Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Try Auth0 for Free
Streamline Azure Security with Palo Alto Networks VM-Series
Centrally manage physical and virtualized firewalls with Panorama
Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
TraceMAC is a command-line Layer 2 traceroute for Cisco switches
...Is tested with Cisco switches:
Catalyst: 2960,3560,3750,4948,6509,9200,9300,9500 (All protocols)
Nexus: C9332C, 93180YC-EX (NX-OS SSH)
Express 500 (HTTP)
FYI: It uses Nbtscan.exe (NetBIOS) as a alternative method to discover the mac address of a host and now seems that it is considered a malware. Anyway it is just a simple network tool that can scan the network similar to NMAP or Angry IP Scanner, etc...
mkconfig is a build configuration utility. It creates an output file intended to be included as a header file, run as a shell script, used as a configuration file, or any other use.
mkconfig is written in portable shell script and designed to be extensible for any configuration use.
m23 is a free software distribution system (license: GPL), that installs (via network, starting with partitioning and formatting) and administrates (updates, adds / removes software, adds / removes scripts) clients with Debian, (X/K)Ubuntu and LinuxMint. It is used for deployment of Linux clients in schools, institutions and enterprises.
The m23 server is controlled via a web interface. A new m23 client can be installed easily in only three steps.
Group functions and mass installation...
Cisco sanitizing configuration tool. It removes passwords, keys, certs and other sensitive data from text config files.
Use this tool to sanitize extracted configurations files before you send them to audit (Ex: TAC)
'show tech-support' is good, but sometimes you need to remove more sensitive data from the configurations
This tool will scan a folder with all its sub-folders and sanitize every file from that tree.
A command line tool to manage bytes in hex dumps or packet captures
Command-line tool to examine or edit bytes in hex, octal, binary, or in packet capture (pcap) dumps. Exd is intended to be used in conjunction with hex dump tools such as xxd, od, hexdump, or hd, and with packet capture dump tools such as tshark and text2pcap.
--- metadata tags
byte hex octal binary pcap packet packet dump hexdump
dpkglist.awk is a command-line tool for querying available packages on ubuntu and debian systems. It overlaps with the standard apt-cache utility, but, written in simple awk, it is easily extensible, and makes it easy to write one-line scripts.
Cov is a code coverage tool to get your code coverage after your runuing some steps for your programs.It is based on llvm(Low Level Virtual Machine,http://llvm.org/).Now,it's only a begining,so welcome anybody to join in.
This tool helps your to setup masked packages in Gentoo Linux. Tool is supported all types of package masks (masked by ~x86, ~amd64, missed.., package.mask etc.) and provide many options to configure unmasking process.
Pau Code Review is a light weight code review tool. The emphasis of this project is to create the artifacts required for a code review without forcing a specific code review process on the user.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
This command-line tool will help people who want to compare 2 csv-like files, and get a detailed report on which rows and fields differ between both files. An awk-based version and Perl Version is currently available.
A verification library accompanied by a simple tool for verification of credit-cards, social security-numbers and other mod(10) and similar checksums in a standard shell-environment from the command-line or as a function. No compilation required.