Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Learn More
Retool your internal operations
Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.
Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
LockandLoad started as a replacement for the software Predator. It locks, unlocks, and logs you in by a removable device. LockandLoad is aimed to use its own hashing algorithm, file formats, and such for maximum security. [Project In Progress]
You can turn your USB sticks and even your removable hard disks into a portable safe and securely carry your all sensitive data or work. The USBK protects your privacy. www.usb-k.com
This is the repository of my (PP) personal tools, scripts, programs, specifications and writings. I'm giving most of my smaller work to the world to use it, for free.
Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.
Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
ISO18013 Electronic Driving License Java reference implementation. The project implements the host API for reading out ISO compliant electronic driving licenses and a Java Card applet that implements the standard on a smart card.
A daemon for hosing a Defcon style Capture The Flag hacker competition. The ctfd process will deliver flags, verify their presence and receive captured flags from the different teams.
Fight skyrocketing paid media costs by turning your customers into a primary vehicle for acquisition, awareness, and activation with Extole.
The platform's advanced capabilities ensure companies get the most out of their referral programs. Leverage custom events, profiles, and attributes to enable dynamic, audience-specific referral experiences. Use first-party data to tailor customer segment messaging, rewards, and engagement strategies. Use our flexible APIs to build management capabilities and consumer experiences–headlessly or hybrid. We have all the tools you need to build scalable, secure, and high-performing referral programs.
Software to retrieve password of administrative system users stored in a MySQL database, designed for Nagios to access servers via expect or via SSH when you have not the Public key. Not exclusive to Nagios, but very desirable to sysadmins.
VSL is free image steganography and steganalysis software in form of graphical block diagramming tool. It allows complex using, testing and adjusting different steganographic techniques and provides simple GUI along with modular, plug-in architecture
Program for brute force recovering a Oracle password hash. This is my first ever Linux program(after some hello world programs) Still learning how to program C
A Firefox tutorial add-on for adult absolute beginners, to provide information on and to build up understanding of the threats and features of the web. Suggestions to security plugins, links to web howto's. Includes basic navigation help.
Mpctp is a tool for raw packets manipulation of the TCP/IP family that allows a large number of options. It is able to send certain types of packets to any specific target and manipulate various of its fields at runtime.
...The TPM chip will enable you to use hardware to securely store and protect your keys and personal data. See also theTrouSers project.
This driver is integrated into the mainline Linux Kernel - code downloads on this page are only for historical reasons.
Latest Code can be found at:
https://github.com/PeterHuewe/linux-tpmdd
Patchwork:
https://patchwork.ozlabs.org/project/tpmdd/list/
This is a JavaScript library which gives the ability to use cryptographic functionality abstracted of available technologies on the browser side. It executes a cryptographic function with the fastest technology including Java, JavaScript and Flash.
OS independent implementation of the Trusted Network Connect (TNC) specification from Trusted Computing Group (TCG). Functions for loading and communicating with TNC plugins, sample IMC and IMV plugins, TNCCS-XML support on Windows, Linux, Mac, *BSD
A package of scripts to watch for snort alerts, change / create firewall rules to block high priority alerts, and record recent blocks. It will increase block times based on previously recorded blocks
This is a Linux command line program that attempts a brute force dictionary attack on a password protected zip file. If successful it will display the password and automatically unzip the file.
Search Based Password Strength Analyzer
Proof-of-Concept. Determines password resilience against dictionary attacks, opposed to brute-force attacks like most other password strength analyzers. Utilizes Bing API to collect statistics.
A simple encrypter. Uses various encryption algorithms including but not limited to: AES, Twofish, RC4 and IDEA. To enable the stronger encryption standards such as AES the user must have installed the unlimited strength jurisdiction policy files.