One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Try Free
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
GraphicalOSfp is a python application which aims to collect random data issued by remote systems in IP and TCP sequences. These data are then displayed in a 3D referencial to highlight an attractor of the random engine of the remote machine.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
This application is used to monitor your home via email / FTP using USB camera and microphone , there is a lot of configurations to customize it upon needs. A motion detection is also supported. More info, in my blog http://osama-oransa.blogspot.com/
SQueRT - A Simple QUEry and Report Tool. SQueRT was created to make the data from Sguil more accessible for people that do not require the real-time event handling and analytical aspects of the TCL/TK Sguil client.
Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant.
*** Hyenae is back ***
Hyenae will be continued here: https://sourceforge.net/p/hyenae-ng
Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure
Native application identity and user-based security for your Azure cloud
Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
Slogger is a session keystroke logging utility. The goal of the design is to provide the same features available in many commercial products, but under the GNU license.
Proxy Tester is a proxy list tester and then it generates a wpad.dat file you can use for your browser based on working servers. wpad.dat file selects a random proxy server from the list of provided working proxy servers with each connection request.
FBAC-LSM is a Linux Security Module based implementation of the Functionality-Based Application Confinement (FBAC) model. Policies to confine processes are created using reusable abstractions which describe the functionalities applications perform.
Zero Wine is a malware's behavior analysis tool. Just upload your suspicious PE file (windows executable) through the web interface and let it analyze the behaviour of the process.
qingy is a replacement of getty. Written in C, it uses DirectFB to provide a fast, nice GUI without the overhead of the X Window System. It allows the user to log in and start the session of his choice (text console, gnome, kde, wmaker, ...).
openSMS4 was created by tao.tang316 and implemented in C, which is an opensource implementation of the SMS4 encryption algorithm (including simple checking codes).
XTEA (eXtended Tiny Encryption Algorithm) support for db4o opensource object database. XTEA is a block cipher that operates on a 64-bit block size with a 128-bit key. An extremely tiny but very fast encryption algorithm (with cycles less than 32 rounds)
The DDoS Attack Defender Tool is a simple, yet effective python script that defends your linux system against a distributed denial of service (DDoS) attack by limiting the number of connections per IP Address.
This is free Java desktop application to keep your note in safe from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source to another in confidential manner.