No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
Start Free
Earn up to 16% annual interest with Nexo.
More flexibility. More control.
Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform.
Geographic restrictions, eligibility, and terms apply.
Password strength analysis tool written for web applications. Enables a web application to perform client password strength checking during registration or password changing.
Bisker is a simple cgi scanner written in C language for GNU/linux platforms. It's an useful tool to find critical or dangerous cgis/folders/files on local and remote machines (also through proxy).
CryptoHawk can calculate hashes (md2,md4,md5,sha-1,sha-256 and hmac). It can also perform cryptanalysis like frequency analysis for substutition cipher and exhaustive key search for rotation cipher, as well as searching internet databases for md5 hashes.
N-Eye is design to help the network administrator, takes advantages of passive fingerprinting(p0f, pads) and active scanning(nmap, nessus), to provide an useful network environment apperceive tool for security administrators
Libdejector is a database tool which defeats SQL injection attacks by performing context-free validation of queries. While written in C, SWIG wrappers exist for Python and other languages will be following soon.
Uberviewer is a java/swt log processor for Uberlogger (a kernel-based observatory). It allows real-time analysis of a remote OS, including process and I/O monitoring.
This tool is intended to be helpful for security researchers and malware analysts.
Sussen is a tool that checks for vulnerabilities and configuration issues on computer systems. It is based on the Open Vulnerability and Assessment Language.
KayRa is a Web Application Security Auditing Tool designed to test the security of websites by analyzing web pages. Some of the tests include: SQL Injection, XSS, Form behaviour with bad data. All tests carried out will be based on the OWASP guide.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Started as part of the Google Summer of Code 2005, this tool adjusts security settings on Linux systems, including firewall and SELinux policies. This tool aims to replace the system-config-securitylevel tool from Red Hat and Fedora Core systems.
DNScat is a "swiss-army knife" tool to tunnel traffic through DNS servers. It is a small, yet powerfull tool, similar to netcat. In conjunction with PPP server, it allows to build a VPN using DNS packets. DNScat is a useful tool for penetration testing.
The purpose of the tool is to perform fingerprinting of remote TCP/IP stacks based on Ofir Arkin's ICMP fingerprinting research. This tool is a practical implementation of results discovered during 'project X' http://www.sys-security.com/index.php
ADAM is the Active Defense Algorithm and Model. It is a formally defined process of determining appropriate active response actions in the event of an attack. This implementation shows that active defense can be a legitimate and responsible security tool
phpFreeLog is an advanced server logging tool written in PHP. Easy implementation and control allow you to take charge of how and when phpFreeLog will be used. Edit how the log will look through use of its built in scripting language and modular system.
Utmpd is a small and flexible daemon written in C.It's used as a tool for user acces control. It scans the utmp file seeking for loged users and kills the user if he matches deny rule (eg. if he'strying to log in at some predefined time, denyed host etc.
jWaste is a Java based implemtation of the WASTE-Protocol. WASTE is a mesh-based workgroup tool that allows for encrypted, private communication between distant parties on the internet, independant of local network organization.
JEraser is a very simple but extremely effective tool to erase a file or and entire directory so that no one could recover it.
It's written in Java so you can run it on every platform.
Authenticated network access: a lightweight network firewall authentication tool. Horatio is built around a custom Perl webserver and the Linux firewall tools.
chroot_safe, a tool to chroot any application in a sane manner without requring binaries,
shared libraries etc within the chroot or any support from the application. Works with any
dynamically linked application.
IP Blocker is an incident response tool that automatically updates access control lists on Cisco routers and other devices. Web and command line interfaces are both supported, as is logging, email notification, and automatic expiration of blocks.
Barrier is designed to manage linux-box as firewall-qos router. It is sophisticated tool intended to manage your linux-box's iptables rules as also your QoS policy. Actualy QoS plugin for Barrier is based on htb
fccu.evtreader is a computer forensic tool that will help an investigator to analyze MS Windows event log files.
It is a perl script made to be run under GNU/Linux but should run on other platforms too.