Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
$300 in Free Credit Towards Top Cloud Services
Build VMs, containers, AI, databases, storage—all in one place.
Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
Proxy Tester is a proxy list tester and then it generates a wpad.dat file you can use for your browser based on working servers. wpad.dat file selects a random proxyserver from the list of provided working proxy servers with each connection request.
Security Configuration Assistant for Apache, MySQL and PHP (SCAAMP) is a security configuration vulnerability auditing and fixing tool for Apache HTTP Server, PHP Interpreter and MySQL Database Server.
Telnet over HTTP proxy. Allows users behind firewalls to tunnel Telnet sessions over a HTTP connection. Server uses Java servlets with a Java or C# client.
A simple access control app that intends to replace declarative jaas security in web.xml for web applications deployed on Jboss app server and TOMCAT container. Also include an extension for PHP applications.
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Server/client suite which provides per-user access control/firewall/QOS. Robust and high speed implementation is secure against MAC/IP spoofing, and can scale to large networks with many clients. Options for additional monitoring and captive portal.
BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
Brute Force Grid is a Process sharing framework on Peer to Peer overlay network. To demonstrate the application we have used the brute force attack to the hashes by hashing algorithms. License : GNU General Public License version 3 (GPLv3)
A PHP based auto Local Exploit trigger. It detects kernel version ,gcc and auto pwn it for specific vulnerabilities. A standard proof of concept.This PHP based script, when allows to upload on vulnerable server .
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.
Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
DISCONTINUED - phpSpamManager ( a Spam Manager GUI ) is a graphical interface for managing spam quarantines. It's fully adaptive and will suit any mail server/spam filter (like spamassassin )as long as messages are stored in individual files (like postf
Blowfish Encryption over HTTP. It encrypts with your username and password using the server-generated unique key which you must have, so as to use this service.
The malicious third-party can't decrypt your login info if they don't have the key.
Authenticating proxyserver software for Mac OS X. The front-end is written in Obj-C using the Cocoa framework, but the actual proxy daemon application is written in C using plain BSD sockets.
ProxyDetector is a free & OpenSource Proxy detector using PHP4 or PHP5. Can be used on Linux (Unix, etc) and also on Win. He also can know if an user using the TOR network.
EasyVote is a new easy to use, secure and transparent cryptographic online voting scheme for small elections (up to 500 voters).
The project contains the PHP files necessary to set up the server as well as the management tools.
A Cryptography php module very easy to use, could be used to protect databases, files, ad hash codes in every server that support php. Nowdays the most used hash algoritms are weak and there are many huge database with the hash code and the relative pass
A toolkit of nitty-gritty classes from real-life projects. Contains generic snippets along with things like server-side DOM implementation or RSA or code generation tools.
Mock in the Middle is a Java Proxy designed for testing network applications. It serves as a mock proxy between a client and a server. By recording and replaying network conversations, the client can later be tested without a live server.
A framework for information security management. It has the centralized server for managing the IDS sensors, log consolidation and correlation, report generation etc. Also it has customized IDS sensor based on snort.
RevolvingProxy is a cross platform HTTP Proxy application that is designed to be installed on a server that has been assigned multiple IP addresses. Each connecting client is assigned a different IP address for security testing or other purposes.
A Cisco(c) centric VMPS Server interface. A web based (PHP) interface to manage host registration for Dynamic VLAN policys. Also provides configuration change management for the VMPS configuration.
phpFreeLog is an advanced server logging tool written in PHP. Easy implementation and control allow you to take charge of how and when phpFreeLog will be used. Edit how the log will look through use of its built in scripting language and modular system.
DcSecure is a php based wrapper that cleans Get, Post, and Server variables so as to defend against php vulnerabilities. It cleans all variables and replaces the orignal ones with the cleaned ones so the target scripts do not require modifications.