Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.
Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
Sign up for free
MongoDB Atlas runs apps anywhere
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Exploits some of the known vulnerabilities of Oracle. Includes SID Enumeration, Passwords tests [common/ dictionary]. Supports attachment of malformed shell codes with TCP packets for crashing the remote server or gain DBA privileges on it.
The PKI Framework (PKIF) is a cross-platform library for performing PKIX-compliant certificate processing. It includes support for SCVP, OCSP, CMS and Timestamps. It uses Windows CAPI, NSS or Crypto++ for cryptographic services and hardware support.
Java module to create, read and write Password Safe V3 encrypted databases. The package is a mature offspring from project JPasswords and can be used with Java 1.8. There is an API document available.
Paranoid Android is a security enhancer for Mac OS X. Whenever an application asks the operating system to open a URI, Paranoid Android steps in and asks the user for confirmation before it can be opened.
Distributed reverse / forward proxy and tunneling solution for TCP.
PortFusion is a minimalistic, cross-platform, transport-layer distributed reverse / forward proxy for TCP written in Haskell + LLVM and released under GPLv3.
A single package that makes the most of each platform by tapping into their unique capabilities, combining this power with an intuitive interface, beautiful design and Haskell's excellent support for unprecedented levels of concurrency and parallelism.
It strives for the smallest source code size (< 500 lines) while delivering maximum throughput with near zero overhead.
Proxyp is a small multithreaded Perl script written to enumerate latency, port numbers, server names, & geolocations of proxy IP addresses.
This script started as a way to speed up use of proxychains, which is why I've added an append option for resulting live IP addresses to be placed at the end of a file if need be.
Requires IP::Country module and root/administrator privileges.
"No man is free who is not master of himself" --Epictetus
"For a man to conquer himself is the first and noblest of all victories." --Plato
"I count him braver who overcomes his desires than him who conquers his enemies; for the hardest victory is over self." --Aristotle
"The first and greatest victory is to conquer yourself; to be conquered by yourself is of all things most shameful and vile." --Plato
BlackArch: bit.ly/1qBX0pz
n0where: bit.ly/1pk3kBs
Hacktools: bit.ly/TDesQ1
Seclist: bit.ly/1boeEYe
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
RemoteWAP gives you the ability to take control of a Linux Operating System from anywhere with a WAP enabled mobile phone. This project is being developed in Java. There is plans to support other Operating Systems such as Windows, Solaris, *BSD
Rinecrypt uses the Gladman implentation of the AES algorithm
Rijndael and a SHA256 hash among other things, to encrypt/decrypt
a file with a user supplied passsword.
Videovigilancia, Control de Acceso y Carnetización
Sistema Integrado de Protección Venezolano con capacidades de Videovigilancia, Control de Acceso y Carnetización para el resguardo físico de instalaciones.
The overall objective of the SWEB project is to develop a secure, interoperable, open, affordable platform upon which secure cross border government services will be built.
SD4L is a suite of Linux tools including a graphical user interface which allow the creation of, and access to ScramDisk as well as TrueCrypt encrypted container files. In particular, SD4L provides a Linux driver which enables mounting of containers.
A privacy and security aware mailing list manager, perfect for allowing closed groups to interact on the Internet without interference from outsiders and former insiders.
Signelf is a toolset written in c++ for signing elf binaries, specifically linux shared object, though in theory, any elf binary may be signed. It uses openssl's libcrypt to RSA sign the library, and the same to validate the signature.
Perl logfile analyzer for DELL Sonicwall Firewall logfiles. This Perl program (Windows /Linux / Mac), creates an HTML file containing: hits per protocol, mean, median and variance on hourly and weekday basis, RBL statistics, IPS stats, VPN stats, virus stats, surfing statistics, CFS blocked sites stats.
Script to automatically update /etc/hosts.deny due to use of an illegal username or excessive bad passwords. Written to prevent the success of a brute force attack.
A program that encrypts multiple files. It uses new encryption algorithms, such as a Three-Block Feistel chiper, ArchFurry's algorithm and a new hash function. Licensed under the ISC.
This project is not going to create a new distribution for network security
related jobs, but provide several metapackages based on Debian platform to help
security geeks who can easily install related open source software.
TorK is an Anonymity Manager for the KDE Desktop. Browse anonymously on Konqueror/Firefox/Opera. Send anonymous email via the MixMinion network. Use ssh/irc/IM anonymously. Control and monitor your anonymous traffic on the Tor network.
Ircproxy is transparent IRC content-filtering application. It may be used whenever there is a need of monitoring IRC connections.It may be used to deny specific connections or to behold suspicious IRC traffic.