Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Amnesia is a design-rich 'host-proof' web application that encrypts and remembers all sorts of personal information from passwords to private notes. Project now hosted at Google Code: https://code.google.com/p/amnesia-app/
TorK is an Anonymity Manager for the KDE Desktop. Browse anonymously on Konqueror/Firefox/Opera. Send anonymous email via the MixMinion network. Use ssh/irc/IM anonymously. Control and monitor your anonymous traffic on the Tor network.
Steganography framework with support for several carrier file formats: Pixel graphics, RIFF WAVE format, any sound to save lossy/analog, standard MIDI File Format, IL or .NET assemblies, XML documents, unsorted text lists.
A web-based system to assign a set of known persons anonymous ids, such that every person only receives one id. The ids cannot be mapped to the corresponding persons afterwards.
Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure
Native application identity and user-based security for your Azure cloud
Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
adlc (amp-off debian livecd) is a security-oriented debian livecd. It contains tools and frameworks to perform security audits. for login try: root/toor and have a look at adlc.sourceforge.net. It's like a README ...
EDSS stands for Easy Debian Security Script and it is a very easy to use script that installs additional software, configures the software, and scans a GNU/Linux Debian server for possible security risks.
Captive Portal to use with IPTables (with ip_set module). It's permit to control access from a sub-net to internet or to another sub-net. Uses unix account to validate users. It's an alternative to Natacl, Sphirewall, Zorp, Nocat, Nufw and others.
Kotak is just another cracking tool which is based on Java. It is used to crack various types of hash functions with various types of attacks. It's developed to be as simple as possible, so that anyone can use this tool easily.
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.
Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
DotNetSSH is a pure .NET implementation of the SSH2 client protocol suite. DotNetSSH development is alive and active. DotNetSSH is a fork of Tamir's excellent SharpSSH, itself is a port of JCraft's java Jsch.
a perl script to perform Vigenere (polialphabetic enciphering and deciphering) for teaching classes. Keys are stored in a dedicated file in order to have a one time pad to use for messages exchange.
This project automates the reporting of improper Internet use by the X-ARF format. The two schemas specified abuse_login-attack and abuse_malware are currently implemented. Fixing a Bug and the Date / Timestamp issues. Now it should work fine :)
This is a simple encryption tool to work with home-grown encryption algorithms.
It can run as either a GUI, a command-line application, or a network proxy.
This simple Java applet will use a few URL obfuscation methods to mask a URL. This isn't meant to be anything earth shattering, but maybe useful. It does more than basic URL encoding (although it does that). Also contains a library to do it all.
Kryptographie is a student project to implement historic encryption methods. It has a linux style command line interface. This project will also include the notes for my talk I'll hold on cryptography in school. (in German).
Q Disassembler is a flexible disassembly engine that aims to provide precise information about machine instructions while maintaining OS-independence and performance.
inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.
phpKeyMgr is a PHP based SSH key managing software.
You can create multiple keys, define servers, and choose valid keys for each servers.
After this you can export the authorized_keys file with ease.
A Javascript implementation of the Blowfish Encryption Algorithm described by Bruce Shneier circa 1993. Blowfish is a keyed, symmetric block cipher common in cipher suites and was placed, by Mr. Shneier, in the public domain.
Md5 Project es un programa que encripta una cadena de caracteres y la mete en una base de datos, para posteriormente desencriptar el hash creado. Para ver el programa en funcionamiento: http://md5-project.razican.com/ Está traducido a tres idioma