eBPF-based Security Observability and Runtime Enforcement
Malicious activity detection for Cloud-native applications
Linux Runtime Security and Forensics using eBPF
Runtime Security Enforcement System
World's fastest and most advanced password recovery utility
Directory/File, DNS and VHost busting tool written in Go
Vulnerability Static Analysis for Containers
Node.js wrapper for FingerprintJS Server API
A simple SSL/TLS proxy with mutual authentication
Secure software enclave for storage of sensitive information in memory
Use AWS Identity and (IAM) to connect to Amazon Managed Streaming
Elixir Authentication
Example PAM module demonstrating two-factor authentication
AI and semantic technology Web Application Firewall
Sign PDF with Digital Signature Certificate
C++ cryptographic library (modern hash functions, ciphers, KDFs)
Scriptable network authentication cracker (formerly `badtouch`)
Angular Material UI component for firebase authentication
Encryption/Decryption demonstration app using the S-DES algorithm
Simplified Architecture for Distributed Systems
Open Source Security tool to audit hashed passwords.
A File Transfer Server built with RBAC and custom business rules
Encryption addressing long-term data secrecy