Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of Google's scalable infrastructure.
Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
A security scanner coded in a tcl/tk extension for use with linux and unix systems . It automatically downloads patches and exploits how ever testing of them is left up to the user for security reasons
Sportal is made for people that need to know what is going on in their systems. It monitors files that you select, for "hot words" that you also select, through a graphical interface.This is work in progress, i spect it to grown to a full IDS.
This tool will query againt mssql to find any occurance of string in a database.
This will help system admin to locate if any, malicious scripted had been injected to the database.
ITkeys automates the security management process for Windows networks (Active Directory groups). Delegates the ability to amend relevant IT access for employees to their managers. Wizzard based web tool requiring no formal training. No more ADUC MMC!
Fingerprint Copy is a forensic copy utility. The utility creates copy of file(s) and verifies this copies with digital fingerprints(checksum) of the source file(s). The utility is in a early development state. Planed: March 2009 First Command-line Utiliy
As your users rely more and more on Cloud and Internet-based technologies, reliable internet connectivity becomes more and more important to your business. With Bigleaf’s proven SD-WAN architecture, groundbreaking AI, and DDoS attack mitigation, you can finally deliver the reliable internet connectivity your business needs without the limitations of traditional networking platforms. Bigleaf’s Cloud Access Network and plug-and-play router allow for limitless control to and from anywhere your traffic needs to go. Bigleaf’s self-driving AI automatically identifies and adapts to any changing circuit conditions and traffic needs—addressing issues before they impact your users. Bigleaf puts you in the driver’s seat of every complaint and support call with full-path traffic and network performance data, delivered as actionable insights, reports, and alerts.
Latest Release:
v07.01.2024.0 | http://adfoc.us/700817100065016
SHA256(.zip): 5e138cb20f017e958b30d3b548e1de4447c6affae53c4eabb63c38c0a9aa832d
SHA256(.exe): f064ee75e6f53b4e5448be794d1540fcba60a4f37aa12e2dd97aad6be5a2d5b3
Github (Don't trust us? Build the exe your self!):
https://github.com/GenesisFoundationCore/Katyusha
Katyusha, Multiple Payload DDoS Software, that uses images / gif files as Payloads in-order to flood a Group Chat / Discord Server with Messages and Images, Using...
FreeOTFE Explorer allows encrypted volumes to be mounted on MS Windows PCs, and their contents accessed (both reading and writing) via a Windows Explorer-style user interface - with NO administrator rights needed!
A free, open source, "on-the-fly" (OTFE) transparent disk encryption program. Using this software, you can create one or more "virtual disks" on your PC - anything written to which will be automatically, and securely, encrypted before being store
Red Alert is a security alert system that can protect your computer area.
The main goal of the system is to keep intruders off of your computer property.
Open eSign allows software developers and technical parties in a company to create secure, online (web-based) forms and documents that follow a business process flow and enable legally recognized electronic signatures using digital signature technology.
Cryptofon - a safe phone with integrated encryption.
The Cryptofon is designed to enable safe and secure communication trough a regular PSTN line. It supports narrowband connections (~2400 bit/s and lower).