Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Jumping Spider is a privacy tool to insure that files in a certain computer are free from sensitive and private data. This project still in the pre-alpha phase.
This is where web developers can get tools that can make their life easier. Web technologies and languages used contain but are not limited to HTML, XHTML, CSS, JavaScript, PHP, and AJAX. All code is extremely slim, fast running, and is W3C compliant.
Commons-SSH is a thin bridge between different Java SSH implementations libraries. It doesn't contain any crypto-related code and created to be used by projects who doesn't want to care about export control regulations (let client to decide)
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
A Firefox tutorial add-on for adult absolute beginners, to provide information on and to build up understanding of the threats and features of the web. Suggestions to security plugins, links to web howto's. Includes basic navigation help.
Nipper (Network Infrastructure Parser) open source tools to assist IT professionals with the configuration, auditing and managing of computer networks and network infrastructure devices.
This project provides a java implementation of the Captcha project ( see http://www.captcha.net ). A CAPTCHA is a program that can generate and grade tests that: -Most humans can pass. -Current computer programs can't pass.
Jalapa is an extension to the security model of Java, that allows for specifying, analysing and enforcing history-based usage policies. Programmers can sandbox an untrusted piece of code with a policy, enforced at run-time through its local scope.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
exploit.co.il Vulnerable Web app designed as a learning platform to test various SQL injection Techniques This is a fully functional web site with a content management system based on fckeditor. You can download it as sourcecode or a pre configured
Amnesia is a design-rich 'host-proof' web application that encrypts and remembers all sorts of personal information from passwords to private notes. Project now hosted at Google Code: https://code.google.com/p/amnesia-app/
IncrediBL is a project that aims to provide a respected and accountable DNSBL service for various communication systems like IRC and e-mail. The code is primarily used by the IncrediBL service itself, but it can also be used to create a separate DNSBL.
BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
Finds Text in Delphi *.Pas files e.g. : button1.caption:='Hello'
Replaces Text with a function call button1.caption:=TXT(0) {##Hello##}
Generates a function „TXT“ with a String List with all found Texts at the beginning of your source.
Computer Security Model Implementations for Computer Science Graduate Students and Researchers. Implementations include the Take-Grant Protection System and a Self-Organized Critical (SOC) Lattice Model for malware behavior.
SLEncrypt is a python module for encryption with 11 ciphers at the moment, including ADFGVX, Autokey, Caesar/ROT13, Vigenere, XOR and a lot more. It contains functions allowing you to easily encrypt/decrypt files. The code is about 95% PEP 8 compilant.
PHP security system that protect your web applications adding on your source ONLY ONE LINE OF CODE! Administrators can manage policies, authentication and authorisation for as many users and groups, all through a single and intuitive Ajax based interface
Orizon is a framework intended to provide tools and facilities to test java sources for security flaws. The main goal is to detect common threats as described in Owasp top 10 vulnerability document.
An easy-to-use generator for large numbers of passwords.
Originally for my school's IT Department, I have now released the sourcecode under the GNU GPL. It supports the random generation of huge numbers of passwords that can be determined in a variety of ways.
Powerfuzzer is a highly automated web fuzzer based on many other Open Source fuzzers available (incl. cfuzzer, fuzzled, fuzzer.pl, jbrofuzz, webscarab, wapiti, Socket Fuzzer). It can detect XSS, Injections (SQL, LDAP, commands, code, XPATH) and other
Computer chess engine written using Qt4, which works under Knights, Jose, Arena and other chess board GUI games. Uses bitboard game representation and alpha beta brute-force search to analyse chess positions.