Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Go From AI Idea to AI App Fast
One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Krome Shield is designed to fool remote fingerprinting tools (using ICMP & TCP), making them think you're running a different OS. It runs under Linux, using the netlink device and ipchains. In the future it will act like an IDS too, detecting attacks a
bcrypt is a lightweight blowfish file encryption utility which aims for cross-platform portability of not only the actual code, but the encrypted files as well. In addition to providing 448-bit encryption, bcrypt overwrites input files with random garbage
Python OpenSSL Wrappers(POW), a Python wrapper for OpenSSL. X590v3 and CRL encoding is now also support is now via a pure Python module, which will include support for PKCS in the near future.
Packet Flood Generator as the name stands is a projet to produce a
threaded traffic generator program, it has support for generating IP, TCP , UDP, ICMP and IGMP packets, also has as feature to keep the connection up.
Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure
Native application identity and user-based security for your Azure cloud
Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
ProSum is a terminal based program that protects your files, sys_call_table and IDT like tripwire way (All in user space, without kernel modules) In addition, database with files etc. could be encrypted with Blowfish algorythm and more.
This project is to create a system for secure remote administration of a unix server from a variety of different operating systems (eg unix and windows).
Ariesbot, is an ircbot, which will be able of doing basic bot functions such as op/deop/kick/ban/moderate. Plus being able to Wu-Ftpd scans, cgi/php scans port scans, subnet scans and scan for vuln version of apache to nosejob.c.
The IP Personality project is a patch to the Linux kernels that adds netfilter features: it enables the emulation of other OSes at the network level, thus fooling remote OS detection tools such as nmap that rely on network fingerprinting.
libnwrap - a library of network function wrappers that provides a simple and clear yet powerfull enough API for UNIX network programming. It targets ease of use, protocol independence, reentrancy, thread-safety, as well as built-in cryptograpy
chruid is a small but flexible replacement for a chroot + su kombo. i wrote it because i was in the need to chroot processes and having them run under a non-privileged uid/gid without having to install su (which would include pam, nss, ... overhead on som
Track all IP/TCP, IP/UDP, NetBeui, IPX/SPX connections and ARP/RARP traffic. Optionally save connections in MySQL database. Implement http server so you can view connections with web browser or GTK client. Can send fake ARP reply and kill TCP connection
CuteFTP Password Recovery (cutepr) is a small utility that recovers passwords stored in CuteFTP's database, sm.dat. Sometimes users store the passwords, and then forget them. This utility searches through the database and displays all the site informati
This program allow you to extract files from network traffic under HTTP and FTP protocols. It should permit you to see, for instance, using an antivirus on the files, if a machine of your network have downloaded a virus.
The goal of the project is to build a framework to allow Astaro firewall users to install optional software packages on their firewalls. (Astaro is a Linux-based firewall available from www.astaro.com.) Such a framework includes a package-management syst
linsnoop is a unix98-terminal (ptmx) sniffer. Is used to observe a shells input/output. It can be used to observe users, also as keyboard sniffer...
Be careful - the module is able to steal passwords!
ISO 17799 - Code of practice for information security management. Creation of methodology and documentation for audit adapted to ISO. One is made up of an introduction on general aspects of the security of the information.
SysK allows to crypt text by using system informations calculate the algorithm.
For each user,the crypt algo will be different.
It's written in C language for Linux x86.
The objective is to allows it to crypt streams, binaries and more.