Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.
Learn More
Comet Backup - Fast, Secure Backup Software for MSPs
Fast, Secure Backup Software for Businesses and IT Providers
Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
Cryptography Workshop is a small yet powerful tool for cryptography and cryptanalysis. It's focused more on classic cryptography. It is currently in alpha and under development.
Patronus is a distributed system written in Java dedicated to protect local networks. It ensures that chosen security policy is not ignored on each host which is under Patronus's control.
ConDEnSE (Confidential Data Enabled Statistical Exploration) will be a web-based environment for statistical analysis of confidential data from various database sources, based on Plone and R, and using the Jackknife method of confidentiality protection.
Inventory and Order Management Software for Multichannel Sellers
Avoid stockouts, overselling, and losing control as your business grows.
We are the most powerful inventory and order management platform for Amazon, Walmart, and multichannel product sellers. Centralize orders, product information, and fulfillment operations to run more efficiently, sell more products, and stay compliant with marketplace requirements so you can grow profitably.
Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.
EasyIDS is an easy to install intrusion detection system based upon Snort. EasyIDS is designed for the network security beginner with minimal Linux experience. EasyIDS includes CentOS linux, Snort, Barnyard, mysql, BASE, ntop, arpwatch, and more.
ContraCaptcha is a Java-based libary for solving (image-based) captchas. It provides classes for image processing and character recognition. It also includes solvers for some of the popular captcha-systems in use DISCLAIMER: only for learning purpose (;
A simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a set of [relatively] short python scripts that you can easily examine.
SoftCo: Enterprise Invoice and P2P Automation Software
For companies that process over 20,000 invoices per year
SoftCo Accounts Payable Automation processes all PO and non-PO supplier invoices electronically from capture and matching through to invoice approval and query management. SoftCoAP delivers unparalleled touchless automation by embedding AI across matching, coding, routing, and exception handling to minimize the number of supplier invoices requiring manual intervention. The result is 89% processing savings, supported by a context-aware AI Assistant that helps users understand exceptions, answer questions, and take the right action faster.
An undetectable Remote Administration Tool -OR- trojan, an all new approach. Easily usable, Client just requires any Web Browser to control remote machine via WebPage. Fooling firewalls/ids/ips security solutions, as it operates like any web-site.
Advanced Perl script for DES password cracking. Might be handy for password QA. Brut-force, load Unix passwd/shadow, multi hash crack, input/output file, save/resume cracking state.
CloudKey is a multi-user password manager. It allows multiple users to store passwords, PINs, usernames, etc... in a searchable database for retrieval from anywhere.
Project still in development, not all features are available yet.
Laika analyzes and reports on the interoperability capabilities of EHR systems. This includes the testing for certification of EHR software products and networks.
mod_dnsblacklist is a Lighttpd module that use DNSBL in order to block spam relay via web forms, preventing URL injection, block http DDoS attacks from bots and generally protecting your web service denying access to a known bad IP address.
Snort to Surfnet IDS Connector developed for the CSN.OR.AT (Community Sense Net ) Project. This connector is used to report snort alerts directly to the surfnetids (ver. 3) database.
It load the current public-timestamp-block from publictimestamp.org and store it in a file to use it e.g. as a signature in an e-mail software.
The project is inactive and not under development anymore.
A C library providing client access to Atlassian's Crowd application. Also includes a command line interface and an Apache authentication/authorization module.
Sharemind is a secure multiparty computation system that allows you to process data without seeing it.
IMPORTANT: The version available on this page is a seriously outdated version that is kept available as an educational tool. More recent versions with more features and better quality are available from http://sharemind.cyber.ee/.