9 programs for "module" with 2 filters applied:

  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Is your data on the dark web? Scan free now Icon
    Is your data on the dark web? Scan free now

    Instantly find out if your data has been exposed on dark web forums, black market, leak sites, or Telegram channels.

    With SOCRadar Labs’s Dark Web Report, instantly find out if your data has been exposed on dark web forums, black market, leak sites, or Telegram channels. SOCRadar gives you instant access to the dark web findings of your organization assets in the Free Dark Web Report. Don’t be intimidated by what you see in our free Dark Web report! You can use SOCRadar for free for 1 year and get relevant intelligence that will keep you one step ahead of threat actors.
    Learn More
  • 1
    pam_mount module
    pam_mount is a Pluggable Authentication Module that can mount volumes for a user session (login). Supports mounting local filesystems of any kind the normal mount utility supports, with extra code to better support CIFS, FUSE, various crypto, and more.
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    PAM module which permits authentication for arbitrary services via ssh-agent. Written with sudo in mind, but like any auth PAM module, can be used for for many purposes.
    Leader badge
    Downloads: 167 This Week
    Last Update:
    See Project
  • 3
    myAuxiliary.rb

    myAuxiliary.rb

    msf post-exploitation auxiliary module

    This auxiliary module needs [metasploit] framework installed.. This module its a metasploit post-exploitation (after the targets get's exploited) auxiliary script, so we need to exploit a target first in order to use it. Affected platforms: Windows OS (all versions above windows vista) Read my WIKI for further info: https://sourceforge.net/p/myauxiliarymete/wiki/Home/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    PAM/NSS module to use OS/400 (AS/400|iSeries) userinformation und password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Secure remote access solution to your private network, in the cloud or on-prem. Icon
    Secure remote access solution to your private network, in the cloud or on-prem.

    Deliver secure remote access with OpenVPN.

    OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
    Get started — no credit card required.
  • 5
    pamtester is a tiny utility program to test the pluggable authentication modules (PAM) facility, specifically designed to help PAM module authors to intensively test their own modules.
    Leader badge
    Downloads: 54 This Week
    Last Update:
    See Project
  • 6
    This application allows you to capture the logging messages about network activity from your Linksys cable/DSL modem routers and store it in a database. The beginings of a PHP web based front end is also included as a separate module.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Apache module and patches to OpenSSL & modssl to support Kerberos authentication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    RotNN is a Python module that implements rotation encryption/obfuscation. The default action is similar to rot-13, but it can also rotate over the entire UNIX printable character set.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    BP-Sim

    BP-Sim

    EFT simulator

    ... transaction load up to 2000 TPS. BP-Sim HSM module provides an adequate TCP/IP simulation of the Thales Hardware Security Mod. BP-SeeEMV simulates the steps involved in an EMV transaction that take place in the EMV terminal and the Issuer Server (when conducted online). Module can process a transaction one step at a time in step-by-step mode or to certain break-point.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Monitor the status and performance of any IT environment with NMIS Icon
    Monitor the status and performance of any IT environment with NMIS

    NMIS monitors an organization’s IT environment, helps identify and rectify faults, and provides valuable information for IT planning.

    Trusted by thousands of IT teams worldwide, The NMIS platform offers comprehensive network management, handling faults, performance, and configurations with ease.
    Get a Free Trial
  • Previous
  • You're on page 1
  • Next