Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Start Free
Build Securely on AWS with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Multispoof exploits weak authentication method based on IP-MAC pairs checking, implemented frequently in Ethernet networks by ISPs. This program allows to multiply user's throughput and serves as a demonstration of spoofing effectiveness.
Ethereal Network Traffic Session Reconstruction for Internet Protocols. Management Console to reconstruct emails, web sessions, VOIP sessions, FTP, and all known supported Internet Protocols for Network Forensics. ***UPDATE*** Project release scheduled.
GUI written in java to make configuration files for ipsec (racoon and setkey) on linux. It is intended to be as simple and intuitive as possible, but with some advanced features.
This project is named PSCM, an acronym for POSTFIX, Spamassassin, ClamAV, Mailscanner. It is an integrated RPM package featuring a SMTP mail server, with spam filtering and virus scanning capabilities, designed for easy installation and usage.
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
Automatically verifies md5 and sha1 checksums using either a user entered sum or by searching in a file that can be held locally or remotely via ftp or http.
Cameloid is a new TCP/UDP based P2P voice and video encryption software, that will provide high level of privacy for all levels of communication using only quality secret-key ciphers to ensure long-term security.
A low cost software and hardware KVM over IP and remote Console monitoring
solution running on Linux. Secure administration and access to remote
keyboard/video/mouse and serial console output. Easily configured and
customised to suit user needs.
Screenalert, are notifications windows styled, every user/program can send an alert on your display. Alerts can be permanent or disappear after x seconds. Several themes are available for toaster popup. It is entirely gtk based and is licensed under the
Java Based Cryptographic P2P Messaging Client, is based on a client-server architecture. The Client is made in SWING. The server is text based. Server keeps tabs on presense and the users public keys. Presentation: http://varun.accosted.net/talks.php
WebScarab for Eclipse is an extensible framework for analyzing applications that communicate using the HTTP protocol. It includes an HTTP monitor and an HTTP proxy for recording all messages between your machine and remote servers.
Ce module en PHP permet de gérer les accčs ŕ des pages web de maničre trčs simple. Il repose sur une base de données MySQL et est livré avec une interface de gestion accessible via un navigateur internet.
Apache security module. Makes Apache configurable to work as diffrent user, group and diffrent chroot() environment for each VirtualServer and for ~user request. Designed mostly for ISP to make Apache secure.
Antispyd is an HTTP/HTTPS threats filtering proxy server written in pure C under Linux. The main goal of the project is to develop a free, secure, fast and extensible solution to fight against current Web threats, anonymize and control web traffic.
CryptoServer is the daemon for handling Sign-Verify, Encryption-Dencryption, Envelop-Openenvelop based on OpenSSL including the SEED symmetric algorithm (Korean Standard Symmetric Algorithm).
It's interface is just tcp/ip socket and very easy to handle
iDVR (formerly Devolution Security System) is a video surveillance system which can handle up to 16 cameras with motion detection, notification and record on motion to mp4. Stream over the LAN (Multicast) or Over the Net (Unicast).
KINEC Is Not Encrypted Chat is a client/server chat program designed to keep you secure. It uses strong algorithms for encryption and authentication and will not compromise security.
Proxy Glue lets users glue together socks5, socks4, connect, http, and cgi proxies into one big field of potential paths, with configuration done right from the browser.
nf-HiPAC is a high performance packet filter for Linux. It provides the same rich feature set as iptables but uses an advanced algorithm to minimize the number of memory lookups per packet.
The MACA objective is to provide user authentication, session management and authorization services independently of platform. Authorization servive is based on a contextual role-based access control model that extends NIST RBAC
Sussen is a tool that checks for vulnerabilities and configuration issues on computer systems. It is based on the Open Vulnerability and Assessment Language.