Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Build Securely on Azure with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Bruteblock allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attacker's IP into IPFW table effectively blocking them. Addresses are removed from the table after expiration period
BruteNet is a system of the distributed brute force and distributed calculations built on user extensions capable to solve a great number of problems related to the partition on a lot of machines.With sample extention you can distribute brute md5-hash
A shell script which determines by brute force the best compression format (bzip2, gzip, Z, zip, etc.) and which compression level to use in order to archive a file the smallest possible.
Buffer0verfl0w Security is a team of skilled security developers, who are
authoring security applications, whitepapers, and discovering security flaws in
software, publicly disclosing their projects and encouraging volunteers to help improving them.
These three tools build Checkpoint, Cisco ASA or Netscreen policys from logfiles. They write dbedit, access-list or set address, set service and set policy commands for the traffic seen in the logs, that can be cut and pasted into the firewalls. WOOT
C++ template classes for Multi-Value Logic support arbitrary precision and user defined Multi-Value Logic types. This library comes with pre-defined data types: integer, boolean, bit, logic, std_logic, bit_vector, logic_vector and std_logic_vector.
This is a C source code scanner based on symbolic logic. It analyses C source code (especially that of the Linux kernel, at which it is aimed) for programming errors and vulnerabilities. The tests are defined by the user.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Helper web application writen in PhP and Perl to mantain local Certificate Authority based on openssl.
Provides ability to view issued certificates, issue new certificates, revoke compromised certificates.
CACANMS is an acronym for Computer Aided Campus Area Network Management System. The system consists of software components and a library of about 60 classes. It is divided into three types of subsystems which reside on different servers and communicate.
CAILogin (Counter AI Login) is an image-based user verification program for web-page logins. It's written in plain C with no special dependencies, and hence it's very suitable for embedded systems which lack "big" interpreted languages, such as PHP.
Easy x509 certificate generation, with multi-user administration and safe distribution. Predefined types for User/Clients/Server/Mail/CA. Users integrate information from LDAP or AD directory. Full revocation(CRL) support with ftp distribution of CRLs.
A Java library for validation of credit cards. Implements the Luhn Algorithm to ensure the card number is well formed, checks card type prefix's and length. The rules are stored in a text file allowing new cards to be added without changing the source
CECID is a PHP script designed to anonymize and cloak HTTP requests on restrictive connections. CECID is run on a remote, unrestricted server, and accesses pages for users, editing the page's source in realtime to evade content filtering software.
Basing on the efforts of Matt Blaze, the project objective is to develop and improve the "Cryptographic File System" which, at the moment, bases on a NFSv2 implementation. CFS-NFS is designed to be used on Unix workstations.
Applet loader for the Cyberflex Access Developer 32k and e-gate 32k cards. Will allow you to load the MuscleCard applet onto the smartcard and use it as cryptographic token.
This is an attempt to port the CIS Benchmark tool (http://cisecurity.org/index.html) to OS X from its Linux implementation. This project is working on taking the source from the Level 1 Linux implementation, written in Perl, and porting it to OS X. The
|
|
PLEASE NOTE: this project has MOVED to https://github.com/mpeylo/cmpossl
|
|
An implementation of the Certificate Management Protocol (CMP) version 2, defined in RFC 4210, 4211, and 6712.
This git branch of OpenSSL provides an RFC compliant implementation including a CMP client CLI.
This is an experimental program that encrypt/decrypt/divide/join files. This program uses a new algorithm made by me, this algorithm is experimental and I working on it, every day this algoritm will be better.