With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Custom VMs From 1 to 96 vCPUs With 99.95% Uptime
General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.
Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
P.A.T.H is a collection of tools for inspecting and hijacking network connections written in Perl.
By now it includes a packetgenerator, a rst deamon, a sniffer, an ICMP redirection tool, an ARP redirection tool, an IDS testing tool and an automatic hij
The Sentry tools provide host-level security services for the Unix platform. PortSentry, Logcheck/LogSentry, and HostSentry protect against portscans, automate log file auditing, and detect suspicious login activity on a continuous basis.
Picky - a selective syslog to mysql database daemon. Allows completely dynamic specific translation of syslog data to dynamic mysql table(s). The other projects under this one are tools that take advantage of the flexibility of Picky and demonstrate it
The aim of this project is to create a set of basic java tools for
developers who need Certificate Authority (CA) root
certificates and user certificates signed by the CA.
A suite of tools (a sniffer, a TCP hijacker, an ARP poisoner and a TCP tunnel through ICMP/IGMP packets) created for testing TCP/IP weakness and using them in a non-conventional way. [Up to now I've done only the sniffer-related part]
The Smart Linux Firewall will provide IP filtering, Network Address Translation, Vistual servers, mail relay and DNS cache.
We will use existing network tools as much as possible, and produce a web interface to administrate this tools.
Java class file encryption. Class Encrypt is a program that can encrypt a developer's class files and package them into an executable jar file for deployment. The program uses modules for implementing different encryptions.
Syslog-sec, provides an open secure syslogd implementation based on (RFC) standards, including rfc3164 ("syslog") and the upcoming "syslog-sign" . Other extensions, will/can be added. More tools will be added, too
Single-honeypot is a powerfull tool, for security interest about the estudies of techniques of breaking systems.
This is, a singular or little honeypot for test your networks for hostiles visitors.
This made in perl script.
Simulate different servi
Security-Tools Database is an easy to use tool to manage tool-tipps (e.g. from the SecurityFocus.com Newsletters and other sources). Simply copy + paste tipps from the newsletter or enter tipps manually. Finds tools by any combinations of search criteria.
A similar to Tripwire, file system integrity checking tool but develop in java and cross platform.
This tools checking and source control using check sum algorithm like MD5, SHA and CRC.
Krome Shield is designed to fool remote fingerprinting tools (using ICMP & TCP), making them think you're running a different OS. It runs under Linux, using the netlink device and ipchains. In the future it will act like an IDS too, detecting attacks a
The IP Personality project is a patch to the Linux kernels that adds netfilter features: it enables the emulation of other OSes at the network level, thus fooling remote OS detection tools such as nmap that rely on network fingerprinting.
WEBsent is a web service test and performance tool. It offers the user, via a client site hypertext browser, some tools and tests to check the performance and validity of his/her web server. WEBsent is designed to monitor webpages, content accessibility
This library provides crypthographic functions written in plain Object Pascal, aimed to be portable and easy to use.
Currently it contains BlowFish Cipher , MD5 and RipeMD hashes.
More is planned.
Found at www.itadmins.net in the Projects area. The complete Linux Administrators CD. For normal system and network administration, security, forensics tools and utilities.
Komoku implements an intrusion detection system using embedded system. Unlike other integrity tools, as tripwire, it does not rely on the operating system. The IDS is actually implemented in an INtel EBSA-285 board.
A number of tools to enhance management/coding of NFR (http://www.nfr.net) IDA, and various other admin tools that can be used for both NFR and hand coding other appliance scripts.