Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
Start Free Trial
Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure
Native application identity and user-based security for your Azure cloud
Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
A Secure Diary Program written in Java and using the bouncycastle JCE Cryptograpic library. It uses a combination of BlowFish and TripleDES (XORed) to encrypt Diary entries.
Peer Agent is a system that enable a group of users to carry out automated complex interaction via email services without relying on a trusted third party.
Verifier is a file verification utility that supports the major file checksum formats such as SFV and MD5 sums. It also has native support for the new VerifyXML format, as well as a built-in interactive hash and checksum calculator.
Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
PMVAdmin is network managment software designed for use with Linux servers. Features include user/group managment, login scripts, authentication, printer managment and a directory service.
Combined coded remote-administrative service with SSL secure port scan, anonymous routing and third-party plugin inbuilt for quick and automatic "scan and install" process. Easy to use and will work under firewalls and up to 1024 bit strong cipher
Awesum is an automated graphical checksum verification utility written in Python using the PyGTK toolkit. It currently supports both MD5 and SHA checksums.
Chaosreader is a freeware tool to fetch application data from snoop or tcpdump logs. Supported protocols include TCP, UDP, IPv4, IPv6, ICMP, telnet, FTP, HTTP, SMTP, IRC, X11, VNC, ...
sfick (pronounced as "s-fick") is a two part software system whose function is to assist system administrators with the process of verifying the integrity of critical files. Given a system compromise, system administrators must be able to verify the integ
Shoki is a free, open source network intrusion detection system. The fundamental design goals are simplicity and modularity, and the focus is on traffic analysis rather than content inspection.
Live Security/Forensics Linux Distribution, built from scratch and packed full of tools useful for vulnerability analysis, penetration tests, and forensic analysis.
OSA::net project main goal is to create an extensible, scalable framework for management of security related devices in middle-sized and large computer networks.
ThreatMan is an IDMEF compliant threat manager application which makes use of a multi-tier architecture.
It aims in event and vulnerability correlation from alerts sent by IDSs, firewalls and other IDMEF compliant applications.
The John Darm project aims at developping a software that can tests a brute force attack on weak UNIX passwords. It s a multi-client application that dispatches the calculations between the different clients.
sntm is a Qt based GUI snort monitor. Currently, it is capable of monitoring
multiple snort sensors in a centralized monitor screen. Each snort sensor
creates a SSL encrypted communication thread to connect to the moniter server.
P.A.T.H is a collection of tools for inspecting and hijacking network connections written in Perl.
By now it includes a packetgenerator, a rst deamon, a sniffer, an ICMP redirection tool, an ARP redirection tool, an IDS testing tool and an automatic hij
A C++/Qt program for use in encrypting and decrypting simple substitution cyphers. These cyphers are often found in newspapers and various puzzle books.