Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
Start Free Trial
$300 in Free Credit Towards Top Cloud Services
Build VMs, containers, AI, databases, storage—all in one place.
Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
Buffer0verfl0w Security is a team of skilled security developers, who are
authoring security applications, whitepapers, and discovering security flaws in
software, publicly disclosing their projects and encouraging volunteers to help improving them.
Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform.
Geographic restrictions, eligibility, and terms apply.
SIDEN is a distributed network discovery tool used for intrusion detection research purposes. It simulates coordinated/distributed network probes against a network. The traffic generated can then be analyzed to improve Intrusion Detection Systems.
Bypass is an IP forwarding/tunneling tool which can be used where limited bypassing of a firewall is necessary, but relaxing the restrictions in the actual firewall is not an option. The aim is for bypass to be automatic and transparent.
SocketWatch is an anti-port scanning program. SocketWatch is configured to listen to specified ports, and if a connection is made from an unauthorized host, Ipchains is used to completely DENY the host.
A perl server that accepts plain text mails for users and sends them out encrypted. Could be used in a company so that your accountant can be in contact with the salerperson in a secure way, without you needing to tell the accountant everything about PGP
Checking the integrity of a file on a remote and local untrusted or compromised server is to be achieved with minimal computational and storage requirements on part of a healthy verifier.
fwsnort translates Snort rules into equivalent iptables rules. The iptables string matching capability is heavily used, along with custom signature matching chains built by fwsnort.
ARCCIOS aim is to analyze network config through the security prism. It is working at that time for Cisco devices and provide security dashboard, full reports and todo list under html and csv.
chaRME is a web based open source Risk management engine, which currently supports the steps necessary to implement and maintain an ISO/IEC 27001 compliant Information Security Management System. It also supports the international payment card standard P
CMS identifier (cmsident) attempts to identify the content management system used to generate a given web site (and its version). Future versions will automatically look up found versions in vulnerability databases to alert if updates are necessary.
Library dedicated to the parsing of network protocols and designed to be fast, auto-adaptive, asynchronous, modular and completely independent from client/server code.