Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Try Auth0 for Free
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
This project is aimed to provide good support of smartcard readers for Linux/Unix users. In contrast to MUSCLE we try to implement our drivers as
portable as possible and currently focus on Towitoko drives.
A replacement to traditional syslog daemons. Including cryptographic log protection, mysql, postgresql. Supported on Linux, BSD, Irix, Solaris and AIX.
OpenSST (Open Simple Secure Transaction) is a project to create a simple security protocol for making transaction between (un)trusted parties. The project includes a protocol design specification and a cross-platform software implementation of the speci
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
A filtering proxy which processes HTTP- and HTML-traffic to enhance
the security: Remove javascript calls, check document types, remove
client infos (operating system, browser version)
A gpg crypto module for apache. This is an add-on module for the popular apache webserver to provide gpg functionality to web pages via an xmlrpc interface.
sechk - SEcurity CHecKer
It is a powerful and useful tool to check if you got exploited and rooted, it will use checksum comparation via md5 sum, it exchanges file lists and csums from the sechk server. It\'s gonna work with all posixes and unixes.
Syslog-sec, provides an open secure syslogd implementation based on (RFC) standards, including rfc3164 ("syslog") and the upcoming "syslog-sign" . Other extensions, will/can be added. More tools will be added, too
Open Source Stenography engine usable from the command line. Uses various techniques for hiding and retriving stenographic information. Includes a small image analysis suite for detecting stenographic images.
bns is a network simulator.
You can create a complete network, add services to host, ... It can be usefull to study network behavior, make presentations, learn hacking techniques, ...
The X Supervisor Extension is a patch for the popular XFree86 X server to make X11 forwarding with openSSH safer when the remote host can not be trusted.
Project aims to develop an Apache HTTP Server module that implements the WS-Security specification. It will enable the Apache HTTP Server to identify SOAP messages that include WS-Security information and thereby check security credentials.
The NEO Project uses the NEO-c (Network Exchange Operation for Charity) platform to participate in various computing challenges and projects, and donates any winnings to the charities specified by its users.
PKS is an OpenPGP Public Key Server. It allows users to store and lookup public keys from the server's database. It can also synchronize with other servers. (This product includes software developed by Marc Horowitz.)
A linux kernel module and supporting user space environment which allow interception and modifying system calls that match user defined criteria. Think of it as strace on steroids.
SWATT (Secure Wargame AdminisTration Tool) Is a program designed for wargames in order to allow a secure remote backdoor, to prevent from getting locked out in a critical moment.
Secure locate provides a secure way to index and quickly search for files on your system. It will also check file permissions and ownership so that users will not see files they do not have access to.