Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform.
Geographic restrictions, eligibility, and terms apply.
Get started with Nexo.
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
This project aims at providing connectivity for commercial and non-commercial applications between MIIS 2003 and OpenLDAP 2.x-based directories, allowing customers to integrate OpenLDAP 2.x into an MIIS-based identity management solution
DNA is an open, flexible and extensible deep network analyzer software server and software architecture for gathering and analyzing network packets, network sessions and applications protocols, passively off enterprise class networks.
Ungoliant is a system utilizing open-sourced backends to isolate problematic (virus-infected or otherwise) hosts from a network. Focuses on vpmsd, snort, and nmap for detection and containment.
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Dark/sk sources are kernel patchset projects created by predatorfreak (Brett G.), focused on maintaining stablity and scalabliy. Everything that goes into these patchsets is selected based on these goals.
OPIAM stands for Open Identity and Access Management. This Suite will provide modules for user & right centralized management: user profile management, ldap content consultation, access control based on RBAC & provisioning policies, and Web SSO.
Libdejector is a database tool which defeats SQL injection attacks by performing context-free validation of queries. While written in C, SWIG wrappers exist for Python and other languages will be following soon.
InsecureWebApp is a web app that includes common web application vulnerabilities including SQL&Html Injection- see owasp.org. It is a target for automated and manual penetration testing, source code analysis, vulnerability assessments and threat modeling.
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
This PAM module provides the ability for users to have encrypted directories which are mounted automatically on login and unmounted after logout. The Device Mapper's CRYPT target provides the encryption.
Ce module en PHP permet de gérer les accčs ŕ des pages web de maničre trčs simple. Il repose sur une base de données MySQL et est livré avec une interface de gestion accessible via un navigateur internet.
Proxmox Firewall (Proxwall) is a flexible Linux firewall based on Shorewall and many other open source tools. It is designed to install on commodity hardware within minutes. It can handle complex and fast changing network environments.
A low cost software and hardware KVM over IP and remote Console monitoring
solution running on Linux. Secure administration and access to remote
keyboard/video/mouse and serial console output. Easily configured and
customised to suit user needs.
Uberviewer is a java/swt log processor for Uberlogger (a kernel-based observatory). It allows real-time analysis of a remote OS, including process and I/O monitoring.
This tool is intended to be helpful for security researchers and malware analysts.
SecretBox is an open-source, high-safety password manager for Windows/Linux/J2ME devices. You can build the passwords list conveniently in PC side, encrypt it by a master password, and upload to your mobile phone.
Proxy Glue lets users glue together socks5, socks4, connect, http, and cgi proxies into one big field of potential paths, with configuration done right from the browser.
iDVR (formerly Devolution Security System) is a video surveillance system which can handle up to 16 cameras with motion detection, notification and record on motion to mp4. Stream over the LAN (Multicast) or Over the Net (Unicast).
The MACA objective is to provide user authentication, session management and authorization services independently of platform. Authorization servive is based on a contextual role-based access control model that extends NIST RBAC
Multispoof exploits weak authentication method based on IP-MAC pairs checking, implemented frequently in Ethernet networks by ISPs. This program allows to multiply user's throughput and serves as a demonstration of spoofing effectiveness.
Java Based Cryptographic P2P Messaging Client, is based on a client-server architecture. The Client is made in SWING. The server is text based. Server keeps tabs on presense and the users public keys. Presentation: http://varun.accosted.net/talks.php
Ethereal Network Traffic Session Reconstruction for Internet Protocols. Management Console to reconstruct emails, web sessions, VOIP sessions, FTP, and all known supported Internet Protocols for Network Forensics. ***UPDATE*** Project release scheduled.
Cameloid is a new TCP/UDP based P2P voice and video encryption software, that will provide high level of privacy for all levels of communication using only quality secret-key ciphers to ensure long-term security.
Sesa is a simple web portal framework for Webmin. The Sesa framework allows to build portals to edit complex system configuration data. Supports role based access control and comes with a configurable workflow engine.