Build VMs, containers, AI, databases, storage—all in one place.
Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
Get Started
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
Simple UI to test the effectiveness of a heuristic algorithm against the brute force method for path finding among an arbitrary number of arbitrarily placed points on a grid. This is an educational project, don't expect new and better methods.
Scripts for securing and monitoring networks in a highly hostile environment. These scripts are designed with minimum implementation time in mind, and aim to secure and monitor hosts in a "quick and dirty" fashion. NOT designed for production networks.
SSHA Attack is a small prog for pen testers and security engineers to use in password/small clear-text auditing of SSHA hashes. It can also be treated as a SSHA crack tool but it was written with no malicious intent in mind. Use at your own risk.
Trinux is a small ramdisk/floppy based Linux distribution that contains useful tools for mapping and monitoring TCP/IP networks (i.e. intrusion detection and vulnerability scanning)
GNUWire is a centrally managed, multi threaded file integrity checker / intrusion detection tool. It was written from the ground up with security, portability, scalability, performance and user interface in mind.
This is the worlds first and probably only FLOSS project aimed to create a lowbudget, based on availble technology, cruise missile. No this is not a Joke, its for real. Why? Since no one has tried to do this before and certainly not under the GPL.
Odyssi PKI aims to be a complete PKI suite written in Java, and designed from the ground up with security in mind. When completed, it will be fully standards compliant with PKIX, XKMS, OCSP, and other PKI standards.
J2EP is a reverse proxy running on a J2EE engine. The proxy is written in java and was originally designed with Tomcat in mind, but any engine should work fine. A set of basic mapping rules are included but they can easily be extended to your own needs.
yafingerd is a new concept in finger daemons. Created with security in mind, if offers various features that makes it the best choice for security, without loosing features that one might want.
Fully tested on AIX, Linux, Solaris and FreeBSD.
A DIFFERENT AnonOS! We are not Anonymous-OS. It was made by diff Anons
...An0nOS comes from the idea of a TRUSTED system that even the "1337" users trust. This OS has different flavors that appeal to each type of user.
An0nOS is a penetration-testing OS designed with Anonymous in mind. Designed by Anons, for Anons. Even new Anons will be able to use An0nOS and be able to develop the much necessary skills that every security tester needs!