Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
An acronym for cRoss-plAtform accesS control for Enterprise Applications. Rasea aims to become a reference in access control as a service based on the RBAC model.
A library help for signing data with PKCS11 token (certificates with SHA1withRSA Sign Algorithm) and create CMS packages.
It uses Bouncy Castle Crypto API and SUNPKCS11.
Also it verify the signed data and verify signing certificate's OCSP control.
Soutei is a trust-management system for access control in distributed systems. Soutei policies and credentials are written in a declarative logic-based language. Soutei policies are modular, concise, readable, supporting conditional delegation.
Insidias is a next-generation intrusion detection engine, with a focus on speed, efficiency, advanced pattern matching, parallel-processing, modularity, and expandability.
This project focuses on a tool development, FAB DNS Snooper, which allows extract information from the company's DNS cache, to get the technological and social behavior patterns of any Domain Name System. DNS Cache Snooping is used technique.
HcryptoJ (Historical cryptology in Java) is a Java based programming library for implementing and analyzing historical ciphers. HcryptoJ is designed to support research and teaching in historical cryptography and computer science. Licensed under GPL.
Identity and service provisioning software component allows service developers to automate the creation, modification and deletion of users' identity and service subscription information on multiple disparate identity stores.
Based on the free text to image service: http://img4me.com/ You can convert text formatted email address or message into image, and send a shorten URL to share with your friends, so the search engine could not catch these information in a easy way.
A C library with support for logging, configuration, networking, message specification, semaphores, message queues, SSL, timing, epoll and email functionality.
This is a script to perform a dictionary based attack through protocol FTP and SSH2. You need libssh2 to use ssh2 methods. Syntax use: perl ssh2ftpcrack.pl [ssh or ftp] [user] [host] [wordlist] http://packetstormsecurity.org/Crackers/wordlists/
Aimed for web app security with hope of quick reference. WAS papers are scattered among hundreds of resources, some of which are likely to be broken links in some time. All sec pros wish their papers reach the whole world widely for perfect security.
These three tools build Checkpoint, Cisco ASA or Netscreen policys from logfiles. They write dbedit, access-list or set address, set service and set policy commands for the traffic seen in the logs, that can be cut and pasted into the firewalls. WOOT
MUTE is a secure, anonymous, distributed communications framework. Node-to-node connections are encrypted, and messages are routed using an ant-inspired algorithm. The first MUTE-based app supports anonymous file sharing.
pySHOT is a session recorder for windows. (soon linux session recorder also) It's a client/server python app using gearman. To use pyshot you must install pyshot-client from https://sourceforge.net/projects/pyshot-client/ on monitored server
w3pw is a web based password management console written in PHP and using a MySQL Database as storage for the encrypted (using MCrypt) password information.
Mono-Pcsc - A .NET Mono wrapper for PCSC smartcard services. The library includes specific classes to communicate with Global Platform Javacard and Mifare contactless smartcard but will support any ISO7816 smartcard. Includes simple smartcard CLI appl.
ISO18013 Electronic Driving License Java reference implementation. The project implements the host API for reading out ISO compliant electronic driving licenses and a Java Card applet that implements the standard on a smart card.