Streamline Azure Security with Palo Alto Networks VM-Series
Centrally manage physical and virtualized firewalls with Panorama
Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
Learn more
Go from Code to Production URL in Seconds
Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.
Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
This purpose of this tool is to manage SOD conflicts within an ERP environment (in our case of SAP). Segregation of Duties (SOD) is an important tool in ensuring that a business is under control from an auditing perspective. Files are available !!!
SIFA (Secure Information Flow Analyser) uses a graph-based approach to reason about the possible vulnerabilities of a system from an information security perspective, supporting multiple views over the system. SIFA is an experimental prototype.
NGIPS is aimed to instrument and enhance Bro-Nids capabilities. While it is still in early stage of its development, we will see bro to pgsql database, web based console and other neat features to be implemented.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
AMAS stands for Ants Mobile Authentication System and it permits to use one time passwords (OTP) to authenticate users and user groups. The user asks for tokens using a cellular phone call, an SMS, or a SOAP interface.
U L CAPTCHA is based on PHP to fight with spam. This is very easy to modify to suit your need.
This package also contains some font-files downloaded from 1001FreeFonts website.
Powered By Sourav Ghosh.
A simple Java based XML Encryption tool for education propose. Uses Apache Santuario Libraries. Ideal to understand the implementation of the XML Security Library of Java. Ravi Dontharaju, Utkarsh Sengar, Ramanuj Mishra, Sukhbir Walia, Jaspreet Singh
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
This program aims at providing a java solution to hide secret information(such as secret file) to JPEG images. Hiding algorithm contains Jsteg and F5. The main(probably the toughest) stuff is encoding and decoding JFIF files.
A more modern wiki focusing on open technologies like SOAP and XML, and upon a more focused form of wiki software that incorporates the elements of traditional content creation, such as from journals, books or periodicals.
ENCAM is an asset management database and configuration backup tool for Cisco network devices. ENCAM pulls configuration data from devices, stores it, reports changes, analyzes configuration defects, generates asset lists and compliance reports.
Software solution for creation and verification of digitral signatures. Can replace tokens and smart cards with mobile phones. Components included are client and server. Can creates, verifiy and store content and signatures. Offers secure sharing.
Integrated vulnerability scanner and penetration testing software
Windows written in C#
SQL Server 2000/2005
Binary search blind and time-based extraction
Request headers
Post parameters
URL parameters
fgdump
advanced pivot technology.
IncrediBL is a project that aims to provide a respected and accountable DNSBL service for various communication systems like IRC and e-mail. The code is primarily used by the IncrediBL service itself, but it can also be used to create a separate DNSBL.
Cryptic is a cryptographic applications suite for encryption/decryption of data, calculating cryptographic hashes or message digests and securing user passwords using a master password in a password safe.
English: Software for encrypting files. No need to install. Ideal to take on pen drive. / Portugues: Software para criptografia de arquivos. Não é necessário instalar. Ideal para levar na pen drive.
A pure python module which implements the DES and Triple-DES encryption algorithms. Triple DES is either DES-EDE3 with a 24 byte key, or DES-EDE2 with a 16 byte key.
I have implemented transaction signing in Oracle application using digital certificates. Created a java bean to access windows default keystore (SunMSCAPI) to get all certificates and populate them in oracle forms application, Signing oracle forms...
TPMitigation is a transparent HTTP-proxy for mitigation of drive-by-malware. Content is converted on-the-fly and/or replaced where there is a risk of a infection by embedded drive-by-maleware. Also visit http://tpmitigation.sourceforge.net/
Encryption and Decryption Software that allow you to type your own password or Key for "All Types of Files" (gif, jpg, doc, xls, txt, tif, etc..etc..etc..)
mod_auth_certificate is an authentication module for Apache Webserver 2.x. It adds the capability to forward usernames returned by mod_ssl to authorization providers like mod_authz_ldap.