Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
AdaptiveCells J2EE generates test-beds for benchmarking J2EE performance. They consists of highly customizable EJB cells that can emulate CPU load, memory usage, memory leaks and exceptions. The behaviour of the cells is coordinated from a web front-end.
The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
The GridUnit project is a first effort to use the huge heterogeneity and distributed nature of Computational Grids to imporve the software testing process. It is an extension of the widelly adopted JUnit testing framework.
A daemon that creates realtime dynamic, expirable iptables rules to block/drop IP addresses attempting brute-force breakin attacks on a linux host via ssh or other mechanism. Highly customizable and extensible.
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
C++, Win32 API, Windows NT4, 2000, XP. NTServiceController is an application that allows you to perform operations on the NT services database(start, stop, install, uninstall, modify, list).
Valkyries is a parallel programming project designed for and developed on a Beowulf cluster to crack several UNIX systems' passwords by brute-force. Currently implemented system cracks only numerical passwords but it's being developed.
COMPAS J2EE is a non-intrusive performance instrumentation and monitoring toolkit for J2EE.
It uses adaptive monitoring to automatically adjust the target coverage. COMPAS is completely portable across J2EE application servers and OSs.
An emulator for an educational CPU (P3) used in a Computer Architecture (AC) course in IST (a University in Lisbon, Portugal). The CPU is only theoritical and has a software simulator already implemented. Purpose: final AC project testing and evaluation.
Serial line sniffer (slsnif).
slsnif is a serial port logging utility. It listens to the specified serial port and logs all data going through this port in both directions.
tresMonitor provides a fully configurable service testing environment. It lets you define for each service what actions you want to execute as the test of state, and what to do in case of success and fail.
Webtester is a collection of java applications that can be used to record and playback test cases for either static HTML or dynamic web applications. It is intended to provide a way of performing end-to-end regression testing for existing websites.
Free Java monitoring library to easily instrument apps to measure performance detail over time with minimal overhead. Has dashboard, SVG graphs. Extends Jamon and its statistical data, same usage. http://www.e-peas.com/opensla/. JMX, SNMP planned.
Script to automatically update /etc/hosts.deny due to use of an illegal username or excessive bad passwords. Written to prevent the success of a brute force attack.
A complete Continuous Integration utility, used for managing projects using XML. It consists of a flexible repository for 3rd party products, a mechanism for building, testing, deploying your projects and a management & status web application.
A shell script which determines by brute force the best compression format (bzip2, gzip, Z, zip, etc.) and which compression level to use in order to archive a file the smallest possible.
Sherlock Roams is a Python-based password auditing tool for Un*x-based systems. It uses a brute force approach on the shadow file (or the regular password file if that fails) to determine which users on your system have obviously insecure passwords.
hammer is a Http load testing tool for Unix/Linux platforms. hammer reads scripts of XML that describe the load tests. hammer is implemented in C++ using Xerces-C and Commoncpp2.
Enables a user to view & alter
all aspects of comunications with a web site via a proxy. Primarily used for security
based penetration testing of web sites, it can also be used for
debugging during development. Seen as part of a hacker toolkit.
This project is an approach to automating the testing of performance properties of complex systems.Just like functional specs for software we aim to develop an executable language for asserting performance expectations of a program.This implements Sharon
NOTE: development of place has ceased (a long time ago actually...) There are many other fully developed tools for managing system configuration (Spacewalk, Puppet, etc). Place was conceived many moons ago when these tools were less available... feel free to continue using it if you find a need though.
Place allows you to "place" a file in its "live location" (presumably after making changes and testing) on the current system w/out having to remember where every file goes on every...
Strength in numbers. Existing products we're involved in include port to Linux of Tony Forbes' MFAC for brute-force factorization of MM61 for relatively small factors, and further development and improvement of Tim Charron's ECMnet distributed computing f