will also
Packet Flood Generator as the name stands is a projet to produce a
threaded traffic generator program, it has support for generating IP, TCP , UDP, ICMP and IGMP packets, also has as feature to keep the connection up.
Ariesbot, is an ircbot, which will be able of doing basic bot functions such as op/deop/kick/ban/moderate. Plus being able to Wu-Ftpd scans, cgi/php scans port scans, subnet scans and scan for vuln version of apache to nosejob.c.
ISO 17799 - Code of practice for information security management. Creation of methodology and documentation for audit adapted to ISO. One is made up of an introduction on general aspects of the security of the information.
Track all IP/TCP, IP/UDP, NetBeui, IPX/SPX connections and ARP/RARP traffic. Optionally save connections in MySQL database. Implement http server so you can view connections with web browser or GTK client. Can send fake ARP reply and kill TCP connection
Nift - (Network Intrusion Footprinting Tool) is graphical front-end (written in gtk+) for footprinting tools and methods already freely avaliable. It's purpose is to aid sys-admins in securing their site by allowing them to quickly check their network
A number of tools to enhance management/coding of NFR (http://www.nfr.net) IDA, and various other admin tools that can be used for both NFR and hand coding other appliance scripts.
Perl Secure Conf (PSC) is a suid C program which reads a protected configuration file (containing passwords, secret data, whatever) and then drops its privilege. Now, in unpriviledged mode PSC execs a perl
script, leaving a handle to the protected conf.
The E language is an open-source object-oriented langauge for secure
distributed computation. We are currently hosted on our own sourceforge setup at: http://bugs.sieve.net/projects/e-lang
SecureVNC is a development/add-on to the TridiaVNC sourcecode base which provides strong authentication, strong symmetric encryption, and fewer security vulnerabilities than existing VNC implementations.
ISP Controller is a project aimed at designing a complete sollution for a ISP-wide management system. Basically, we want the use to be able to configure any daemon, on any machine, using a central PHP/Apache backend.
Moses is a remote administration tool for the Win32 platform. No client is needed. The server connects to an IRC server, in which commands are given via private messages. There is basic password authentication, but it needs to be worked on. Download t
The purpose of this project is to develop and maintain a Virtual Reality network interface to provide for network management and security for heterogenous networks of all types.
This interface will allow you to monitor and actively scan your network.
Immune Security Architecture For your Enterprise --
Host-Based Intrusion detection for UNIX based systems, at the process level.
Detect changes in the normal behavior of processes, advanced features to detect Buffer Overflows.
A peer-to-peer chat program that uses public key encryption (via Gnu Privacy Guard) to keep your conversations from the eyes of packet sniffers (*Cough* Carnivore *Cough*)
Sportal is made for people that need to know what is going on in their systems. It monitors files that you select, for "hot words" that you also select, through a graphical interface.This is work in progress, i spect it to grown to a full IDS.
We at GCD are here to bring you ease in decoding your friends CRYPTIC GeekCode .signature files -=). Also sometime in the future we plan to eventualy start an ENCODER to help you even more!
CSI PC2 is a project for verification and identification of biometrical information that scales up to tens of millions of entries. Several algorithms are implemented. It includes testbeds, benchmarks and genetic algorithms for optimization.