Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
With this system, a person can ask a yes/no-question to group of people while their answer is kept completely anonymous. The project is based on the dining cryptographers protocol.
Detect your web servers being scanned by brute force tools and vulnerability scanners.Helps you quickly identify probable probing by bad guys who's wanna dig possible security holes.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
a number of clients try to find a secret key by calculating the encryptions to all possible keys of a given key range and comparing them to the encryptin of the secret key until a matching one is detected....
Protowalk is a generic protocol fuzzing tool which allows a developer, QA tester, security engineer to identify vulnerabilities in high level protocols which use TCP or UDP for transport.
Discover hidden files you never seen before! NTFS ADS is an forensic/security utility to reveal, list, delete, determine contents, extract and copy hidden files from NTFS Alternate Data Streams.
mp3stegz is an application that apply steganographic (steganography) algorithm in mp3 files. mp3stegz will maintain original mp3 file's size and sound quality. The hidden message is compressed(zlib) and encrypted(Rijndael).
This is a demonstration of integrating the CAPTCHA service from http://recaptcha.org with Oracle Single-Sign-On. It can be used in production OSSO deployments, and also as an example of integrating any 3rd party authentication system with OSSO.
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
Acte is an sql injection tool that performs error based sql-injection on web applications which use microsoft sql-server. It includes various queries to extract info from "dead end" situations and it also includes DOS attacks and other features.
T-OpenID is an identity management solution consisting of an OpenID server based on Turbogears Python framework and a Firefox browser add-on. The server extends standard OpenID functionality through secure communication with the browser.
A "programming language" that can generate random strings. Useful for creating password, but has many other uses (it can generate IP addresses, fully random but pronounceable words, ..., anything that a string can represent). Written in C#
Open Legacy Storage Document: Generic Document Archiving on Disk and Network(using MINA) Framework in Java for huge number of docs(up to 2^192 documents), efficient(Java NIO), crypto, net transfert, web retrieve, J2EE and eMail archiving compatible.
EvilSentinel is basely an universal security system for php web applications .
The software offers a completely configurable filtering system, wich allows ,depending on the situation, to block, sanitize or simply to ignore
malevole input datas .
Labrador is a Host-based Intrusion Detection System (HIDS) and Integrity Checker written entirely in Perl. It aims to be a complete, free, multiplatform, and open-source solution for detecting modifications and tamperings in files.
JavaLightServer is a multi-purpose server that can be used to share our desktop across the Internet with other authorized clients. It provides also a secure connection using SSL certificates.
DownRoll: The downloadable RickRoll. How many people can you fool? Instructions: 1. Download it. 2. Change the file name. 3. Upload it to a file sharing site. 4. Trick people into running it.
A general purpose set of tools, C library and CPAN modules to help DomainKeys developers. The goal is that these tools and library can be easily adopted by all MTAs, LDAs and possibly MUAs.
This project is about conforming to the DomainKeys standard,
Provides steganographic cloaking for scripts and other data by interspersing sensitive lines with ANSI codes to clear themselves after drawing on a terminal. Front data, commented-out, is displayed instead.
Semeir is a Encryption algorithm, Capable of block encryption. It is written in pure C. It is platform independent, and is promising for Embedded systems. Intended as an alternate, yet secure data encryption cipher.
iDate searches via Bluetooth if there are potentially nice dates in your vicinity. You will be notified who is in your vicinity has iDate and whether these people could be a nice date if for each the profile matches the search profile of the other.
Mixmaster is an anonymous remailer. Remailers provide protection against traffic analysis and allow sending electronic mail anonymously or pseudonymously.
Mixmaster consists of both client and server installations.