MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
Start Free
La version gratuite d'Auth0 s'enrichit !
Gratuit pour 25 000 utilisateurs avec intégration Okta illimitée : concentrez-vous sur le développement de vos applications.
Vous l'avez demandé, nous l'avons fait ! Les versions gratuite et payante d'Auth0 incluent des options qui vous permettent de développer, déployer et faire évoluer vos applications en toute sécurité. Utilisez Auth0 dès maintenant pour découvrir tous ses avantages.
winKnocks is an encrypted(DES) port knocking tool. Knock sequences are defined through XML files; users specify: number of packets of each knock sequence, payload and header of each packet. Logging capability. Generation of smoke packets.No replay-attack
FatNS Analyzes and Tests Name Servers. It is a PCAP-based security tool intended to sniff and detect common attacks on the DNS system, and is designed to be easily expandable with additional attack detectors.
ADAM is the Active Defense Algorithm and Model. It is a formally defined process of determining appropriate active response actions in the event of an attack. This implementation shows that active defense can be a legitimate and responsible security tool
Windows Hijacker is a tool for hijacking tcp connections on Windows OS. WinHijacker include ARP Poisoner for Man In The Middle (MITM) and a small tcp/ip stack. For any problem go to 'Forums' section. The documentation is in 'Docs' section.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Cisco Torch mass scanning, application layer fingerprinting, and exploitation tool to discover and attack remote Cisco hosts running Telnet, SSH, Web, TFTP, NTP and SNMP services. Useful in auditing large networks for misconfigured/un-updated Ciscos.
GPP is a General Purpose Proxy Java graphical application intended mainly for packet inspection and modification. It's main idea is to be a little user-friendly portable man-in-the-middle tool for security analysis. Later, some protocols should be added
JHoney is a honeypot tool for Linux written in Java. It simulates vulnerable net services to trick an attacker or trojan to attack them. The attacker IP is blocked once a service is attacked, and then the intruder cannot attack for example webservers.
EtherMan: Ethernet Man In The Middle AttackTool. It is capable of forcing traffic between two hosts to pass by a third party (MITM) and then redirected to its original destination again.
This program is written for educational reasons, and I am not res
AI-based, Comprehensive Service Management for Businesses and IT Providers
Modular solutions for change management, asset management and more
ChangeGear provides IT staff with the functions required to manage everything from ticketing to incident, change and asset management and more. ChangeGear includes a virtual agent, self-service portals and AI-based features to support analyst and end user productivity.
The goals of the tool are: 1. improve usability for the less technical educated 2. 'anonymous' ( ip spoofing, others? ) 3. Better support for a distributed tracker-like target list ( multi target, multi server ). LOIC-like tool, also in C#
Remove shortcut virus and recover all damaged data.
Shortcut Virus Remover is a data recovery tool that allows you to recover damaged data due to the Shortcut Virus.
When you plug in your removable device to a shortcut virus infected computer, it destroys all the data on the plugged-in device. After a shortcut virus attack, your external storage drive will contain only shortcuts, and you will think your files and folders have been converted to shortcuts. Also, none of them will be accessible.
In such circumstances, how do we get damaged...
Generate strong and secure passwords with QuickSafe ,
... is crucial for safeguarding personal and sensitive information. QuickSafe is committed to providing users with a simple yet effective tool to generate strong passwords, offering an extra layer of defense against unauthorized access to accounts. Elevate your password security with QuickSafe, a project dedicated to promoting digital safety in an accessible and open-source manner.