The full-stack observability platform that protects your dataLayer, tags and conversion data
Stop losing revenue to bad data today. and protect your marketing data with Code-Cube.io.
Code-Cube.io detects issues instantly, alerts you in real time and helps you resolve them fast.
No manual QA. No unreliable data. Just data you can trust and act on.
Learn More
Data management solutions for confident marketing
For companies wanting a complete Data Management solution that is native to Salesforce
Verify, deduplicate, manipulate, and assign records automatically to keep your CRM data accurate, complete, and ready for business.
An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
The purpose of this project is to provide a biometric security solution by using voice print, fingerprint and/or facial recognition along with a password and/or smart card support using AES to protect data. Please read forums for if interested.
SoftCo: Enterprise Invoice and P2P Automation Software
For companies that process over 20,000 invoices per year
SoftCo Accounts Payable Automation processes all PO and non-PO supplier invoices electronically from capture and matching through to invoice approval and query management. SoftCoAP delivers unparalleled touchless automation by embedding AI across matching, coding, routing, and exception handling to minimize the number of supplier invoices requiring manual intervention. The result is 89% processing savings, supported by a context-aware AI Assistant that helps users understand exceptions, answer questions, and take the right action faster.
StegoGO is an open source software that allows the embedding of hidden data in GO games, using GNUGo. It allows both the embedding of hidden data in an already existing GO game, and the creation of new GO games to hide data.
Software for a van eck phreaking device. Please use to test security only.
<a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550525,00.html">Here</a>'s an explanation if you don't know what van eck phreaking is.
Teraband is a PHP-based download administration system capable of dynamically limiting bandwidth consumption for large files. (Teraband can help prevent you from incurring overage charges from web hosts.)
The aim of the UndertheCarpet project is to develop a general steganalytic tool that is able to proccess different stego mediums (multiple image formats such as gif, bmp, jpg, etc. but also sound and text files), incluiding many of the state-of-the-art te
Iris Powered By Generali - Iris puts your customer in control of their identity.
Increase customer and employee retention by offering Onwatch identity protection today.
Iris Identity Protection API sends identity monitoring and alerts data into your existing digital environment – an ideal solution for businesses that are looking to offer their customers identity protection services without having to build a new product or app from scratch.
This is a powerful packet monitor program like sniffer that runs under linux's text mode . Its functionalities include the ip/non-ip retrieval and monitor from data-link layer to application layer
Disk Optimizer selects files to be placed on any disk medium that will maximize the space used. It is very efficient in finding an optimum file set since it uses a Genetic Algorithm instead of brute force.
FWReport is a log parser and reporting tool for IPTables. It generates daily and monthy summaries of the log files, allowing the admin to free up substantial time, maintain better control over security of the network, and reduce unnoticed attacks.
Open En/decryption software. Current version allows for 2 keys, 1 at 32 bytes, and 1 at 20 bytes. Supports ASCII and Binary files in a multiple-executable polylithic architecture.
kfile-cert is a plugin for KDE that displays additional information on
X509 certificate files in the file properties dialog and file pop-up tip in Konqueror. The information includes: certificate status, validity term, issuer, subject.
Cryptar is a cryptographic network backup program that is able to be very efficient with network resources by using an algorithm derived from the rsync algorithm. It uses SHA-1 hashes to verify (sign) its data and AES to encrypt it.
NoFault is a library written in C used to encrypt or decrypt data with XOR encryption. KNoFault, NoFault32 and CLNoFault are direct applications of the library, which is easy to use in your own programs.
Simple XOR Encryption is written in c++ and can encrypt files using insecure XOR encryption.
Could be used to form framework for implementing XOR encryption in other programs, such as encrypting save game files in games, etc.
Tested on Windows + Linux.
Chaosreader is a freeware tool to fetch application data from snoop or tcpdump logs. Supported protocols include TCP, UDP, IPv4, IPv6, ICMP, telnet, FTP, HTTP, SMTP, IRC, X11, VNC, ...
sfick (pronounced as "s-fick") is a two part software system whose function is to assist system administrators with the process of verifying the integrity of critical files. Given a system compromise, system administrators must be able to verify the integ
Syscheck monitors the reliability/integrity of critical system files (config files and
binaries) by identifying changes made to them. It does this through an "automated
verification regimen run at regular intervals" against a local or remote database
UnderMP3Cover is a mp3 steganography tool. It will allow you to write and read hidden messages within mp3 files without creating any audible differences to the mp3. The messages could be a text file, jpg or any other file depending on the mp3's size.
The Enforcer is a Linux Security Module designed to improve integrity
of a computer running Linux by ensuring no tampering of the
filesystem. It can interact with TCPA hardware to provide higher
levels of assurance for software and sensitive data.
This is passwords, a free program to store passwords and additional data in an encrypted database. Passwords main focus is on quick and easy usage as well as robustness and flexibility in terms of the encryption technique.