Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Start Free
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
AirSnort is a wireless LAN (WLAN) tool which cracks encryption keys on 802.11b WEP networks. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.
The Intrusion Detection Exchange Protocol (IDXP) is an application-layer protocol for exchanging data between intrusion detection entities. IDXP-Java is a Java-based implementation based upon the Java BEEP Core implementation of RFC 3080 / RFC 3081.
MotionView consist of a set of utilities for motion (http://motion.sf.net).
XMotion is a graphical interface which supports viewing the pictures captured (via FTP or local file system) and the interactive configuration using the XML-RPC protocol.
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Role Manager is a security management framework based on the NIST model for Role Based Access Control (RBAC) and the Java[TM] 2 Platform security standards. The access control policies and the RBAC Model are implemented using the RBAC profile of XACML.
netleak is a collection of small perlscripts that detects connectivity between network segments. It is mostly useful to detect "leaks" in large organizations that have private network segments physically separated from the Internet.
SharedSecret is a program used to negotiate a shared secret (password) by two hosts in secure way over the Internet. The software is written in C, based on client/server architecture with initial intention to run on POSIX-Compliant Operating Systems.
Sentry Firewall CD-ROM is a Linux-based bootable CD-ROM suitable for use as an inexpensive and easy to maintain Firewall or IDS Node. The system is designed to be immediately configurable for a variety of different operating environments via a config fil
myPGP is an experimental PGP clone. It can be used to encrypt, decrypt and sign messages in a public key system, as well as to manage the keyrings. It's main goal is to fully implement the standard OpenPGP.
The WOLKs are stable and development kernels, containing many useful patches from
many projects. Goal: Stability, Scalability, Performance and most important: Security.
A collection of PHP scripts for both new web designers who just want to get a page up, and experienced php programmers who want to take the easy way out.
Telescan is a full featured, multithreaded war dialer written in C for Linux. It can log its activity and carrier information to a database, in which detailed reports can be run regarding activity.
This project allows placing rules into an iptables based policy, and having these rules expire after a set time. This is useful for opening ports after successful port knocking, or for blocking source IPs using port sentry.
JHoney is a honeypot tool for Linux written in Java. It simulates vulnerable net services to trick an attacker or trojan to attack them. The attacker IP is blocked once a service is attacked, and then the intruder cannot attack for example webservers.
A shell script which determines by brute force the best compression format (bzip2, gzip, Z, zip, etc.) and which compression level to use in order to archive a file the smallest possible.
This project aims at producing an efficient P2P client for the sharing of contents in anonymous / secure manner, using the latest techniques in peer protocols such as anonymisation, load balancing, gridstorage.(See news below for current project status)
OpenFIM is an implementation of the authentication process involved in Federated Identity Management using secure SOAP. The server software has been developed using MySQL and PHP. The client software has been implemented in PHP, Java, .NET, and Perl.
Netpoison is a tool, written in perl, which can poison a whole network. It can trick the router into redirecting the traffic to a specific MAC address.
Log common Windows trojan attempts (and optionally emulate the trojan).
*This project is not actively maintained, and the software is of little use today.*