With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
A Webmin module for maintaining the FreeBSD Firewall.
This module allows the user to configure the FreeBSD firewall via webmin.
Operating systems supported: Freebsd 4.7 and 5.x
This module runs under webmin > 1.070
P.A.T.H is a collection of tools for inspecting and hijacking network connections written in Perl.
By now it includes a packetgenerator, a rst deamon, a sniffer, an ICMP redirection tool, an ARP redirection tool, an IDS testing tool and an automatic hij
Wanesa: Web Analizer for Non Expert System Administrators aims to be a replacement for the excellent web-scanner Nikto. It supports most of Nikto\'s match file format but also adds parallel hosts scanning to improve performance and increase network load
The SWAP (Secure Wireless Access Point) project is intended for use in embedded appliances. These appliances will operate in the role of a WEP (wireless encryption protocol) and IPSEC enabled wireless access point, IPSEC VPN gateway, and firewall.
Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform.
Geographic restrictions, eligibility, and terms apply.
Add strong cryptography and anonymity to your mailing list! Messages are separately encrypted to each listmember, while stripping any information that could identify the sender. Advanced features include cryptographic pseudonyms and Mix remailer support.
Wellenreiter is a GTK/Perl program that makes the discovery, penetration and auditing of 802.11b wireless networks as easy as possible. All three major wireless cards (Prism2 , Lucent, and Cisco) are supported. Usability is one of the main goal.
Alist is a program that collects hardware and software information about systems and stores it in a database for users to browse and search via a Web interface. The program consists of three parts: a client portion that collects the information, a daemon
PATC is a client/server package for controlling internet access on public terminals (e.g., in a library). Users log in, and are given access to the internet with a time limit determined by the server.
A Perl CGI JavaScript framework for implementing a MD5 based encryption Secure login on both client and server machines. The password is never stored or transmitted as plain text. Also encrypts cookies to maintain sessions.
A modular, flexible and extensible Identity and Access Management system for integrated login, access and profile management across disparate security domains. Supports Apache, PAM, Webcrossing, XMLRPC and SOAP from C, Perl, and Java with more to come.
The Smart Linux Firewall will provide IP filtering, Network Address Translation, Vistual servers, mail relay and DNS cache.
We will use existing network tools as much as possible, and produce a web interface to administrate this tools.
Gherkin is a web-enabled, multi-threaded, centralized security scan manager incorporating Nessus vulnerability scanning, dns and nmblookup host resolving, and nmap fingerprinting and scanning.
Picky - a selective syslog to mysql database daemon. Allows completely dynamic specific translation of syslog data to dynamic mysql table(s). The other projects under this one are tools that take advantage of the flexibility of Picky and demonstrate it
DSBL-helper. Tries to send a special formatted test message to Distributed Server Boycott List through every suspect IP found in complain using several mechanisms (SMTP, HTTP, telnet, SOCKS etc) and reports in.
Urluminator uses urlsnarf to capture URLs that traverse the network and logs them to a MySQL database. It also includes a CGI script that allows you to view and search the DB. From the CGI you can also write out Excel Spreadsheets of the results.
Provide a *simple*, configurable and reliable means of retrieving all rpm updates for specified architectures and releases. Verify that the rpms downloaded are good by means of rpm --checksig.
Features of Cyberarmy.com brought direct to your desktop. They don't want it, so this projects kinda dead, wish I hadn't started it so early haha. Any ideas for an alternate purpose (not an IM client): jwinsatt@adelphia.net
IAN (I Am Normal) is used to minimize the chance of an attacker successfully fingerprinting a honeypot. This is accomplished by creating bogus data and history files, alter creation and modification times, add users, patch x number of programs, etc.
An alternative Identification system that is a replacement for Microsoft's Passport and the Liberty Alliance. Its a simple architecture that is setup so anyone can run a server and thereby have control over their online identification.
Alfandega is a strong and Modular IpTables Firewall. It provides NAT, port-forwarding, spoofing list, blacklist of crackers and spywares sites, protection for tcp/udp scans, DOS/DDOS and Smurf attacks, TCP tuning, DHCP and PPP support and much more.
OpenSST (Open Simple Secure Transaction) is a project to create a simple security protocol for making transaction between (un)trusted parties. The project includes a protocol design specification and a cross-platform software implementation of the speci
a linux netfilter/iptables firewall log summarizer with graphical and command line interface that helps the sysadmin in his daily routine. points of interest can be examined closer to gain further information. you can also run it in command line mode and