Cloud-Based Software Licensing - Zentitle by Nalpeiron
The #1 Software Licensing Solution. Release new Software License Models fast with no engineering. Increase software sales and drive up revenues.
1000’s software companies have used Zentitle to launch new software products fast and control their entitlements easily - many going from startup to IPO on our platform. Our software monetization infrastructure allows you to easily build or
Learn More
Create a personalized AI chatbot for each team in minutes
Get better, faster answers for your whole team with an AI chatbot trained on your company documents.
QueryPal is the lifeline your team needs. Our AI chatbot integrates seamlessly with your communication channels, using advanced language understanding to identify and auto-answer repetitive questions — in seconds.
A C++/Qt program for use in encrypting and decrypting simple substitution cyphers. These cyphers are often found in newspapers and various puzzle books.
This program demonstrates a weakness in the authentication process of 802.1X EAP-MD5 in Wi-Fi networks that allows an attacker to gain login information by a dictionary attack. A Wi-Fi compliant card (802.11a,b,g) that supports monitor-mode is required.
zssh (Zmodem SSH) is a program for interactively transferring
files to/from a remote machine while using the secure shell (ssh).
It is intended to be a convenient alternative to scp, avoiding
the need to re-authenticate each time a file is transferred.
Yet another alarms program with features as file modification alarm (maybe useful for security auditories), alarms file saving possibility and of course time and date alarms. This time written in java.
Alist is a program that collects hardware and software information about systems and stores it in a database for users to browse and search via a Web interface. The program consists of three parts: a client portion that collects the information, a daemon
Wellenreiter is a GTK/Perl program that makes the discovery, penetration and auditing of 802.11b wireless networks as easy as possible. All three major wireless cards (Prism2 , Lucent, and Cisco) are supported. Usability is one of the main goal.
This is a program that watches your system log files, looking for hack attempts. It instanty reacts to potential security breaches by (for instance) adding firewall rules to cut off the attacker.
Java class file encryption. Class Encrypt is a program that can encrypt a developer's class files and package them into an executable jar file for deployment. The program uses modules for implementing different encryptions.
AI-Powered Security and IT Operations Without Compromise.
Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
pam_krb5 is designed to allow smooth integration of Kerberos 5 passwordchecking with applications built using PAM. It also supports session-specific ticket files (which are neater), Kerberos IV ticket file grabbing, and AFS token-grabbing.
The Secure Remote Log Monitor (SRLM) project provides client and server
utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.
SWATT (Secure Wargame AdminisTration Tool) Is a program designed for wargames in order to allow a secure remote backdoor, to prevent from getting locked out in a critical moment.
Secure locate provides a secure way to index and quickly search for files on your system. It will also check file permissions and ownership so that users will not see files they do not have access to.
Wonder who deleted that important file on your Linux box? Did your database files "mysteriously" disappear from that super-secure Linux database server and you don't know how? Now your system logs will tell who, what, when, and how with Auditunlink
ThorsenCode is a client-server system, that allows you and your buddies to share files in a safe way. It features encrypted filetransfers and encrypted chatrooms.
Regular Expression, Arbitrary Protocol, Opensource Filtering Firewall (Reapoff) is a regular expression enabled TCP/IP plug proxy.
The proxy operates on data using a pair of simple rule based configuration files defining the testing and actions on th
ProSum is a terminal based program that protects your files, sys_call_table and IDT like tripwire way (All in user space, without kernel modules) In addition, database with files etc. could be encrypted with Blowfish algorythm and more.
Hardware-ID is a small Linux module providing
a program by program assignment of certain hardware
specific values. Useful for preparing master
hard drives, hardware independend backup/restore
and some exotic hardware.
Packet Flood Generator as the name stands is a projet to produce a
threaded traffic generator program, it has support for generating IP, TCP , UDP, ICMP and IGMP packets, also has as feature to keep the connection up.
An almost complete one-time-pad suite. Has many features which are non-existant in other OTP programs, and includes 5 programs (plus an uninstaller) which allow the user to create keys, create fake keys, encrypt, and decrypt files.
bcrypt is a lightweight blowfish file encryption utility which aims for cross-platform portability of not only the actual code, but the encrypted files as well. In addition to providing 448-bit encryption, bcrypt overwrites input files with random garbage
This program allow you to extract files from network traffic under HTTP and FTP protocols. It should permit you to see, for instance, using an antivirus on the files, if a machine of your network have downloaded a virus.