Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.
Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
Build an app in Retool
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
IDSRG stands for "Intrusion Detection System Report Generator". It generates graphic reports from a snort database of alerts. The main goal of the project is to provide instant reports of your ids events. It has 7 predefined reports and the plans are t
PassKool is a deterministic password generator in Python. From a given passphrase, a more or less pronouncable password is generated using a one-way function. If you happen to forget the password, you can still retrieve it using your passphrase.
IP Blocker is an incident response tool that automatically updates access control lists on Cisco routers and other devices. Web and command line interfaces are both supported, as is logging, email notification, and automatic expiration of blocks.
Cryptix is an international volunteer effort to produce robust, open-source cryptographic software libraries. Cryptix products are free, both for commercial and non-commercial use and are being used by developers all over the world.
GridAuth is a user credential management system for distributed data and computational grids. GridAuth is configurable and extensible to just about any system requiring credential management, advanced authorization and secure authentication.
Web Scanner is a command-line program that is designed to scans web servers to find default and potentially vulnerable web pages. 2.0 - Java, 1.3 - Perl
Web scanner supports both HTTP and HTTPS protocols and can be configured to use custom data files.
Yeastar: Business Phone System and Unified Communications
Go beyond just a PBX with all communications integrated as one.
User-friendly, optimized, and scalable, the Yeastar P-Series Phone System redefines business connectivity by bringing together calling, meetings, omnichannel messaging, and integrations in one simple platform—removing the limitations of distance, platforms, and systems.
Easy x509 certificate generation, with multi-user administration and safe distribution. Predefined types for User/Clients/Server/Mail/CA. Users integrate information from LDAP or AD directory. Full revocation(CRL) support with ftp distribution of CRLs.
Set of tools needed to setup and maintain encrypted partitions under unix systems (initially linux). Especially helpfull when doing root device encryption. Features xml configuration, multiple users, usb "tokens" (usb mass storage) and key hierarchy.
Sezame daemon grant temporary access (iptables) to specific (user defined) port. Access is granted on token based authorization to IP from which authorization was sent.
x:einfach simple java components is a library for java. it includes various things like a page cache for web-content, a virtual string table, an ip subnet checker, string and date handling utilities, a connection pool and other simple things.
Script to automatically update /etc/hosts.deny due to use of an illegal username or excessive bad passwords. Written to prevent the success of a brute force attack.
Extensible User Folder is a Zope user folder that requires the authentication of users to be removed from the storage of properties for users. Writing new authentication or property sources requires no intimate Zope authentication knowledge.
Sentry Firewall CD-ROM is a Linux-based bootable CD-ROM suitable for use as an inexpensive and easy to maintain Firewall or IDS Node. The system is designed to be immediately configurable for a variety of different operating environments via a config fil
SecurityFilter is a Java Servlet Filter that mimics the behavior and configuration format of container managed security, with several development and deployment advantages. See the Home Page for more details.
A collection of PHP scripts for both new web designers who just want to get a page up, and experienced php programmers who want to take the easy way out.
JHoney is a honeypot tool for Linux written in Java. It simulates vulnerable net services to trick an attacker or trojan to attack them. The attacker IP is blocked once a service is attacked, and then the intruder cannot attack for example webservers.
A shell script which determines by brute force the best compression format (bzip2, gzip, Z, zip, etc.) and which compression level to use in order to archive a file the smallest possible.
PfPro is a "fat" client for managing configurations for PF-based firewalls. It is a graphical client-side application for managing multiple firewall configurations.