Build gen AI apps with an all-in-one modern database: MongoDB Atlas
MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
Start Free
Keep company data safe with Chrome Enterprise
Protect your business with AI policies and data loss prevention in the browser
Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
Protect sensitive data that has been deleted from recovery.
When a file is deleted from a device the space for that file is merely de-allocated. In short: The DATA contained in that file still remains, and can be recovered. This can quickly become a security concern.
There are various areas of business where this scenario is unacceptable: HIPAA Protected Medical Information, and Financial Data amongst them. Client Data must be protected from recovery in the event of theft. Blue-Pencil was created to fulfill that.
"Blue-Pencil" protects sensitive...
The csvdatamix project aims to randomize CSV input data files in order to conceal the original state of the data. Similar to data masking or data transformation. Also has mapping abilities to translate back to the original state of the data.
Simple Read-Only protection tool for removable devices. Make Empty File on selected disk with required size. Most common usage - place executablefile on USB-flash drive and run it for space filling. When free space will need, delete empty file.
Simply solve complex auth. Easy for devs to set up. Easy for non-devs to use.
Transform user access with Frontegg CIAM: login box, SSO, MFA, multi-tenancy, and 99.99% uptime.
Custom auth drains 25% of dev time and risks 62% more breaches, stalling enterprise deals. Frontegg platform delivers a simple login box, seamless authentication (SSO, MFA, passwordless), robust multi-tenancy, and a customizable Admin Portal. Integrate fast with the React SDK, meet compliance needs, and focus on innovation.
Non-stealth keylogger for Windows. Records mouse and keyboard (precision~10-15ms), log of events (disk size~2.5k/s) + log of operations (~ 0.2k/s). Standalone, with local copy of Python: unzip to install, delete to uninstall.NEW: hidden/visible icon
NOTE: THIS PROJECT IS DEPRECATED
NEW VERSION AVAILABLE AT: https://github.com/pmsosa/CasualKrypt
------------
CasualKrypt is a simple and intuitive encryption/decryption tool that enables quick and easy enc/dec of text files or on-the-go messages. This program is meant for casual en/dec. DO NOT, for the love of god, encrypt your company's Top Secret reports.
Proxy Tester is a proxy list tester and then it generates a wpad.dat file you can use for your browser based on working servers. wpad.dat file selects a random proxy server from the list of provided working proxy servers with each connection request.
A modern secure, robust, multithreaded, exception aware, internationalisable, portable GUI toolkit library designed for mission-critical work in C++ and Python forked from the FOX library. Replicates the Qt API in many places.
Cia project tries to develop an all-purpose security tool. It's composed by ctools, the security tool; cfs, the app and cfs-server, a file & key server.
Trusted by 150 million+ creators and businesses globally
Unlock Picsart's full editing suite by embedding our Editor SDK directly into your platform. Offer your users the power of a full design suite without leaving your site.
It completely removes a file from your disk without leaving any track. It is very fast. It overwrites any deleted file with blanks or random data N times - where N is given by the user. Also, it changes the filename. No setup is needed.
An attempt to send a full flagged MIME based email using open relay mail servers (authentication not required). Written in Python3. Using smtplib and email liabraries TODO: Bruteforce the SMTP authentication. Support TLS.
A simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a set of [relatively] short python scripts that you can easily examine.
ConDEnSE (Confidential Data Enabled Statistical Exploration) will be a web-based environment for statistical analysis of confidential data from various database sources, based on Plone and R, and using the Jackknife method of confidentiality protection.
Java based Portable hashing application capable of multiple individual file signatures or proprietary group signatures (1 signature for a folder and all its contents). GUI and command line in the same executable. -sha1 -sha256 -sha51 -md5 -crc32
DownRoll: The downloadable RickRoll. How many people can you fool? Instructions: 1. Download it. 2. Change the file name. 3. Upload it to a file sharing site. 4. Trick people into running it.
Win32 Delphi applciation allows convienent editing of external signatures database in windows executable packer finder program PEID (http://peid.has.it/). Allows sorting, editing, adding, removal, searching and duplicate signature finding in "userdb.txt".
Automatically verifies md5 and sha1 checksums using either a user entered sum or by searching in a file that can be held locally or remotely via ftp or http.
antiparser is an API/framework for generating random, malformed data for use in fuzzing and fault injection of network protocols and file formats. antiparser is written in Python and can be imported by scripts that implement additional fuzzing logic.
Sherlock Roams is a Python-based password auditing tool for Un*x-based systems. It uses a brute force approach on the shadow file (or the regular password file if that fails) to determine which users on your system have obviously insecure passwords.
'Spot The Difference' is a file integrity checker developed in python. It is OS independent, easy to use and fast. It supports most of the open-source databases (MySQL, PostgreSQL, SQLite and dbm).
Overcoat encrypts your projects exe file before distribution (for shareware authors for example), that limits the use of an exe file, and forces the user to purchase/registar after a certain developer defined period