Comet Backup - Fast, Secure Backup Software for MSPs
Fast, Secure Backup Software for Businesses and IT Providers
Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
Learn More
Network Management Software and Tools for Businesses and Organizations | Auvik Networks
Mapping, inventory, config backup, and more.
Reduce IT headaches and save time with a proven solution for automated network discovery, documentation, and performance monitoring. Choose Auvik because you'll see value in minutes, and stay with us to improve your IT for years to come.
Simple Read-Only protection tool for removable devices. Make Empty File on selected disk with required size. Most common usage - place executable file on USB-flash drive and run it for space filling. When free space will need, delete empty file.
A C library with support for logging, configuration, networking, message specification, semaphores, message queues, SSL, timing, epoll and email functionality.
A program for encrypt/decrypt files or text inside clipboard with a password or a certificate located either in certificate storage (certmgr.msc) or in a .cer file. You just have to drag and drop files and folder to the application.
SEFT is an appliance based (physical or virtual) secure enterprise file transfer system. It is able to send and receive files in an ad-hoc fashion or based on a schedule. SEFT supports many communication protocols such as HTTPS, SFTP, FTPS, SOAP, etc
Unified cloud-based platform for dialing, emailing, appointment scheduling, lead management and much more.
Adversus is an outbound dialing solution that helps you streamline your call strategies, automate manual processes, and provide valuable insights to improve your outbound workflows and efficiency.
SD4L is a suite of Linux tools including a graphical user interface which allow the creation of, and access to ScramDisk as well as TrueCrypt encrypted container files. In particular, SD4L provides a Linux driver which enables mounting of containers.
ScardFace is a python3k library for interfacing with smart cards, which supports Plug-and-Play readers inclusion and threading. It also offers classes for manipulating APDU cmds and resps, and use them in a transport-protocol-independent fashion.
Code to brute force the 32-bit key used to RC4 encrypt .pwl files.
PROJECT HAS MOVED TO GITHUB:
https://github.com/alex-georgiou/rc4-32.asm
Code to brute force the 32-bit key used to RC4 encrypt .pwl files. Assembles to a 992 byte .COM file using the Intel Architecture Assembler v1.0 Copyright (c) 1998 augusto at dcc.ufmg.br.
http://web.archive.org/web/19981205090800/http://www.dcc.ufmg.br/~augusto/project/iasm.zip
The OWASP JBroFuzz Project is a web application fuzzer for requests being made over HTTP and/or HTTPS. Its purpose is to provide a single, portable application that offers stable web protocol fuzzing capabilities.
A set of tools for querying and modifying the ACL's (access control lists) and ACE's (access control entries) of files, services, registry keys, printers, processes, threads, timers, mutexes, tokens, events, and semaphores in Windows 2000 and later
Run applications fast and securely in a fully managed environment
Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.
Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
A program that encrypts multiple files. It uses new encryption algorithms, such as a Three-Block Feistel chiper, ArchFurry's algorithm and a new hash function. Licensed under the ISC.
Ked password manager helps to manage large amounts of passwords and related information and simplifies tasks of searching and entering password data. Kedpm can read data from existing password managers. Written as extensible framework in python
cst allows to split (or share) "secret" files, like private keys, into number of equal parts. After that, secret can only be recovered by collecting all parts together. If any of this parts is lost, the secret is lost too.
w3pw is a web based password management console written in PHP and using a MySQL Database as storage for the encrypted (using MCrypt) password information.
The intend of this project is to develop a simple but powerfull Intrusion Dectection System (IDS) by inspecting messages from Log files, Network packets, or from other sources. It uses Perl Regular Expressions to check for any bad messages.
Implementation of Rijndael, RSA and El Gamal ciphers as well as SHA256, Blake and Blue midnigh wish hash functions. The program is for encrypting files but it can be rewritten for other purposes.
Zero Wine is a malware's behavior analysis tool. Just upload your suspicious PE file (windows executable) through the web interface and let it analyze the behaviour of the process.
Remote Desktop (RD) Connection Manager allows easy working with remote desktops and servers. It supports: Citrix ICA, Microsoft Windows terminal services (RDP), VMRC, VNC as well as VDI: VMWare Workstation, VMWare ESX and ESXi servers, Microsoft Hype
You can turn your USB sticks and even your removable hard disks into a portable safe and securely carry your all sensitive data or work. The USBK protects your privacy. www.usb-k.com
A daemon for hosing a Defcon style Capture The Flag hacker competition. The ctfd process will deliver flags, verify their presence and receive captured flags from the different teams.
CoDec is a Java package for encoding and decoding ASN.1 data structures. CoDec supports the Basic Encoding Rules (BER) as well as the Distinguished Encoding Rules (DER) and provides a library with data structures for many cryptographic standards.
...Uses various encryption algorithms including but not limited to: AES, Twofish, RC4 and IDEA. To enable the stronger encryption standards such as AES the user must have installed the unlimited strength jurisdiction policy files.