Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.
Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
Try it free
Streamline Azure Security with Palo Alto Networks VM-Series
Centrally manage physical and virtualized firewalls with Panorama
Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
This project has a theory of time that allows a computer program to decrypt information of the past, future, or alternate time-lines using a binary counter. Currently we have developed the binary counter now we are working on a production release.
Portscan is a simple TCP port scanner (connect scan, similar to nmap -sC).
It is implemented with threads for better speed.
Please see the code and review it. Criticism is more than welcome.
Helps needed to make it robust.
T-SQL Script Generator for SQL Server 2000/2005 to Allow Auditing on Database Tables using Triggers and Additional tables for Auditing. SQL Audit is made up of two .NET 2.0 Assemblies: SqlAudit.dll and SqlAuditGenerator.exe.
NetSentry Gofer is a personal software firewall which secures your personal computer from unauthorized access through a remote host, such as the Internet.
PEStudio is a network protocol analysis and security auditing tool for Windows which allows you to apply scripts to winsock calls in order to filter / edit the data that travels to and from your computer, giving you complete control over your network.
Computer chess engine written using Qt4, which works under Knights, Jose, Arena and other chess board GUI games. Uses bitboard game representation and alpha beta brute-force search to analyse chess positions.
For system user to take backup of any confidential file(it may be code/important document)as it may contain content not meant for the others to view or the system may crash.We will be securing the backup of selected files at regular intervals of time.
This project is a long time ago project made to destroy the autoruns that we haven't decided in the hard disk or a floppy disk. It destroys the VBScript and JavaScript on the root of each drive excepts the CD's (we can't do yet) and secure the computer.
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
PHPSandbox is a tool used to execute PHP code in a secure mode. You can specify which functions/classes are restricted or accessible to the code. This allows executing untrusted PHP code without worrying about security vulnerabilities.
This programm is able to block your computer.
so other people are only able to access you computer if they know how to use the program and if they know your personal password.
The Secure Java Code Filter (SJCF) provides an ICAP-based filter mechanism for mobile Java code and the signatures applied to it. Administrators can define a centralized policy determining which applications and signatures respectively are allowed.
A Cryptography php module very easy to use, could be used to protect databases, files, ad hash codes in every server that support php. Nowdays the most used hash algoritms are weak and there are many huge database with the hash code and the relative pass
Libraries and tools written in .NET managed code (MS/mono) to interact with GRC's Perfect Paper Password system [https://www.grc.com/ppp.htm] Source moved to GitHub: http://github.com/ErebusBat/pppNET
ISB is a java-developed software for Education purpose only. The codename are TKBot and Guepard Project. This software will let you connect any computer to any IRC server and channel. Do not use this software if you don't have the permission of the comp
Milk is a security sourcecode assessment tool using Orizon as API. Milk scans java and .NET source file in order to perform a security code review trying to point out safe coding best practices misuse.
A toolkit of nitty-gritty classes from real-life projects. Contains generic snippets along with things like server-side DOM implementation or RSA or code generation tools.
Open2SA is the 2 Step Authenticator, a PIN ciphering, 2 Factor Authentication process using a Dynamic Grid Card. The authentication technique is simple and secure and the code required for the process is compact and easy to understand.
Cnc's IP Data Volume Report:
Logs IP to IP contact, number of packets, bytes, time of contact, Ethernet too!
View via local web interface.
Very simple for those who want to view who your computer is contacting the most!
This software killing spy software process named Golden Eye.Golden Eye works like a surveillance camera pointed to computer screen, monitoring and recording anything anybody doing on computer, and storing this in a secure folder for later review.
WorkingCode gives you what the name says working pieces of codes in Java. We are talking about code snippets and full utility apps for Java and J2me. It's use is intended as a library.
Deobscufates .NET assemblies, primarily by rearranging IL code (basic block reordering) and removing junk.
Designed to be modular, it is built from reusable pieces.