Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
Download Free Tool
AI-generated apps that pass security review
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
A smart malware creator to create 26 types of malwares.
...In this era of computers, threats have increased more then before & that's why software's like these come in handy. With this software we can create malwares in different formats. We can view & edit the source code of those malwares. Ethical Hackers can use this software in a secure way during pen testing.
...How to use :
Step one - Open Endico 14
Step two - Decide what to do (Text Encode/Text Decode)
Step three - If You Selected Text Encode -> Then Type/Copy/Open .txt file to convert.
Step four - Copy the converted text into clipboard to chat,mail,print process etc.
Step five - If you want to Decode the code the again follow step two.
Step six - Congratulations! you done it .
-------------------------------------------------------------------------------------------------
Advantages and Applications
1. Fast and East TEXT encoding.
2. Fast and Easy Code decoding.
3. Easy User Interface & 24x7 Support.
4. Low system requirements.
6. ...
Decrypts and encrypts substitution, transposition and vigenere ciphers
Change log 1.01:
1)Error fixed on clicking solve and arrow buttons in the vigenere decoder
2)Error fixed when number of columns exceeds text length in substiution cipher
3)Can now handle variable block length when changing columns
4)Multiple identicle conversion values onn the frequency analysis page now not allowed
This project is near its final stages but there may still be improvements to be made. If you could write some form of review or send me an email with advice I would greatly appreciate it.
This is a series of three simple programs that will allow you to easily encrypt and decrypt text using any combination of substitutions, transpositions, vigenere ciphers or caesar shifts. ...
A free utility that finds malware and other threats
...However, HijackThis does not make value based calls between what is considered good or bad. It is important to exercise caution and avoid making changes to your computer settings, unless you have expert knowledge. Source code is available SourceForge, under Code and also as a zip file under Files.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
BinaryPix is a Tool to create "Binary-Visual" Code out of ASCII-Text Then it places it on a choosen picture. Then you are able to water-mark your pictures with the "binary-hidden" code.
SFV.net is a sfv (Simple File Verificator) file creator and validator application. All code written by vb.net and requires .net framework for run or compile
An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
The FreePKI project aims to create practical, interoperable & free code and services for Certificate and Registration Authorities based on the X.509 standard, including nearly zero-cost ID verification through a PGP-like web of trust scoring system.
The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
ISO 17799 - Code of practice for information security management. Creation of methodology and documentation for audit adapted to ISO. One is made up of an introduction on general aspects of the security of the information.