Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
This project is intended to provide a means by which one can insert data other than packet data into the snort/ACID IDS system.
We have scrapped the perl version - since some systems don't have perl - or don't have the ram, cpu or diskspace to run the ho
E-Dot (which means Encryption and Decryption Of Texts) is a very small tool for encrypting textfiles. E-Dot doesn't use Keyfiles: A password is enough. This tool is available for Linux and Windows, too.
A Java Swing application to 'securely' store passwords using symmetric encryption. A user can set up one or many 'datastores' of password/username combinations and commit them to disk. They are stored on the file system using PBE Blowfish.
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
A password manager that is able to encript data in various algorithms and store them in file, database, ...
It is written in 100% pure Java using only Java technology.
SnortKonsole is a Java-Frontend for the Open Source Network Intrusion Detection System Snort. It supports all configuration-aspects of Snort. The configuration distribution and activating of sensors is done via scp/ssh.
A client/server application designed to let the user monitor a directory
tree on a remote machine by creating snapshots of current file status in order
to later detect file modification, addition and/or removal.
Secure local and Network based authentication using pluggable backends which provide authentication and user/groupnames, uidmappings, tokensupport and the lot.
This library provides crypthographic functions written in plain Object Pascal, aimed to be portable and easy to use.
Currently it contains BlowFish Cipher , MD5 and RipeMD hashes.
More is planned.
The end goal of the FreeMess Project is to produce a cryptographically secure, pseudonymous, cross-platform peer-to-peer Instant Messenger service, piggybacking on FreeNet (http://freenet.sourceforge.net) as a distributed filesystem to hold user data.
In DeCrypto you will find a collection of scripts for helping decrypt messages. Eventully I am going to put these scripts together into a nice interface.
A number of tools to enhance management/coding of NFR (http://www.nfr.net) IDA, and various other admin tools that can be used for both NFR and hand coding other appliance scripts.
The Ada Cryptographic Framework (ACF) is a set of Ada packages that implement the most popular cryptographic algorithms. The main goal of the proyect is to implement a complete set of cryptographic primitives entirely in Ada 95
The Hackers Lab is aimed to provide hackers, system audits, system and server and network administrators with applications to secure their own servers.
Update: The code from this project has been contributed to the GNU Crypto project.
The Cryptix SASL Library is an implementation of the Java SASL bindings and a number of SASL mechanisms.
RanPass 2.0, the successor to the simple and MS-DOS interfaced RanPass 1.0. RanPass is a Random Password Generator. RanPass will use a unique Algarythm(s) to generate a Random Password. This type of software is really useful to a Secure Network.
AVUpdate is an script-package to automatically update the
AntiVir antivirus Software from H+BEDV on Linux/BSD Machines for
which H+BEDV haven't created an auto-updater.
The scripts can also update the antivir-Tree for the Antivir/Win-Feature "Intrane
Open Source file encryption, written to learn about cryptograpy, programming, etc. And hopefully come up with some new encryption techniques that might benefit the public.
Trace2ip is to hold one trace of all connections IP, memory the information into the file. The file to have like unique key ip_source and like associate data header IP. Alternative Key:Audit, Trace, Monitor, Dump, IP.
xPG was about an OpenPGP-GUI in Java. Some source-code is still available for reference purposes. See http://www.cryptix.org/ for a current implementation of OpenPGP for Java.