Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
A configurable system for synchronising multiple passwords of different types. Password quality can be imposed by using histories, cracklib based tests, and forcing certain passwords to be distinct. CGI and PAM modules exist for tight integration.
This tool will allow obfuscation of UNIX scripts listing an interpreter as the first line. It is most useful for distributing functionality in a commercial product or a high user volume environment where you wish to hide proprietary information.
SING stands for 'Send ICMP Nasty Garbage'. It is a tool that sends ICMP packets fully customized from command line. Its main purpose is to replace the ping command but adding certain enhancements (Fragmentation, spoofing,...)
The Solitox Community system provides an integrated real-time chat service, web interface, and a scalable infrastructure for adding more services with common credentials. These interfaces allow a greater level of communication for your users.
Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
Advisory Check is a tool for monitoring the security of installed software.
It gathers security advisories using RSS/RDF/XML feeds, compares them against a list of known software, and alerts you if you're vulnerable.
Let advchk read advisories for you!
This project provides a user-level command to edit NFSv4 Access Control Lists
(ACLs). The command allows users to display and change NFSv4 ACLs from
clients that do not have complete NFSv4 ACL support.
EyeLog is a flexible and extensible log analyzer for any type of log file. It allows one to define custom regular expressions (perl-style) for pattern matching and custom printf formats for reporting. The goal is to provide a universal log analysis tool.
pwsafe is a password database command-line utility. Passwords are kept in an encrypted database. Compatible with Counterpane's Win32 PasswordSafe ( https://sourceforge.net/projects/passwordsafe ).
dumpnet is a collection of bash scripts that allows you to backup multiple servers simultaneously. You can do incremental file system dumps with tar, dump and rsync, backup databases and much more. AIDE can also easily be integrated.
Multiple Remote SHell Management On Demand aids in the management of multiple systems via SSH and shared keys. In its simplest form one can run one script on multiple systems returning and logging stdout and stderr for each system on demand.
The Nemesis Project is designed to be a command line based, portable human
IP stack for UNIX-like and Windows systems. The suite is broken down by
protocol, and should allow for useful scripting of injected packets from
simple shell scripts.
CryptoPy is a pure python implmentation of cryptographic algorithms and applications. The algorithms are developed for readability more than speed. The collection now includes IEEE 802.11i specific algorithms that generated the test vectors for 802.11i.
BFBTester is great for doing quick, proactive, security checks of binary programs. BFBTester will perform checks of single and multiple argument command line overflows and environment variable overflows. Versions 2.0-BETA and higher can also watch for tem
artraced is a multithreaded traceroute detector.
It reveals the tracing ip and hostname. If in promiscuous mode it reveals all incoming traceroute attempts to any workstation on its subnet.
Run as daemonize (-d ) if specified in command line.