Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
MongoDB Atlas runs apps anywhere
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Identityflow provides a framework for building protocol flows that perform distributed Identity operations. Examples of Identity Operations are Single Sign-On (SSO) and Attribute queries.
PFL can either operate as a stand-alone firewall log parser or set up to run and configure ipfw. The major focus is parsing, compressing, and filtering *NIX (to include Mac OSX) firewall logs generated by IPFW for quick and easy admin review.
Originally made to crack /etc/passwd files from *nix utilizing the GPU. Uses GLSL and OpenGL. Acts as a parallel to John the Ripper, but for the GPU. Supports both ATI and nVidia, anywhere OpenGL can run.
PHANTUM - Punch-Hole Access for NAT Traversal of UDP in a Module; Built on top of Samy Kamkar's 'chownat' script, PHANTUM allows for pure client-agnostic TCP services to be tunneled over UDP and hosted behind NAT infrastructures.
WORDFIELD is an extremely fast incremental word list generator. It's meant for use with a password recovery tool such as John the Ripper or aircrack-ng.
It provides fast connections to Linux/Unix hosts over SSH protocol. You don't need to remember the IP address, hostname, login, or password. Just select server from the list and press "Connect".
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
This is an automated, easy to use linux based tool, to keep attackers outside. Based on iptables, developed on ContOS, but also tested on RedHat, Fedora, SuSE (iptables instead of SuSE Firewall). Created by Salcay's Boring Hours.
This project is made with batch scripting. This tool is a virus removal tool that has many tools that are freeware and not opensource in it but for obvious reasons why it's not. It also has a scanning feature have many viruses and Malware.
This is a simple ANSI-C implementation of Triple-DES (as described in NIST Special Publication 800-67.) This implementation also includes an 8-bit version that can be used in microcontrollers with memory constraints.
SSLScan queries SSL services, such as HTTPS, in order to determine the ciphers that are supported. SSLScan is designed to be easy, lean and fast. The output includes prefered ciphers of the SSL service, the certificate and is in Text and XML formats.
A light script to make a black-list system troug iptables. You can create the black-list and manage it troug this program. Please read README file to know better this script.
Pidgin-paranoia is a plug-in for Pidgin (formerly known as Gaim) that provides information-theoretically secure encrypted conversations using one-time-pads.
JMS Assurance Integration Kit (JAIK) is a collection of Java APIs that allows Java developers to transparently incorporate assurance into JMS messages while wrapping JMS connectivity.
VERISIL - Secure Data Deletion Technology And Library ® is perfectly developed and opensource secure data removal library. The name of project is Turkish (means "CLEAN DATA").
VERISIL is developed in delphi, compatible with Lazarus & FreePascal.
This tool provides the same interface as a SiteErrorLog but provides the ability to specify who should receive error emails, what error emails are sent, and extra information to put in the headers of the error emails to provide easier mail filtering.
CF is a Linux/Unix command line utility for editing/managing AES-encrypted text files. Multiple users can edit the same files using their own separate passwords. It supports basic file locking, piping, adding, changing, removing, and listing keys.
NetSlaughter is a GUI for Nmap, Netcat, dsniff and tcpdump.
Runs on Linux and is coded in Java.
In next revisions I wanna make it multiplatform, to run it under Linux and Windows
Power Hasher is a program that allow you to get the hash code of multiple files at once, and export the results to a file, making easy for this file to be imported and the files checked. Currently it supports MD5, SHA1, SHA256, SHA384 and SHA512.
LibIDMEF is an implementation of the Internet Engineering Task Force (IETF), Intrusion Detection Exchange Format Charter Working Group (IDWG), draft standard Intrusion Detection Message Exchange Format (IDMEF) protocol.