Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
Get started with Nexo.
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
The Secure Remote Log Monitor (SRLM) project provides client and server
utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.
The X Supervisor Extension is a patch for the popular XFree86 X server to make X11 forwarding with openSSH safer when the remote host can not be trusted.
bns is a network simulator.
You can create a complete network, add services to host, ... It can be usefull to study network behavior, make presentations, learn hacking techniques, ...
Streamline Azure Security with Palo Alto Networks VM-Series
Centrally manage physical and virtualized firewalls with Panorama
Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
The goal of the Symbiosis project is to develop software which allows people to communicate, share knowledge, and learn. The primary subject of learning will be the Buddha Dharma, but it will be possible to use it for other subjects also.
a linux netfilter/iptables firewall log summarizer with graphical and command line interface that helps the sysadmin in his daily routine. points of interest can be examined closer to gain further information. you can also run it in command line mode and
The Castellan Sentry detects login attempts, and gives the user the ability to block, allow or research the person attempting to connect. It utilizes a GUI front end to allow the user to make their decision quickly and easily.
A secure collaborative framework that is being used by other projects such as CFAgent (online customer service), CFWeb (pure HTTP communication for CFAgent) and much more in addition to serving as a standalone all-in-one collaboration platform by itself.
ThorsenCode is a client-server system, that allows you and your buddies to share files in a safe way. It features encrypted filetransfers and encrypted chatrooms.
Saint Lawless is a pentetration toolkit. It will be part Cheops and part Nessus with an isometric game-like GUI. Saint Lawless will attempt to gain as much information about a network environment with the least amount of probes. Saint Lawless will also
Linuxshield is a java based tool to create and deploy firewall scripts. You will also be able to collect and read security logfiles from within this tool. Linuxshield has built-in a 'pain in the ass' unbreakable firewall configuration.
Packet Flood Generator as the name stands is a projet to produce a
threaded traffic generator program, it has support for generating IP, TCP , UDP, ICMP and IGMP packets, also has as feature to keep the connection up.
Ariesbot, is an ircbot, which will be able of doing basic bot functions such as op/deop/kick/ban/moderate. Plus being able to Wu-Ftpd scans, cgi/php scans port scans, subnet scans and scan for vuln version of apache to nosejob.c.
ISO 17799 - Code of practice for information security management. Creation of methodology and documentation for audit adapted to ISO. One is made up of an introduction on general aspects of the security of the information.
Track all IP/TCP, IP/UDP, NetBeui, IPX/SPX connections and ARP/RARP traffic. Optionally save connections in MySQL database. Implement http server so you can view connections with web browser or GTK client. Can send fake ARP reply and kill TCP connection
The secsuite Security Suite is, as it is called, a security suite. At the moment, only a portscanner with a graphical GUI is implemented. Screenshots of it are not yet avaiable.
Freemail enables secure, anonymous, two-party communication over
Freenet. The use of flexible channel initiation protocols and secure message transport allows allows cultivation of anonymous identities with reliable reputations.
Peekabooty is a peer-to-peer application which can route web page requests around firewalls. This is done by asking hosts in the network that are not censored to fetch censored web pages.
secheck is a script which imitates currently existing log checkers but with a focus on security. secheck does some basic system security checking, then emails to output to a given user.
SnortKonsole is a Java-Frontend for the Open Source Network Intrusion Detection System Snort. It supports all configuration-aspects of Snort. The configuration distribution and activating of sensors is done via scp/ssh.
Nift - (Network Intrusion Footprinting Tool) is graphical front-end (written in gtk+) for footprinting tools and methods already freely avaliable. It's purpose is to aid sys-admins in securing their site by allowing them to quickly check their network