Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform.
Geographic restrictions, eligibility, and terms apply.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
gPWG is a GTK based password generation utility. gPWG allows you to create a completely random password or you can choose the password exact contents. Options include: number of passwords, random password length, allowed characters.
A light script to make a black-list system troug iptables. You can create the black-list and manage it troug this program. Please read README file to know better this script.
GDigiDoc is a GUI frontend built with GTKMM for DigiDoc (alias OpenXAdES - http://www.openxades.org) library allowing users to create digitally signed documents
and verify signatures of other users. Signatures follow the XAdES (alias ETSI TS 101 903) and
Python Advanced Wordlist Generator is an easy to use software to create profiled wordlists and make various operations on an existing wordlist. This software is part of the "Kalkulator's Knights" project.
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
The goal of this project is to create a GnuPG front end for Mac OS X. To that extent, it will make installing GnuPG on OS X easier and provide inter application services to access GPG. Also, GPGME wrapper in ObjC will be done.
The Reco Platform is a Cross-platform forensic platform that will allow security researchers to create forensic prototypes in shorter amounts of time with greater efficiency.
Dm-crypt + LUKS encrypted device manager. Available functions : open, close, create, show info, add key, remove key, change key. Most important functions : change encryption parameters and reencryption with new master key - both in-place & failsafe.
SquiggleSR is a Firefox plug-in which generates personalized queries to search engines to confuse search engines and protect user’s privacy. User favorites RSS flows and search engine statistics are used to create coherent and news related queries.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Use prime numbers and pseudorandom number generators to create pseudorandom permutations to "shuffle" bits of given data (passwords, logins, PINs, files, directories). It is designed to be very secure (I hope so).
The goal of this project is to create an expandable secure content store along the lines described by JSR 283 supporting an access model, which incorporates both discretionary and mandatory access controls.
Erinaceus is an esoteric two dimensional programming language which uses bitmaps as sourcecode. It is turing complete and able to modify itself. It has been created with the goal to create a language that can be hidden in pictures easily.
This application is meant for those end users, who wish to quickly learn how to use XACML based systems. It provides the user to create and load XACML policies, and then analyze the XACML response in a separate window.
Security Analyst Network Connection Profiler [sancp] is a network security tool designed to create connection logs and record network traffic for the purpose of auditing, historical analysis, and network activity discovery.
A graphical tool for generating RSA and ECDSA cryptographic key-pairs, creating Certificate Signing Requests (CSRs) from them, and combining the key-pair with an issued digital certificate to create a secure portable container (PKCS12, JKS, JCEKS, etc.).
Bio-SPHERE aims to create a flexible, secure and multimodal biometric platform for applications that require biometrics. Bio-SPHERE is formed by a network of interacting nodes that interface with biometric hardware and offer biometric functions.
BarTex is a system designed to create inexpensive tickets for events. It uses a crypto system to verify tickets using barcodes; thus eliminating the cost of expensive, colorful tickets that cannot be photocopied/forged.
EM stands for enforcement module. It is a security module which create bastion host machine. the process involved reading an XML policy file and translate it into Linux/Unix system call set. the translation process is created by CSG(command set generator
HashserGUI is a GUI interface for Jacksum. It is intended to provide a graphical tool to create hashes for files within a directory, and check the hashes generated. It works with many hash functions, as md5, sha1, sha256, sha512, md4, crc, etc.
Offers a complete structure of security for Spring-based projects. It turns any bean in a protected resource. It uses a non invasive approach, and once you create a security policy it makes the bean a PEP (Policy Enforcement Point).
Panoptis plans to create a network security tool (N-IDS) to detect and block DoS and DDoS attacks. The programming language is C++, and the input is being provided by routers.
This is the worlds first and probably only FLOSS project aimed to create a lowbudget, based on availble technology, cruise missile. No this is not a Joke, its for real. Why? Since no one has tried to do this before and certainly not under the GPL.
Secwatch is an intrusion detection system using log analysis to detect service scan and other brute-force attempts on a server or other computer using system logs and will create temporary firewall rules to block offending IPs
Packet generator for security research (currently RADIUS protocol). Create either large highly variable test runs or short programs demonstrating a characteristic sequence of packets.