General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.
Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
Try Free
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Java Crypt Framework (JCryptFX) is a java-based education project for de-/encrypting streams. It has a implementation of DES and TripleDES in it but the framework user can write own cryptography algorithms and stream types for it - includes a console app
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
NetworkTools has 2 components: A protocol analyzer which plays a TCP client or server or pipeline, which sits between a client and server and shows how they communicate. A port scanner can scan a range of IP addresses and ports. See screenshots.
The SSTCP protocol permits to establish a simple TCP/IP connexion across multiple AES secured channel. Simple but (/so?) secured and strong cryptographic methods are used. OpenSSTCP is the LGPL implementation of the SSTCP protocol.
ISP Toolz is providing the SLC Enterprise Security console for snort. Supports Cisco pix, snort and intruvert natively. Building additional support and API for additional device support. This is the open source version of our commercial software. This op
aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump, aireplay, aircrack, airdecap, and some tools to handle capture files (merge, convert, etc.).
PasswordChain is a secure Web-based password database designed to securely encrypt and store passwords. Data is encrypted using the Blowfish algorithm and stored in a MySQL database.
Pqmf is an open source project which inted to create a strong alternative to PGP. Using Pqmf you will be able to to safeguard your private files under 160bits long Keys in the simplest way posible, just choose a file set a password and voila!.
PRE4J (Partial RDF Encryption API for Jena) is a lightweight API for encrypting selected RDF graph elements. PRE4J provides cryptographic extensions to the Jena Semantic Web Framework.
It is a wireless and wired authentication manager to enable Internet sharing in a free and fair way. It incorporates a captive portal with decentralized authentication, including community trust features. It is also deployable in Linksys WRT54G routers.
SecureRSS - Secure RSS-Syndication for Mobile Devices. Non-repudiability of RSS-Newsfeed channels/items on the assumption of a resource-constraint client using w3c-ietf xml signatures. (proof-of-concept)
Linsec is a shell script firstly designed for slackware linux 10 and now supports most of linux distros. Linsec improves security of Linux systems (kernel parameters, network behaviour, iptables, critical files permissions)
spamsink is a fake (honey pot) SMTP server written in PERL for dumping SPAMs. A fake relay is under develompent (version 0.3), parsing the message body to trigger web bugs is planned.
SrvReport is a simple and featurefull server monitoring and reporting
system. It will send every day a mail with the latest
state of the server including traffic (via /proc/net/dev and/or iptables), cpu, mail, http, ftp reports
and other logs.
PAM Sessionrun is a PAM module that can run a script on the start and stop of a PAM session. The script is provided the username and password (if available) of the user when it is ran. Can be used for login/logout scripts and restricting system access.
CryptoHawk can calculate hashes (md2,md4,md5,sha-1,sha-256 and hmac). It can also perform cryptanalysis like frequency analysis for substutition cipher and exhaustive key search for rotation cipher, as well as searching internet databases for md5 hashes.