eBPF-based Security Observability and Runtime Enforcement
Linux Runtime Security and Forensics using eBPF
Malicious activity detection for Cloud-native applications
Runtime Security Enforcement System
World's fastest and most advanced password recovery utility
Vulnerability Static Analysis for Containers
Use AWS Identity and (IAM) to connect to Amazon Managed Streaming
Secure software enclave for storage of sensitive information in memory
Node.js wrapper for FingerprintJS Server API
A simple SSL/TLS proxy with mutual authentication
Elixir Authentication
Example PAM module demonstrating two-factor authentication
Sign PDF with Digital Signature Certificate
C++ cryptographic library (modern hash functions, ciphers, KDFs)
Scriptable network authentication cracker (formerly `badtouch`)
Angular Material UI component for firebase authentication
Encryption/Decryption demonstration app using the S-DES algorithm
Simplified Architecture for Distributed Systems
Open Source Security tool to audit hashed passwords.
A File Transfer Server built with RBAC and custom business rules
Encryption addressing long-term data secrecy
Distributed reverse / forward proxy and tunneling solution for TCP.