Simplify IT and security with a single endpoint management platform
Automate the hardest parts of IT
NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints for more than 20,000 customers.
The NinjaOne automated endpoint management platform is proven to increase productivity, reduce security risk, and lower costs for IT teams and managed service providers. The company seamlessly integrates with a wide range of IT and security technologies. NinjaOne is obsessed with customer success and provides free and unlimited onboarding, training, and support.
Learn More
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
COMMON VULNERABILITIES AND EXPOSURES (CVEŽ)
DATABASE BROWSER, CVEBROWSER
A web search engine for the CVE dictionary, targeted to be used on a intranet.
CVEBrowser uses Java Servlets / JSP and MySQL and its designed to work well on RedHat
Green Screen: A Linux based Advanced Syslog Server for Juniper NetScreen Firewalls - Can be expanded later to support other products. It can capture syslog messages, parse them, store them in a MySQL database. A Web GUI interface is also included.
Sentry Firewall CD-ROM is a Linux-based bootable CD-ROM suitable for use as an inexpensive and easy to maintain Firewall or IDS Node. The system is designed to be immediately configurable for a variety of different operating environments via a config fil
Get Avast Free Antivirus | Your top-rated shield against malware and online scams
Boost your PC's defense against cyberthreats and web-based scams.
Our antivirus software scans for security and performance issues and helps you to fix them instantly. It also protects you in real time by analyzing unknown files before they reach your desktop PC or laptop — all for free.
This project allows placing rules into an iptables based policy, and having these rules expire after a set time. This is useful for opening ports after successful port knocking, or for blocking source IPs using port sentry.
A shell script which determines by brute force the best compression format (bzip2, gzip, Z, zip, etc.) and which compression level to use in order to archive a file the smallest possible.
GNet Server - Network compression client/server software. Compresses data over slow networks to save on the cost of bandwidth. Server is developed for Unix and Windows platforms, The client will run on Windows based PCs.
Qryptix consists of a PAM object and utilities for session- and key-management for encrypted home directories using the International Kernel (CryptoAPI) patches for Linux. It simplifies login/logout, mounting/unmounting, and key generation and changing.
Picsart Enterprise Background Removal API for Stunning eCommerce Visuals
Instantly remove the background from your images in just one click.
With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
Automated Security Tools (autosec) aims to provide
automatic tools which network administrators may use
to help check and test the security of their network.
UnityCA is a Certificate Authority "front end" based on the Community-Oriented CA (COCA) model, which was primarily developed for non-profit "free CAs." Organizational and end-user interfaces provide trusted web management of the installed CA (eg ElyCA).
This is a Shell Script. It transform the logs of the linux in HTML pages, with colored erros.
I dont speak english very well but I think... the name explain everything. the name of the script is LOGhtmlER.
This is a powerful packet monitor program like sniffer that runs under linux's text mode . Its functionalities include the ip/non-ip retrieval and monitor from data-link layer to application layer
Live Security/Forensics Linux Distribution, built from scratch and packed full of tools useful for vulnerability analysis, penetration tests, and forensic analysis.
Fingerprint Laboratory - a portable and layered package of libraries and tools for academic research and productive use that allows people to easily integrate Automatic Fingerprint Recognition technology into their software or system with little know-how.
Combined coded remote-administrative service with SSL secure port scan, anonymous routing and third-party plugin inbuilt for quick and automatic "scan and install" process. Easy to use and will work under firewalls and up to 1024 bit strong cipher
Shoki is a free, open source network intrusion detection system. The fundamental design goals are simplicity and modularity, and the focus is on traffic analysis rather than content inspection.
Tool to analyse syslog message. It parses log message and alerts the administrator on certain conditions. It can also do some reporting on existing logs.
Logcheck is software package that is designed to automatically run and check
system log files for security violations and unusual activity. Logcheck
utilizes a program called logtail that remembers the last position it read
from in a log file.