Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
Try for Free
Custom VMs From 1 to 96 vCPUs With 99.95% Uptime
General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.
Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
Security is a subject of major concern in mobile agents. This project provides a security framework that allows the protection of mobile agents from third parties. A self-protected approach, where the agents themselves manage the process, is used.
A reverse HTTP shell to execute commands on remote machines behind firewalls. Once you run the script on the target machine, it periodically polls its designated server for commands to execute. Traffic traverses firewall as outgoing GET/POST requests.
The Benchmark Editor enhances and simplifies the creation and editing of benchmark documents written in standard languages such as XCCDF and OVAL. NOT CURRENTLY MAINTAINED: please see the Recommendation Tracker for a similar, actively maintained tool
Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure
Native application identity and user-based security for your Azure cloud
Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
SecureSqueak is a fork of Squeak Smalltalk (http://www.squeak.org/) which is designed to be able to run remotely loaded, untrusted bytecodes in a secure sandbox.
Identityflow provides a framework for building protocol flows that perform distributed Identity operations. Examples of Identity Operations are Single Sign-On (SSO) and Attribute queries.
PFL can either operate as a stand-alone firewall log parser or set up to run and configure ipfw. The major focus is parsing, compressing, and filtering *NIX (to include Mac OSX) firewall logs generated by IPFW for quick and easy admin review.
Originally made to crack /etc/passwd files from *nix utilizing the GPU. Uses GLSL and OpenGL. Acts as a parallel to John the Ripper, but for the GPU. Supports both ATI and nVidia, anywhere OpenGL can run.
It provides fast connections to Linux/Unix hosts over SSH protocol. You don't need to remember the IP address, hostname, login, or password. Just select server from the list and press "Connect".
This is a simple ANSI-C implementation of Triple-DES (as described in NIST Special Publication 800-67.) This implementation also includes an 8-bit version that can be used in microcontrollers with memory constraints.
This tool provides the same interface as a SiteErrorLog but provides the ability to specify who should receive error emails, what error emails are sent, and extra information to put in the headers of the error emails to provide easier mail filtering.
JMS Assurance Integration Kit (JAIK) is a collection of Java APIs that allows Java developers to transparently incorporate assurance into JMS messages while wrapping JMS connectivity.
Orizon is a framework intended to provide tools and facilities to test java sources for security flaws. The main goal is to detect common threats as described in Owasp top 10 vulnerability document.
A PHP based auto Local Exploit trigger. It detects kernel version ,gcc and auto pwn it for specific vulnerabilities. A standard proof of concept.This PHP based script, when allows to upload on vulnerable server .
Talos is an environment-agnostic authorization engine that uses the most expressive API you can find, so you can write authorization statements in code that reads almost like english.
This is a tool that has per objective to audit a system Unix. In order to make this procedure, this tool has verifications of configurations and variables of the Operating system.
This project is made with batch scripting. This tool is a virus removal tool that has many tools that are freeware and not open source in it but for obvious reasons why it's not. It also has a scanning feature have many viruses and Malware.
VERISIL - Secure Data Deletion Technology And Library ® is perfectly developed and open source secure data removal library. The name of project is Turkish (means "CLEAN DATA").
VERISIL is developed in delphi, compatible with Lazarus & FreePascal.
To run fortify scan using fortify software, we are using apache-ant till now . There is no maven plugin for fortify.
So i wrote a maven plugin which will do all tasks similar to ant such as fortify parse,scan and clean etc.
SQLPrevent, implemented in J2EE, is an effective and efficient tool for detecting and preventing known as well as unseen SQL injection attacks without efforts from web developers.
Network Intrusion Detection Library. Allows the application programmer to easily capture, classify and detect anomalies in network traffic. Libebox supports modules {engines and parsers} that can be written and later loaded by an application.