Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Application Monitoring That Won't Slow Your App Down
AppSignal's Rust-based agent is lightweight and stable. Already running in thousands of production apps.
Full APM with errors, performance, logs, and uptime monitoring. 99.999% uptime SLA on the platform itself.
WebScarab for Eclipse is an extensible framework for analyzing applications that communicate using the HTTP protocol. It includes an HTTP monitor and an HTTP proxy for recording all messages between your machine and remote servers.
InsecureWebApp is a web app that includes common web application vulnerabilities including SQL&Html Injection- see owasp.org. It is a target for automated and manual penetration testing, source code analysis, vulnerability assessments and threat modeling.
A java application that allows you to store files into a "data store". These files are encrypted by passphrases and padded with random garbage to provide plausible deniability (you cannot know if there are any more files in the store or not).
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
The MACA objective is to provide user authentication, session management and authorization services independently of platform. Authorization servive is based on a contextual role-based access control model that extends NIST RBAC
KayRa is a Web Application Security Auditing Tool designed to test the security of websites by analyzing web pages. Some of the tests include: SQL Injection, XSS, Form behaviour with bad data. All tests carried out will be based on the OWASP guide.
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
distDES is a Java RMI-based application which manages load balancing on heterogeneous clusters. Development will extend the theoretical initial implementation to include clustered Rainbow Table generation and encryption algorithm collision detection.
Portknocker is an easy to use, platform independant port knocking client. Our aim is support one easy to use client interface that support most popular portknocking server implementations.
J2EP is a reverse proxy running on a J2EE engine. The proxy is written in java and was originally designed with Tomcat in mind, but any engine should work fine. A set of basic mapping rules are included but they can easily be extended to your own needs.
The aim of this project is to provide convenient ways for a rapid development of java enterprise applications.
To achieve this goal the project provides a collection of libraries which carry out commonly used tasks and/or ease technological implications
Project Identity aims to develop an Open source Biometric Solution i.e. complete set of tools and libraries for Biometric identifiction systems.
This project has intial code done by students as their summer project at Echo IT Labs Pvt. Ltd.
CryptoHelper is a Java program designed to aid in the decryption of classical ciphers, ie pre WWII ciphers. It brings together tools like frequency analysis, friedman tests, enciphering/deciphering for several clasical ciphers, and brute force algorithm
bookHexor use the key.txt for encoding where is saved an arbitrary text, which is used as key. bookHexor read the key.txt and notice for each character, where it can be found as an index. If you encode text each of your charakters is displayed as index.
JSSHTunnel is a lightweight GUI application which forwards local & remote ports over SSH connections. It is written in Java and uses Eclipse SWT & JSch. All you need is a JVM to run it. 0.0.0 is targeted at Windows and resides in the System Tray.
ADAM is the Active Defense Algorithm and Model. It is a formally defined process of determining appropriate active response actions in the event of an attack. This implementation shows that active defense can be a legitimate and responsible security tool
DNScat is a "swiss-army knife" tool to tunnel traffic through DNS servers. It is a small, yet powerfull tool, similar to netcat. In conjunction with PPP server, it allows to build a VPN using DNS packets. DNScat is a useful tool for penetration testing.
Using one-way hash algorithms and encryption, will generate a password based on a master password and site URL. Java based, so it can run on most operating systems and produce the same password consistantly. Future versions will include a username keyrin