AI-Powered Security and IT Operations Without Compromise.
Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
Learn More
Contract Management Software | Concord
AI-powered contract management that helps businesses track spending, negotiate smarter, and never miss deadlines.
Concord serves small and mid-sized businesses and Fortune 500 companies. This robust, web-based platform is used by human resource, sales, procurement, and legal teams, and virtually anyone who deals with contracts.
A framework for information security management. It has the centralized server for managing the IDS sensors, log consolidation and correlation, report generation etc. Also it has customized IDS sensor based on snort.
What are the packets rejected by your Netfilter based firewall today ? How often this suspicious host try to connect to your box ? What are the most rejected domains ? Who is this strange host which scan your ports ?
The responses are in the iptables log
WASTE is a mesh-based workgroup tool that allows for encrypted, private communication between distant parties on the internet, independant of local network organization.
Deliver and Track Online and Live Training Fast and Easy with Axis LMS!
Axis LMS targets HR departments for employee or customer training,
Axis LMS enables you to deliver learning and training everywhere through a flexible and easy-to-use LMS that is designed to enhance your training, automate your workflows, and engage your learners.
S/Key Generator. An RFC2289 compliant One-Time Password generator written in Java language and O.S. Thinlet package for GUI.
It uses MD4 and MD5 hash algorithms.
Run applications fast and securely in a fully managed environment
Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of Google's scalable infrastructure.
Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
Thresh is an application for Snort that manages alert thresholding and suppression. This application was designed to assist the administrator with tuning one or more Snort sensors. This was designed to run under RedHat flavors of Linux.
Sting is a simple, host-based approach to detecting arp cache poisoning based man in the middle attacks (such as made by ettercap) on your LAN. It uses SNMP to periodically query the arp cache of your router and make sure its entry for you is correct.
HumanSudokuSolver is intended to solve Sudoku puzzles in a way human beings would do (non brute force). It currently solves most of the puzzles I tried and can output a step-by-step solution. Developers who want to contribute are welcome!
A fast contractual framework based Monitoring agent for Java with extended support for temporal operators and customizable agents for JVMTI, Javassist and Dynamic Proxy APIs.
Privale is a p2p network following the form of onion routing/mixmaster networks. But, it is an anonymous publish and retrieval medium, not a proxy system. Privale attempts to defend against denial of service attacks, Sybil attacks, and traffic analysis
S/Key - OTP Generator for J2ME architecture. An RFC2289 compliant One-Time Password generator for mobile phone supporting Java language. It uses MD4 and MD5 hash algorithms.
NOTE: Development has moved to github: http://www.github.com/jaymzh/check_x509
check_x509 is a generic script to check X509 entities for expiration periods. It can be run from nagios, nrpe, cron, on the command line, or in other scripts or programs.
The certificate daemon, certd, is a (X.509) certifcate discovery and validation daemon that can be used by network clients to acquire information concerning issued certificates (e.g., validity, fingerprints etc.)
The Inside Security Rescue Toolkit is a multi-purpose disaster recovery and network analysis system. It runs from a credit card-sized CD-ROM for convenient transport or download. It has read-write support for NTFS-partitions, full partition handling supp
The PeerTrust system uses policies to describe trust and security requirements. Such policies are a component of Peertrust run-time system that can negotiate to establish trust among systems on the Semantic Web
SecMec is a wizard to install several security mechanisms on Linux. It runs straight from the console and was designed initially to run on Slackware Linux, but it's possible to port it to any other distro with some customization.