Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
216,000+ customers in over 135 countries grow their businesses with HubSpot
HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
Ncartographer takes the xml output from an Nmap scan and displays it graphically in an attractive, compact, scalable, and complete manner. Supports saving the display of a scan as .png or .jpg images, and can generate images from a command line.
Evolia makes it easier to hire, schedule and track time worked by frontline in medium and large-sized businesses.
Evolia is a web and mobile platform that connects enterprises with 1000’s of local shift workers and offers free workforce scheduling and time and attendance solutions. Is your business on Evolia?
StreamSec Tools 2.1 is collection of cryptographic security related components, classes and routines for the Borland (R) Delphi (TM) development environment. The product includes modular clean room implementations of SSL/TLS, S/MIME and X.509.
aamFetch is a utility for fetching your anonymous esub nym messages from the alt.anonymous.messages newsgroup (or other newsgroups). It allows multiple encrypt-subjects to scan, multiple "destination files" to save messages to and random chaff downloads.
NetworkTools has 2 components: A protocol analyzer which plays a TCP client or server or pipeline, which sits between a client and server and shows how they communicate. A port scanner can scan a range of IP addresses and ports. See screenshots.
Ida, is a Apache log security analyzer written in PHP. It will scan Apache logs and report about security incidents like SQL injections, XSS attacks, path traveling and so on.
Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
TLS Lite is a python library for SSL/TLS. It supports non-traditional authentication methods such as SRP, shared-keys, and cryptoIDs, as well as X.509 certificates.
Code name 'Monkey Juice' is an attempt to create versatile, modular remote security scanner for the Win32 platform. Written in C#, 'Monkey Juice' will incorporate an XML plugin database of C# libraries that will be loaded at scan time.
SocketSwitchboard is a virtual proxy, router, or VPN. It uses an XML configuration to map incoming traffic on one or more ports to designated hosts and ports on the LAN or on the Internet. It supports complex boolean access restrictions and SSL.
Combined coded remote-administrative service with SSL secure port scan, anonymous routing and third-party plugin inbuilt for quick and automatic "scan and install" process. Easy to use and will work under firewalls and up to 1024 bit strong cipher
This is a multiplatform general utility suite for use with existing network stumbling software, such as Kismet or NetStumbler. The program will convert between multiple output logs, including the popular wi-scan format, between platforms.
RedLight is an Ip scanning utility made to scan internet protocol addresses on certain ports. RedLight will be devolped into a fully functional robust ip and port scanning utility with possible macro plugins
JNI - CAPI (MSCryptoAPI) interface allowing Java applications to use SSL Sockets and utilize CAPI for key material persistance, CRL checking, and Cert-chain validation.
Gherkin is a web-enabled, multi-threaded, centralized security scan manager incorporating Nessus vulnerability scanning, dns and nmblookup host resolving, and nmap fingerprinting and scanning.
VPNmonitor is a Java tool for network administrators to monitor VPN and SSL connections. The graphical representation makes it easy to visualize messages between computer nodes. Users can also read messages not of the above types in plain text.
<b>IVJ MUD (Masive Multiplayer Text Game) is a SSL-based soft:<br>-Client (GUI)<br>-Server (GUI)<br>-Applet (GUI)<br>-Protocol (SSL-based, use of localization files that store strings to reduce trafic and allow for instant i18n.<br>
LOOKING FOR HELP!</b
RSA Public Key Crypotgraphy for Web Browsers.
Use JavaScript to RSA-encrypt data that can only be decrypted on the server, and not by prying eyes.
The poor man's SSL...
A fast TCP port scanner with clear port definitions and formated output. Scan is done via randomized ports, configurable to run 1 - 65535 ports or 1 - 1024 (default). Application has the ability to pause for x seconds between each connection. Very fast