Get Avast Free Antivirus | Your top-rated shield against malware and online scams
Boost your PC's defense against cyberthreats and web-based scams.
Our antivirus software scans for security and performance issues and helps you to fix them instantly. It also protects you in real time by analyzing unknown files before they reach your desktop PC or laptop — all for free.
Free Download
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
GTCop Professional Security Appliance aims to provide a powerful tool for satellite communications, with enhanced QoS and bandwidth controls. As derived from IPCop Firewall, it is a stable, secure, easy to configure and maintain GNU/Linux firewall box.
TEF is a fully-featured, secure and has advanced capabilities including the intuitive Xsentry easy-to-use administration graphical user interface with WYSIWYG (What You See Is What You Get) front end which has drag and drop security policy deployment.
HardWall Firewall: Is an iptables script that does the following:- Port Forwarding, Packet Filtering, Statefull Packet Inspection, Port Redirection, Masqurade, SNAT, DNAT, NAT & Bridging - Functions as both a Workstation and IP Forwarding Firewall
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
HoneyBow sensor, a malware collect tool based on the high interaction honeypot. Released under the name of mwcollect.org, can be integrated with nepenthes sensor and the mwcollect alliance’s GOTEK architecture.
Software repository of the hack://src project. Includes security related software for crypto, vulnerability/patch notification & management, and ultra low level system access for stealth forensics & intrusion detection or malware removal.
RWSecure parses the /var/log/secure (or specified secure log) file for Invalid usernames or Failed password. If more than x invalid or failed attempts by one IP(i.e. brute force), it will add that IP to your /etc/hosts.deny file by default (also configur
Nmap Log Stripper is a Bash script intended to be a way to condense all, or some, of the IPs of a "random" (-iR) nmap scan into a file for later usage.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Project Naranja will uses Padlock Security of VIA EPIA mini-ITX motherboards in order to provide a toolkit to set up and use encrypted filesystems with Linux. NOTE: Files are now hosted at Google Code: http://code.google.com/p/naranja/
Smoothwall Mod for Dansguardian User group editing. Creates five initial groups; everybody, child, preteen, teen and adult. Intended to automated the editing of filtergroupslist and exceptionuserlist via the web interface of Smoothwall. Inserts as a new
Computer Breaker is a network testing tool that allows networking administrators to test if a computer is vulnerable to malicious attacks. Using the Nessus scanner, computer-breaker scans the remote host and automaticaly exploits its vulnerabilities.
OneKript is a Front-End for the program of disk encryption "on the flye" TrueCrypt, released under license GPL. It has been developed with the environment Kommander for KDE. At the moment is available the version 0.7.2.
The Koozali SME Server is a simple and robust server gateway for SOHO
The Koozali SME Server is the open source community side of the original e-smith server.
SME Server consists of a modified Red Hat / CentOS Linux installation, together with a number of server applications as well as the server management web panel.
Its strengths are its ease to use for anyone able to use a web interface, and its robustness, giving the ability to recover its initial state even after any upgrade.
The server is designed for Small Offices and Home Offices to act...
fortune-mod-isec is a compilation of straps/tips from the Information Security World. The straps have been compiled/produced from the Internet, books, norms, standards & collaborators' know-how.
PyIDS is an intrusion detection system whose aim is to provide concise information to administrators about some parts of the system i.e filesystem checksums, unknown connections to the machine, access control lists of special files, log revision...
sshvpn is a shell script based tool which uses openssh vpn tunneling feature to connect two private networks or attach a host to the remote private network securely over the internet.
The WSGW (Web Security GateWay) is a security-centric HTTP/s proxy, based on the Apache web server and some bundled third party modules.
The goal of the WSGW project is to provide a web application and XML "firewall" for the masses.
Bash shell scripts to run an OpenSSL Certificate Authority (CA) and issue self-signed HTTPS server certificates (or cert signing requests) for intranets. Scripts: genrootca, genservercert, genusercert, revokecert, csv2usercerts, certificate-mailer.
LINReS is a tool which can be used by Incident Response and Computer Forensic Teams during initial response phase to collect volatile and other non-volatile data from a compromised Linux machine using statically compiled binaries.
GuerillaTactics is an effort to bring "Computer Education Through Security Analysis". We aim to create a security education "lab kit" including management software and a curriculum framework.
This is another ip/host blockeer used to create blocking entries in both the hosts.allow file, and also pf tables. Blcoks are built on illigal logins and also final block log entries from hosts.allow. The ability to pull in external blacklists once a day