Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
Get started with Nexo.
Go From AI Idea to AI App Fast
One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
A Cryptography php module very easy to use, could be used to protect databases, files, ad hash codes in every server that support php. Nowdays the most used hash algoritms are weak and there are many huge database with the hash code and the relative pass
A client for the passcracking.com online database ob MD5 and SHA1 Hashes.
It allows to generate MD5 and SHA1-Hashes from passwords and querying the database to get the password for a given hash.
jHomeNet is a home automation client/server application written in Java used to monitor and control sensors and devices around your house. The application uses of a number of existing communication technologies including Dallas Semi's 1-Wire and X-10.
OpenRCA is a highly flexible and modular Certificate management and Registration Authority based on J2EE technology. OpenRCA is designed to be a very flexible, extensible and low cost enterprise PKI solution.
The goal of this project is to create an expandable secure content store along the lines described by JSR 283 supporting an access model, which incorporates both discretionary and mandatory access controls.
A toolkit of nitty-gritty classes from real-life projects. Contains generic snippets along with things like server-side DOM implementation or RSA or code generation tools.
XMLStore is a new project that cares about XML-based Databases Access with users Authentication and Authorization and more such as dead-lock accesses.
It will be soon introduced to other kind of databases such as SQL,...
JM Key Creator is a .Net 2.0 Framework dependent Windows Application used to generate license keys, registration keys, and activation keys. It includes the ability to perform hashed randomization and also includes methods of creating validation of keys.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Cnc's IP Data Volume Report:
Logs IP to IP contact, number of packets, bytes, time of contact, Ethernet too!
View via local web interface.
Very simple for those who want to view who your computer is contacting the most!
Webswell Connect is a business integration tool based on WS web services, ebXML and AS2 standards. Installer includes ebXML Registry/Repository, universal Message Service Handler and Dispatcher and supporting software. Tech support at www.webswell.com
Suite of services and tools for handling PKI requirements. The initial list of programs contains: 1) a viewer/encoding converter for X.509 certificates, 2) a viewer/editor/generator for PKCS#7 and 3) a viewer/editor/generator for various keystores types.
DMO uses PHP and MySQL to support documentation of all security, network and system objects within your computing environment. It offers a Web interface that enables easy navigation through objects, instances and attributes, with XML and access controls.
eXlent2k7 is a CMS based on the most modern technologies (XHTML 1.1, CSS 2.1, PHP 5 objects, PDO, XML, DOM) with good security (CSRF protection, XSS prevention in template system, JavaScript can be disabled, SQL injection prevention in database class).
This application is meant for those end users, who wish to quickly learn how to use XACML based systems. It provides the user to create and load XACML policies, and then analyze the XACML response in a separate window.
Sudo inventory web-tool (SIWT) is a web interface to view and administer information related to /etc/sudoers files on multiple servers. The database contains data on servers, users, aliases, dates, etc. This tool is helpful for internal audits.
A graphical application created in C# .Net 1.1 that helps the penetration tester to inject SQL commands on a web page. Its main strength is its capacity to automate tedious blind SQL injection with several threads. Under Clarified Artistic License
The High Interaction Honeypot Analysis Toolkit (HIHAT) allows to transform arbitrary PHP applications into a web-based Honeypot. A semi-automatic user interface supports the analysis process, scans for attacks etc.
MAximized Risk COntrol (MARCO) supports security professionals and security consultants in building up an enterprise specific Risk- and Control Matrix. So it helps to identify and handle potential risks and mitigate them via properly defined controls.
Grained Login is a fine-grained login system for Qt applications. It uses SHA1 hashed passwords to retrieve user rights from a SQLite database. An administration dialog handles the maintenance of the users, the roles, the rights and the password history.