anny is an all-in-one platform for managing hybrid workplaces and shared resources.
For Businesses looking for a flexible solution for internal and external bookings
Enable your employees to easily book desks, meeting rooms, parking spots, equipment, and more – all in one place. With flexible rules and group permissions, you stay in full control of who can access what.
Learn More
Optimize every aspect of hiring with Greenhouse Recruiting
Hire for what’s next.
What’s next for many of us is changing. Your company’s ability to hire great talent is as important as ever – so you’ll be ready for whatever’s ahead. Whether you need to scale your team quickly or improve your hiring process, Greenhouse gives you the right technology, know-how and support to take on what’s next.
StegoGO is an open source software that allows the embedding of hidden data in GO games, using GNUGo. It allows both the embedding of hidden data in an already existing GO game, and the creation of new GO games to hide data.
Software for a van eck phreaking device. Please use to test security only.
<a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550525,00.html">Here</a>'s an explanation if you don't know what van eck phreaking is.
Teraband is a PHP-based download administration system capable of dynamically limiting bandwidth consumption for large files. (Teraband can help prevent you from incurring overage charges from web hosts.)
The aim of the UndertheCarpet project is to develop a general steganalytic tool that is able to proccess different stego mediums (multiple image formats such as gif, bmp, jpg, etc. but also sound and text files), incluiding many of the state-of-the-art te
This is a powerful packet monitor program like sniffer that runs under linux's text mode . Its functionalities include the ip/non-ip retrieval and monitor from data-link layer to application layer
FWReport is a log parser and reporting tool for IPTables. It generates daily and monthy summaries of the log files, allowing the admin to free up substantial time, maintain better control over security of the network, and reduce unnoticed attacks.
Open En/decryption software. Current version allows for 2 keys, 1 at 32 bytes, and 1 at 20 bytes. Supports ASCII and Binary files in a multiple-executable polylithic architecture.
Safetica Data Loss Prevention Software for Businesses
For companies that want to protect their sensitive data against leakages, insider threats and want to be compliant with regulations.
Safetica is a cost-effective, easy-to-use Data Loss Prevention (DLP) solution. It performs security audits, prevents sensitive data from leaving your company, and sheds light on what is going on in your organization.
kfile-cert is a plugin for KDE that displays additional information on
X509 certificate files in the file properties dialog and file pop-up tip in Konqueror. The information includes: certificate status, validity term, issuer, subject.
Cryptar is a cryptographic network backup program that is able to be very efficient with network resources by using an algorithm derived from the rsync algorithm. It uses SHA-1 hashes to verify (sign) its data and AES to encrypt it.
NoFault is a library written in C used to encrypt or decrypt data with XOR encryption. KNoFault, NoFault32 and CLNoFault are direct applications of the library, which is easy to use in your own programs.
Simple XOR Encryption is written in c++ and can encrypt files using insecure XOR encryption.
Could be used to form framework for implementing XOR encryption in other programs, such as encrypting save game files in games, etc.
Tested on Windows + Linux.
Chaosreader is a freeware tool to fetch application data from snoop or tcpdump logs. Supported protocols include TCP, UDP, IPv4, IPv6, ICMP, telnet, FTP, HTTP, SMTP, IRC, X11, VNC, ...
sfick (pronounced as "s-fick") is a two part software system whose function is to assist system administrators with the process of verifying the integrity of critical files. Given a system compromise, system administrators must be able to verify the integ
Syscheck monitors the reliability/integrity of critical system files (config files and
binaries) by identifying changes made to them. It does this through an "automated
verification regimen run at regular intervals" against a local or remote database
UnderMP3Cover is a mp3 steganography tool. It will allow you to write and read hidden messages within mp3 files without creating any audible differences to the mp3. The messages could be a text file, jpg or any other file depending on the mp3's size.
The Enforcer is a Linux Security Module designed to improve integrity
of a computer running Linux by ensuring no tampering of the
filesystem. It can interact with TCPA hardware to provide higher
levels of assurance for software and sensitive data.
This is passwords, a free program to store passwords and additional data in an encrypted database. Passwords main focus is on quick and easy usage as well as robustness and flexibility in terms of the encryption technique.
SSCL is a small, secure C++ library with some useful data types (list,
avltree), stream handling, networking support, lexical analyzer, etc.
SSCL's primary goal is to help daemon development in C++.
RemenDeKO is a file repair program that you can use to generate off-line patch files to apply over damaged files. It's targeted for corrupted downloads, so the downloader just need to re-download a (probably) small file to fix the damaged download.
Random number generator, and random number seed generator classes for C++. Includes abstract base classes and derived generators. Cross platform compatible.
TrustedPickle is a Python module which lets you create and sign your datafiles. By using public/private key techniques, this module protects your users from loading malicious datafiles that others might claim you created. LEGAL FOR EXPORT.
Logcheck is software package that is designed to automatically run and check
system log files for security violations and unusual activity. Logcheck
utilizes a program called logtail that remembers the last position it read
from in a log file.