Run applications fast and securely in a fully managed environment
Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.
Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
Try for free
Get full visibility and control over your tasks and projects with Wrike.
A cloud-based collaboration, work management, and project management software
Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
Mailchecker will (in time) check mail for 'safe' content. 'unsafe' content (e.g. attachments that may contain viruses) will be stopped or converted to 'safe' formats.
The AI-powered unified PSA-RMM platform for modern MSPs.
Trusted PSA-RMM partner of MSPs worldwide
SuperOps.ai is the only PSA-RMM platform powered by intelligent automation and thoughtfully crafted for the new-age MSP. The platform also helps MSPs manage their projects, clients, and IT documents from a single place.
Malabar is a simple, context-agnostic authentication library for Java applications. It strives to be equally usable in J2EE/Web, GUI, and other applications requiring user authentication.
We're working on developing a standard encryption API for the Python language,
and building a set of standard cryptography modules. The CVS tree is open
to anyone who needs it for a Python/crypto related package.
One of the project groups in Intake 6 is planning on doing a IM client which is secure. This includes messenging, file sending, picture drawing, video transmissions by far.
Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.
OpenSQLi-NG is the next generation open source sql injection tool. It silently test and exploit (on-demand) SQL injections conditions. Please refer to the project web site to have the complete description: http://opensqling.sourceforge.net/?page_id=8
This is an implementation of a simple diameter client. It is meant as an example client for embedded devices, too small to use the opendiameter server.
This is a simple tool that generates a set of self-signed certificates for a group of distributed Java-based servers. It also creates the trusted key store to house the public keys and allow for the servers to communicate via SSL
The Shibboleth Proxy provides an intermediate filter to the Shibboleth authentication system, enabling Shibboleth unaware applications to connect automatically and make use of Shibboleth protected HTTP-based service providers.
reCAPTCHA JCA is a J2EE/Java EE Connector Architecture RA (Resource Adapter). It runs on any Java EE certified application server. reCAPTCHA JCA provides excellent connection pooling and allocation strategies by means of the JCA.
CMS identifier (cmsident) attempts to identify the content management system used to generate a given web site (and its version). Future versions will automatically look up found versions in vulnerability databases to alert if updates are necessary.
The goal of Keen Manager is to design a simple and highly expandable control panel system for use by end-users and developers. It is also meant for having a multi-user authentication system in which each control panel can have it's own privilege system.
Easy Encryptor is a cross-platform encryption program designed to be of high secure standard, and easy to use even for users with no knowledge of cryptography algorithms.
The Fenrir Morph Signature project aims to provide existing signatures standards with a morph capability: "Sign once, distribute many". This capability allows to use the same signature for authenticating modified, but authorized, versions of a document
empass enables a randomly generated password to be "written" down but still remain secure. This is accomplished by means of a key phrase and randomly generated characters. After generation, the resulting table may be used to generate new passwords.