Run applications fast and securely in a fully managed environment
Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of Google's scalable infrastructure.
Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
Try for free
Globalscape Enhanced File Transfer (EFT) is a best-in-class managed file transfer (MFT) solution
For Windows-Centric Organizations Looking for Secure File Transfer solutions
Globalscape’s Enhanced File Transfer (EFT) platform is a comprehensive, user-friendly managed file transfer (MFT) software. Thousands of Windows-Centric Organizations trust Globalscape EFT for their mission-critical file transfers.
FragMend is a GUI tool that allows a forensic investigator to classify and view sectors of raw or unallocated data. The sectors can then be ordered and grouped into files.
winKnocks is an encrypted(DES) port knocking tool. Knock sequences are defined through XML files; users specify: number of packets of each knock sequence, payload and header of each packet. Logging capability. Generation of smoke packets.No replay-attack
KIside is a message digest computing and displaying tool. It computes and shows the hash code of any file as a string of hexadecimal numbers. KIside implements standard algorithms such as MD4, MD5, SHA1, SHA256, SHA384, SHA512, TIGER, RIPEMD160.
Shade is a versatile LSB (least significant bit) manipulation and analysis tool used to hide/retrieve files from within other files, such as images. The goal is to make the existence of the hidden file completely undetectable, and optionally encrypted.
Strengthen your current Business intelligence infrastructure by automating reports and manual tasks
Select, Format, Schedule and Deliver!
PBRS™ and CRD®, our standalone report scheduling solutions for Power BI, Microsoft SQL Server Reporting Services® (SSRS) and SAP Crystal Reports®, are designed to supplement and strengthen your current Business intelligence infrastructure by automating reports & manual tasks, layering useful incremental capabilities, and scaling capacity by orders of magnitude. They supercharge operational productivity while lowering administrative costs.
Open WS-Policy,an Open Source Web Services Policy Framework implementation,is a set of open source Java libraries that implement the ws-policy specifications.
This is rarbrute, a shell script to brute force encrypted rar files under unix and linux. A long wordlist and a paper about security in internet cafes is included.
Open Source Security System for home users as well as for system administrators. Aims at providing an uniform security platform, Operating System Independent, to protect and prevent valuable data from corruption/stealling and destruction.
LINReS is a tool which can be used by Incident Response and Computer Forensic Teams during initial response phase to collect volatile and other non-volatile data from a compromised Linux machine using statically compiled binaries.
cpm is a small console tool to manage passwords and store them public key encrypted in a file - even for more than one person.
The encryption is handled via GnuPG so you can access the programs data via gpg as well.
PAM module which will authenticate user by X509 certificates. Keys must be provided in some automountable location. As storage may be used usb steaks, bluetooth storage devices... Mainly intended for password-less authentication on single user clients pc
A spin-off of InstallFix which aimed to use advanced features and external definition files. After partial successes, many obstacles proved too great. However, it does offer some useful options for clearing caches and junk.
ext2hide allows users and administrators to utilize the reserved space of the ext2/3 superblocks to store hidden data on their filesystems, rendering it inaccessible to any normal viewing, yet still residing in permanent storage on disk.
CivilAction lets you create a Choose Your Own Adventure type story that can be played on Java enabled cell phone. A desktop application lets you write story files. People run the story on their phone. Make a 'Tresure hunt' or 'Amaze Race' type game.
Bisker is a simple cgi scanner written in C language for GNU/linux platforms. It's an useful tool to find critical or dangerous cgis/folders/files on local and remote machines (also through proxy).
Paranoid Android is a security enhancer for Mac OS X. Whenever an application asks the operating system to open a URI, Paranoid Android steps in and asks the user for confirmation before it can be opened.
Iron Bars Shell is a restricted Unix shell. The user can not step out of, nor access files outside the home directory. It is written in C for Linux. No libraries used. It is small, fast, secure. Two ascii configuration files for more control.
A Visual Basic macro for Outlook 2002 (XP) that exports categories of contacts to vCard files (2.1 and 3.0) and collects email addresses into white and black lists (or just lists). No GUI, the user must use the Outlook macro editor. Click Docs for he
deface-no-tnx is an anti-defacement system that monitors your Web files and notifies you about unallowed changes. It also replaces the defaced page with a standard "error" page,so that no offensive/joking content can be frauodolently added to your site
YASeMI (Yet Another Security Monitoring Interface) consists of a Web interface that can be of aid to SysAdmins and Security Admins, in detecting possible anomaly or intrusion behaviour in their network, based on Netflow data their routers emit.
Looking to secure your files but don't want to pay for an expensive program? LockedFolder will take files that you add and encrypt them, thus requiring a password to restore them. Perfect for adding to a disk or CD and transporting them between people!
SAFE Reports is a reporting/audit tool for SiteMinder® Policy Store, a popular Single Sign-On product. Find ease of generating reports from large policy data in seconds! Reports can be exported to major popular formats like HTML, word doc PDF and excel
Tomahawk is a command line utility that supports high speeds bidirectional replay (300-750 Mbps) of saved tcpdump(8) files. Tomahawk is great for testing the throughput and blocking capabilities of network-based intrusion prevention
systems (NIPS).