Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
Go From AI Idea to AI App Fast
One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
OpenPortalGuard is a flexible, extensible, and massively scalable access control system for portals. It provides single-sign-on features for username/pw and smartcards as well as declarative access control.
The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an
crcRepair is a utility that is able to fix corrupt files by consulting a database and file mirrors. It is written in pure Java, so it can be used on all platforms with the Java JRE installed.
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
BASTED is a free tool that acts as a honeypot for spammers, who use spambots to harvest email addresses from websites. BASTED has been designed to become a powerfull tool for system administrators willing to learn about the the spam process. (Please note
An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
RemoteWAP gives you the ability to take control of a Linux Operating System from anywhere with a WAP enabled mobile phone. This project is being developed in Java. There is plans to support other Operating Systems such as Windows, Solaris, *BSD
Peer Agent is a system that enable a group of users to carry out automated complex interaction via email services without relying on a trusted third party.
NBTView is a 'NetBIOS Swiss Army Knife' written in C, and usable under several UNIX-like systems. NBTView allows you to passively monitor NetBIOS intelligence (users logged in, shares, etc.), run queries against machines, and brute-force share passwords.
USRBAC is a kernel patch and userspace daemon that allows role based access control to be mitegated in userspace. The goal is to allow a secure way to impliment RBAC compliant security systems using a daemon in userspace
Provides efficient, effective implementations of 32- and 64-bit hash functions based on Rabin fingerprints / irreducible polynomials, in Java. Also provides integration with java.security.MessageDigest API.
Combined coded remote-administrative service with SSL secure port scan, anonymous routing and third-party plugin inbuilt for quick and automatic "scan and install" process. Easy to use and will work under firewalls and up to 1024 bit strong cipher
Automated Security Tools (autosec) aims to provide
automatic tools which network administrators may use
to help check and test the security of their network.
A user-space solution for configurably disabling the ability of a process to access the internet. It is especially useful for foiling code that is suspected of containing spyware.
Chaosreader is a freeware tool to fetch application data from snoop or tcpdump logs. Supported protocols include TCP, UDP, IPv4, IPv6, ICMP, telnet, FTP, HTTP, SMTP, IRC, X11, VNC, ...
Output spool reader for Snort! This program decouples output overhead from the Snort network intrusion detection system and allows Snort to run at full speed. It takes input and output plugins and can therefore be used to convert almost any spooled fil
sfick (pronounced as "s-fick") is a two part software system whose function is to assist system administrators with the process of verifying the integrity of critical files. Given a system compromise, system administrators must be able to verify the integ
Syscheck monitors the reliability/integrity of critical system files (config files and
binaries) by identifying changes made to them. It does this through an "automated
verification regimen run at regular intervals" against a local or remote database
Aiakos is a suite of software components that together provide a collaborative Single-Signon System across multiple trusted websites. A simple open protocol is provided for collaboration, and working libraries are provided for ASP and Zope.
The Enforcer is a Linux Security Module designed to improve integrity
of a computer running Linux by ensuring no tampering of the
filesystem. It can interact with TCPA hardware to provide higher
levels of assurance for software and sensitive data.
Ultramagnetic is a concurrent fork of GAIM that provides strong end-to-end encryption using libgcrypt and anonymous routing using the Six/Four protocol.