Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
MongoDB Atlas runs apps anywhere
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
This project is created for providing basic stegnography concept.
THESE PROGRAMS JUST PROVIDES BASIC Stenography CONCEPT.
ENCRYPTION
1. RUN Encryptor.CLASS (WITH APPROPRIATE JAVA ENV.)
2. PROVIDE APPROPRIATE PARAMETERS.
• source_file_name : (NAME OF FILE TO WHICH target_file_name IS TO BE EMBEDDED)
• target_file_name : (NAME OF FILE WHICH SHOULD BE EMBEDDED )
• output_file_name : (NAME OF OUTPUT FILE)
e.g. java Encryptor original.mp3 hideme.mp3 hidden.mp3 (space will be used for separating parameters)
[source_file_name] [target_file_name] [output_file_name]
DECRYPTION
1. ...
Proxy server that performs proof of concept session hijacking by receiving cookies from one or more NomNom Agents. It then offers the user an option to switch to any intercepted session. More features and site specific options later.
Search Based Password Strength Analyzer
Proof-of-Concept. Determines password resilience against dictionary attacks, opposed to brute-force attacks like most other password strength analyzers. Utilizes Bing API to collect statistics.
** Guys I have built a much more powerful Fully Featured CMS system at: https://github.com/MacdonaldRobinson/FlexDotnetCMS
Macs CMS is a Flat File ( XML and SQLite ) based AJAX Content Management System. It focuses mainly on the Edit In Place editing concept. It comes with a built in blog with moderation support, user manager section, roles manager section, SEO / SEF URL
Hide your data from any scans for fingerprints at forensic analysis. Fragger is an concept to fragment files into many small files by scrambling the content of the source file.
Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material. First and foremost for memory dump analysis and forensics usage. Able to identify AES, Serpent, Twofish and RSA keys as of version 0.0.3.
Isolated Execution is a software reference implementation of the security through isolation concept. It brings a contained environment where malware can run without affecting the whole system.
UKey is an extension to the open-source encryption tool: TrueCrypt. With UKey you can use a USB key as replacement password for TrueCrypt. Currently the project is in a 'proof of concept' state, meaning it does work but it is not meant for daily use.
Ex-Tip is a proof-of-concept project to demonstrate the utility of a portable, extensible forensic timeline framework written in Perl. Common modules are supplied, and the simplicity of the framework enables creation of new modules in the field.
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
http://jublogin.sourceforge.net/login_with_challenge A concept for securing passwords on web logins using hashes on the client side (with salt and challenges). Demos plus implementation patches for web applications.
Remote Sniffer Detection Tool is a utility to detect sniffers running on other machines in the same network (Ethernet) segment. This project is still in a very early beta stage and currently is only a PROOF-OF-CONCEPT for further development.
SecureRSS - Secure RSS-Syndication for Mobile Devices. Non-repudiability of RSS-Newsfeed channels/items on the assumption of a resource-constraint client using w3c-ietf xml signatures. (proof-of-concept)
Tentun is a tunneling project that introduces the innovative concept of modifying packet traffic to include completely transparent covert traffic to existing streams of data. Tentun also aims at unifying different tunneling implementations.
CarrierPigeon enables intelligent, transparent and secure usage of data sources across networked sites. The underlying, distributed Java-framework is built on the concept of proxy drivers to provide a real VPN experience.
...RSA is a splitkey cryptosystem developed by Rivest, Shamir, and Adleman @ MIT in '77. RSA is thought to be secure except by factoring large primes. Jsymmetric is more proof of concept than actually useful.
garuda is an intrusion detection system against wireless threats. It is a progressive proof of concept project to ward off wireless threats such as war-drivers, rogue AP, wifi DoS and MAC spoofing attacks. Please enjoy and we welcome your volunteerism.
yafingerd is a new concept in finger daemons. Created with security in mind, if offers various features that makes it the best choice for security, without loosing features that one might want.
Fully tested on AIX, Linux, Solaris and FreeBSD.
Security testing tool for CakePHP based web applications
Cake Fuzzer is an open-source project meant to help automatically and continuously discover vulnerabilities in web applications created based on specific frameworks with very limited false positives. Currently, it is implemented to support the Cake PHP framework. Cake Fuzzer is based on the concept of Interactive Application Security Testing (IAST).
The goals of the project are:
- create an automated process of discovering vulnerabilities in applications based on the CakePHP Framework;
- no application knowledge requirement or pre-configuration of the web application;
- result with minimal or close to 0 amount of false positives;
- require minimal security knowledge to run the scanner.