One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Try Free
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
A kind of encryption named "simple stream encrypt". The length of plaintext segment or the length of key is not limited, but must greater than zero. The lengths of every plaintext segment in a process don't require equivalency.
A distributed and dynamically threaded password cracker. Completely cross-platform using Qt 4.3. Utilizes 1 server and N clients to distribute password cracking across N machines, each of which can utilize N CPUs.
Libraries and tools written in .NET managed code (MS/mono) to interact with GRC's Perfect Paper Password system [https://www.grc.com/ppp.htm] Source moved to GitHub: http://github.com/ErebusBat/pppNET
iCrypt is an easy to use gui program written in 100% pure python. It implements the Crypto and ezPyCrypto modules to provide secure RSA public key encryption.
jHomeNet is a home automation client/server application written in Java used to monitor and control sensors and devices around your house. The application uses of a number of existing communication technologies including Dallas Semi's 1-Wire and X-10.
This is a library for easy accessing chip cards /smart cards via a chipcard reader. It currently works under Linux, FreeBSD and Windows. It is tested with Towitoko and Kobil readers.
OpenRCA is a highly flexible and modular Certificate management and Registration Authority based on J2EE technology. OpenRCA is designed to be a very flexible, extensible and low cost enterprise PKI solution.
Gateway Anti-Virus allows applications across the enterprise to check files for viruses by providing a SOAP-based virus scanning web service. The system uses clamav for virus definitions and detection.
Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure
Native application identity and user-based security for your Azure cloud
Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
acegi usage example which contains some extended features:
1.get permission from db,
2.tag to test if the user has permission for an url
3.the permission can be refreshed when permission changes.
The goal of this project is to create an expandable secure content store along the lines described by JSR 283 supporting an access model, which incorporates both discretionary and mandatory access controls.
Minarke Is Not A Real Kriegsmarine Enigma
But it will allow you to communicate with one. Command line enigma machine emulator. Full M4 compatability, can be used to decode WWII U-boat messages, or send your own.
psmd listens on an interface and writes the syslog messages that it sees to disk along with a hash. In addition, it can forward system messages to another system as though the messages came from the original device.
TACS (Trust Ant Colony System) is a Trust model for P2P, Ad-hoc and Wireless Sensor networks (also valid for multi-agent systems) based on the bio-inspired algorithm ACS (Ant Colony System).
ISB is a java-developed software for Education purpose only. The codename are TKBot and Guepard Project. This software will let you connect any computer to any IRC server and channel. Do not use this software if you don't have the permission of the comp
soCurious is a firefox extension for capturing HTML form data and storing it, when a password field has been found.
Storage can be a local file or transmission of the data over HTTP or SMTP.
Web Application Gateway (WAG) provides core functionality, such as user definition, authentication and administration, for web applications developed as modules and utilizing the API exposed by WAG. Core technologies are PHP, MySQL and JavaScript.
jCryptPad stores text informationen hierarchical, e.g. passwords, important texts etc. The data is saved in a encrypted xml file. Encryption is done with the AES algorithm. Additionally a password generator and a text encryption editor is also included.
This is an ASP.NET C# implementation of a CAPTCHA. You can choose any; size, font, color, background, pattern, add random lines or even add a background image. Also includes an audible version of the captcha text as well as refresh functionality.
Rainmaker is a command line pseudo random number generator designed to work on multiple platforms. Rainmaker can be used produce cryptographically strong non-blocking output in many formats (Base-16, Alphanumeric, Numeric , and Alpha only modes).
viewstate is a decoder and encoder for ASP .Net viewstate data. It supports the different viewstate data formats and can extract viewstate data direct from web pages. viewstate will also show any hash applied to the viewstate data.
Thumbnail steganography creates a thumbnail from a source image and stores data in it by altering it's color channels. To decipher the data, a new thumbnail is made from the original image and the differences between the pixels are calculated.