With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
$300 in Free Credit Towards Top Cloud Services
Build VMs, containers, AI, databases, storage—all in one place.
Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
...By addressing network limitations and CPU limitations significant throughput performance can be realized. Gains of close to two orders of magnitude are possible on long fat network paths.
The official git repo is now available at http://github.com/rapier1/openssh-portable. The Sourceforge repository should not be seen as the canonical repository for HPN-SSH. We will update it as we can but users should look to github to generate patches
We also support Ubuntu packages. Add them to your package manager with
`sudo add-apt-repository ppa:rapier1/hpnssh`
Fedora RPMs can be added with, `sudo dnf copr enable rapier1/hpnssh`
FIDO2 USB token optimized for security, extensibility, and style
...The main implementation is for STM32L432, but it is easily portable. For development no hardware is needed, it also runs as a standalone application for Windows, Linux, and Mac OSX. If you like (or want to learn) hardware instead, you can run the firmware on the NUCLEO-L432KC development board.
virgo-steganography
Hidding any binary flle < 64k in image
Require opencv on ubuntu, osx and android tested on Nougat (OpenCV Manager 3.0) armeabi
To embed (output file name is o.png)
./embed image-file binary-file
To extract
./extract steganography-file
Compiled and run on os x, ubuntu, windows and android
Most beautiful ratio image/binary 3MBytes/64KBytes
https://www.youtube.com/watch?v=U--p5WoZ1mU
|
|
PLEASE NOTE: this project has MOVED to https://github.com/mpeylo/cmpossl
|
|
An implementation of the Certificate Management Protocol (CMP) version 2, defined in RFC 4210, 4211, and 6712.
This git branch of OpenSSL provides an RFC compliant implementation including a CMP client CLI.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
OMEN is a Markov model-based password guesser written in C. It generates password candidates according to their occurrence probabilities, i.e., it outputs most likely passwords first. OMEN significantly improves guessing speed over existing proposals. If you are interested in the details on how OMEN improves on existing Markov model-based password guessing approaches, please refer to OMEN: Faster Password Guessing Using an Ordered Markov Enumerator. OMEN consists of two separate program...
...It offers multiple scan engines, Net shield, Firewall, On access, on Exec scanner and rootkits preventions plus features from Commercial Antivirus applications.
Also visit TWERT, our sister project, allowing scheduled domain and process blocking with Windows, Linux, OSX installers at https://sourceforge.net/projects/twert/
The doorman guards the door of a server, manipulating firewall rules to admit only recognized parties.
Allows Silent Running - a server with all ports CLOSED.
Linux-BSD-OSX server & client; C source & docs + Windows client binary. GPL.
The TeleAuth Client Tools are a set of Unix tools for the TeleAuth two-factor / two-channel authentication system (http://www.teleauth.com). This includes a commandline client and a set of PAM modules. Written in Perl and C for Linux, OSX and Solaris.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.