With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
Try free now
Deliver secure remote access with OpenVPN.
Trusted by nearly 20,000 customers worldwide, and all major cloud providers.
OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
You can compute what you have in common with untrusted parties, without disclosing what you have. This is an implementation of a cryptographic protocol that is tailored for privacy-preserving set intersection.
HT Password Manager is a web interface to manage apache's htpasswd files. Manage multiple password files with separate per-file administrator. Administrators can add/delete/search and reset password for all users & users can change their own passwords.
Typical Web Firewalls use a mechanism to classify anomaly traffics. This tool submits an old-school malicious (not dangerous) request, and tells you the type of firewall a particular web site use (if any). Mainly useful for blackbox security assessment
Payroll Services for Small Businesses | QuickBooks
Save 50% off for 3 months with QuickBooks Payroll when you Buy Now
Easily pay your team and access powerful tools, employee benefits, and supportive experts with the #1 online payroll service provider. Manage payroll and access HR and employee services in one place. Pay your team automatically once your payroll setup is complete. We'll calculate, file, and pay your payroll taxes automatically.
VoIPER is a VoIP security testing toolkit incorporating several VoIP fuzzers and auxilliary tools to assist the auditor. It can currently generate over 200,000 SIP tests and H.323/IAX modules are in development. It's also a damn cool project name ;)
TILT is a set of terminal logging and playback tools for auditing telnet and SSH connections made from a bastion host. It provides timestamped logs and real time playback of logs for incident reports, incident analysis or as a training aid
The Solitox Community system provides an integrated real-time chat service, web interface, and a scalable infrastructure for adding more services with common credentials. These interfaces allow a greater level of communication for your users.
This project has moved. Please see http://projects.darkaslight.com/ SAM is a near real-rime Snort alert monitor. SAM provides many ways to indicate that you may be experiencing an intrusion attempt on your network.
Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.
Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
Running as a daemon it monitors /var/log/messages(configurable)
for bastille iptables and PSAD scan alerts with a max threshold (configurable)
It will block ip on iptables instantly and send abuse email out.
Requires a few perl modules (tries to install)
Rishi is a botnet detection software, capable of detecting hosts infected with IRC based bots by passively monitoring network traffic. A webinterface provides additional information to found incidents.
Crypto.Net is a free and open cryptography library for C# and .Net. AES (Rijndeal), Twofish, Blowfish, RSA, Diffie-Hellman, SSL/TLS, X509-Certificate builder, stream cipher modes or a secure netowrk stream are only some features of this library.
Un programa para cambiar el orden de las palabras en una frase o las letras de una palabra u otros algoritmos. Su principal objetivo es cambiar las frases para hacerlas mas ilegibles o para aparentar ser más friki en tus conversaciones o por diversi
The idea of chklinkcnt is to traverse all directories of a linux or unix filesystem and in each directory count the directory entries and compare the number with the link count of the current directory. If these don't match something might be wrong.
PHP functions and classes to add a Domain Key Identified Mail (DKIM RFC 4871) signatures to emails sent by PHP. It is based on the openssl extensions of PHP. It can generate DKIM signature but cannot verify them.
Developped and tested on PHP 4.0.
Nayatel Intrusion Detection System is a windows based system written in C#. It Automatically detects any hosts attempting to intrude into your network. It shows the IP address and a level reading to show the level of threat it is posing.
MSN Shadow is a sniffer and spoofer tool for MSN protocol. It can decode MSN chat messages and video. Furthermore it can spoof messages and save the messages in HTML format and recording the sniffed video.
Bloppy Blowfish PHP (En/De)crypter can crypt, with a private key, text messages or files, send it via e-mail and decrypt it. You can inject a crypted message into any kind of file (like JPEG image) and send it via e-mail.
BadTuxWall will help you to implement your own firewall on a Linux operating system using an efficient graphical user interface. It also allows you to generate iptables scripts, export them and share them with friends.
Computer chess engine written using Qt4, which works under Knights, Jose, Arena and other chess board GUI games. Uses bitboard game representation and alpha beta brute-force search to analyse chess positions.
MyNmap is a tool that uses Apache/PHP/MySQL/PERL (designed to run on Linux, BSD, or other Unix clones) to display Nmap network scan data for large networks.
revinetd is a revserse tcp port redirector. It operates in two modes, listen-listen and connect-connect. It can be used to forward traffic through firewalls where outbound rule sets are more liberal than inbound rules.