Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
Sign Up Free
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
This is a simple app, created around an original sudoku solver based only on heuristics, not brute force. It's coded in Java/SWT(GUI toolkit). It's an example of MVC and of Visitor, Observer, Strategy, Abstract Factory, Singleton Design Patterns.
ProShield is a security program for Ubuntu/Debian Linux. It helps ensure your system is secure and up-to-date by checking many different aspects of your system. Regular use is recommended.
Snort IDMEF is an IDMEF XML plugin for Snort to output alert events in the form of IDMEF messages. The plugin is compatible with Snort 2.x
Snort is one of the best Open Source Network Intrusion Detection Systems available today.
A simple and poor, but very useful, interface to nmap security scanner to save open ports and banner to mysql database. Web interface for view tables write in php. Patch in c++ and c.
Reaver is a network vulnerability scanner built on top of Nessus with an easy to use "web front-end" and reporting system. Reaver will aid administrators in identifying, cataloguing and remediation of security vulnerability...DEV -missing web interface
An easy-to-use generator for large numbers of passwords.
Originally for my school's IT Department, I have now released the source code under the GNU GPL. It supports the random generation of huge numbers of passwords that can be determined in a variety of ways.
With this script, you'll be full control over your captcha generate. You can add multiple options and effects to captcha image. And will generate non-passing captcha images.
Java Password Tracker. A cross-platform application to safely store away your passwords. The file format is compatible with the original password safe application.
UKey is an extension to the open-source encryption tool: TrueCrypt. With UKey you can use a USB key as replacement password for TrueCrypt. Currently the project is in a 'proof of concept' state, meaning it does work but it is not meant for daily use.
The goal of this project is to implement an utility capable of enforcing XACML policies on a IBM DB2 database. Talking in XACML terms this project will serve as a Policy Enforcement Point for DB2.
This is a module for PAM. It's purpose is to quiz a user who is attempting to log into a system with very simple questions that verify that the entity logging in is human.
This program can generate simple (easy to remember) passwords, harder passwords, very hard passwords and uuids. Unlike most password-utilities for Linux, it has a Graphical User Interface.
PAM module that authenticates against a remote IMAP or IMAPS server. Supports multiple servers, SSL, password caching, user blacklists, and many configuration abilities.
Project Sypher is a Java program that is intended to take a document and cipher the text, output the result in a new document and delete the original file.
Netstorm is a highly flexible, fast and plattform independent network security and reliability tester which allows you to setup real world low level flood attack scenarios (such as MITM, DoS and DDoS) within a local area network and on the internet.
This package is a modest implementation of a non-alphanumeric encryption algorithm in java. But I'm kinda looking forward to creating a whole gui app implementing most well-known encryption tools, "the paranoid secret-coder special brainkiller"!
Secure downloads by checksum verification using several hash algorithms like md5 or sha1 to verify your downloaded packages using an independet third site.
PQStego is a C implementation of J. Fridrich algorithm for embedding secret messages in JPEG images as described in her paper "Perturbed quantization steganography with wet paper codes "