Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Custom VMs From 1 to 96 vCPUs With 99.95% Uptime
General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.
Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
Virtual NetManager WAS a GTK frontend for VDE and QEMU. This project has been recently merged with Qemulator, and became Check the home page for the new project!!
WSFuzzer is a fuzzing penetration testing tool used against HTTP SOAP based web services. It tests numerous aspects (input validation, XML Parser, etc) of the SOAP target. It is only to be used against targets that have granted permission to be teste
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Squid redirector written in python implements a dynamic whitelisting scheme. Users add new websites to the whitelist via a webform, which is user-friendly and sysadmin-friendly, but mitigates compromise and data exfiltration over the web.
This is a simple encryption tool to work with home-grown encryption algorithms.
It can run as either a GUI, a command-line application, or a network proxy.
This project automates the reporting of improper Internet use by the X-ARF format. The two schemas specified abuse_login-attack and abuse_malware are currently implemented. Fixing a Bug and the Date / Timestamp issues. Now it should work fine :)
Kadna is a small curses program written in Python that creates a secure and synchronizable database. This is intended for distributed password and small file (e.g. cryptographic keys) storage. This project in not longer maintained.
A pure python module which implements the DES and Triple-DES encryption algorithms. Triple DES is either DES-EDE3 with a 24 byte key, or DES-EDE2 with a 16 byte key.
DCrypt is an encryption and decryption tool that combines in a smart way multiple algorithms. The combination of multiple strong algorithms makes it much more difficult for hackers to get the plain content of the encrypted file without the password.
An attempt to send a full flagged MIME based email using open relay mail servers (authentication not required). Written in Python3. Using smtplib and email liabraries TODO: Bruteforce the SMTP authentication. Support TLS.
FindSSN is an application that helps individuals and organizations find sensitive numbers in files on computers. It is best utilized as part of a larger plan to identify and protect sensitive data stored on computers.
Programa escrito en python y que permitira analizar las antenas y tarjetas inalambricas para compararlas asi como calibrar la calidad de la conexion. Este es mi primer programa en python por lo que os ruego comprension.
Darkjumper.py
Developed by : mywisdom & gunslinger_
This tool will try to find every website that host at the same server at your target
Then check for every vulnerability of each website that host at the same server
Kojoney is an easy of use, secure, robust and powerfull Honeypot for the SSH Service written in Python. With the kojoney daemon are distributeds other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log fi
ConDEnSE (Confidential Data Enabled Statistical Exploration) will be a web-based environment for statistical analysis of confidential data from various database sources, based on Plone and R, and using the Jackknife method of confidentiality protection.
Zinas : Zinas Is Not A Scanner
a simple tool written in python to be used by penetration-testers
it can brute force FTP,TELNET and POP3 , and verify SMTP users, and fuzzes POP3 password field
A simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a set of [relatively] short python scripts that you can easily examine.