Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Start Free
Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure
Native application identity and user-based security for your Azure cloud
Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
Visit http://sourceforge.net/projects/nreg to view the new one. This is the update! It has better serial protection, more customizable options, and it has a better key maker! It has a ban and used key list system, and emails you when someone registers.
Extend the functionality of the mount and the umount commands by adding support for basic device mapper devices, for key files and scripts and for filesystem checking at mount time while retaining support for loop device encryption.
With this application you can hide files in a picture. Now the data are hidden in the picture and can be extracted with WinZip or an another Zip-Programm. Browse all Packages for all Releases: .Net and Java
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
This project has moved. Please see http://projects.darkaslight.com/ SAM is a near real-rime Snort alert monitor. SAM provides many ways to indicate that you may be experiencing an intrusion attempt on your network.
Crypto.Net is a free and open cryptography library for C# and .Net. AES (Rijndeal), Twofish, Blowfish, RSA, Diffie-Hellman, SSL/TLS, X509-Certificate builder, stream cipher modes or a secure netowrk stream are only some features of this library.
Here is a little utility I wrote to facilitate my work when I have to try methods on deciphering coded messages. Well, of course for all those who do not treasure hunts, it may seem slightly unnecessary. So for them, it can also be used to encode a messa
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
File Crypter is a Simple program, that is able to encrypt your files and decrypt them. A version of File Crypter is included as an example in the xCrypter Library and is called "ncrypter" which is short for "new crypter".
Dm-crypt + LUKS encrypted device manager. Available functions : open, close, create, show info, add key, remove key, change key. Most important functions : change encryption parameters and reencryption with new master key - both in-place & failsafe.
Discover hidden files you never seen before! NTFS ADS is an forensic/security utility to reveal, list, delete, determine contents, extract and copy hidden files from NTFS Alternate Data Streams.
OW.NET -- 1-Wire API port from Java (and J#) to C#. Use the Dallas 1-Wire and iButton chips with standard C# using a serial adapter (also CF.net) or the TMEX drivers on the Windows platform. No J# distribution installation required.
stproxy is small, fast and efficient HTTP/SSL proxy, features: high-anonymous, basic http authorization, user management using web interface, asynchronous dns resolver, single-threaded (only one process-thread)
Kasai is a 100% Java based authentication and authorization framework. It allows you to integrate into your application a granular, complete and manageable permission scheme.
Deobscufates .NET assemblies, primarily by rearranging IL code (basic block reordering) and removing junk.
Designed to be modular, it is built from reusable pieces.
Grained Login is a fine-grained login system for Qt applications. It uses SHA1 hashed passwords to retrieve user rights from a SQLite database. An administration dialog handles the maintenance of the users, the roles, the rights and the password history.
The Inside Security Rescue Toolkit is a multi-purpose disaster recovery and network analysis system. It runs from a credit card-sized CD-ROM for convenient transport or download. It has read-write support for NTFS-partitions, full partition handling supp
A simple, secure and free tool for encryption and signature for Microsoft Windows and Unix. Part of the IDEALX "OpenTrust" suite (IDX-PKI, IMC, IDX-smbldap-tools...), it provides confidentiality and security through X.509-PKCS certificates. Languages:
CCTVnix will be a complete CCTV video surveillance system for use with V4L2 complient capture cards. Much like Kodicom, and other commercial Windows based software, it will feature motion detection, remote interfaces and event notification. Watch this sp
Freesite Insertion Wizard is a java utility with AWT GUI for inserting freesites (DBR, Edition, FEC support). Contains a lot of help at each stage of the process, and includes site verification to increase availability of the inserts.