We help you deliver Virtual and Hybrid Events using our Award Winning end-to-end Event Management Platform
Designed by event planners for event planners, the EventsAIR platform gives you the ability to manage your event, conference, meeting or function with
EventsAIR have been anticipating and responding to the ever-changing event industry needs for over 30 years, providing innovative solutions that empower event organizers to create successful events around the globe.
Learn More
Attack Surface Management | Criminal IP ASM
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
CapPacketDecryptor is a MapleStory packet decrypting solution which reads .pcap files, decrypts the packets in them, and dumps them to another .pcap file, while reconstructing TCP information.
For system user to take backup of any confidential file(it may be code/important document)as it may contain content not meant for the others to view or the system may crash.We will be securing the backup of selected files at regular intervals of time.
File Crypter is a Simple program, that is able to encrypt your files and decrypt them. A version of File Crypter is included as an example in the xCrypter Library and is called "ncrypter" which is short for "new crypter".
Assembled is the only unified platform for staffing and managing your human and AI support team.
AI for world-class support operations
Assembled is the only platform that unifies AI agents and intelligent workforce management to power fast and flexible support operations. Built for scale, we help teams automate over 50% of customer interactions, forecast with 90%+ accuracy, and optimize staffing across in-house and BPO teams. Orchestrate every chat, email, or call, balancing workloads between human and AI agents in real time — without sacrificing quality or control. Trusted by Stripe, Canva, and Robinhood, Assembled transforms support from a cost center into a strategic advantage. Our Workforce and Vendor Management tools connect forecasting, scheduling, and performance for smarter staffing decisions. AI Agents automate conversations across channels with your workflows and brand voice. AI Copilot empowers agents with real-time guidance, suggested replies, and one-click actions for faster, higher-quality resolutions.
NetBeans, pure Java. The Cryppie can protect your files by encrypting its content, possibility to compress files before encryption. It's destination for keep information in safe on your flash drive or another storage.
Discover hidden files you never seen before! NTFS ADS is an forensic/security utility to reveal, list, delete, determine contents, extract and copy hidden files from NTFS Alternate Data Streams.
EasyVote is a new easy to use, secure and transparent cryptographic online voting scheme for small elections (up to 500 voters).
The project contains the PHP files necessary to set up the server as well as the management tools.
Three software packages to work with RFC2617 digests: libdigest (C library to compute digests), libcppdigest (C++ library to manage /etc/passwd-like files) and libpam-digestfile (PAM module allowing authentication via an /etc/passwd-like file)
mp3stegz is an application that apply steganographic (steganography) algorithm in mp3 files. mp3stegz will maintain original mp3 file's size and sound quality. The hidden message is compressed(zlib) and encrypted(Rijndael).
Labrador is a Host-based Intrusion Detection System (HIDS) and Integrity Checker written entirely in Perl. It aims to be a complete, free, multiplatform, and open-source solution for detecting modifications and tamperings in files.
ghash is a simple file hashing program with a GTK interface. It currently supports multithreaded hashing of files into MD5, SHA1, GNUnet. It is meant to be become a drag and drop version of the common commandline hashing utilities.
A Cryptography php module very easy to use, could be used to protect databases, files, ad hash codes in every server that support php. Nowdays the most used hash algoritms are weak and there are many huge database with the hash code and the relative pass
This application aims to be a simple, small and portable enrypter which encrypts any number of files of any size quickly but securely. It also preserves file extensions which are encrypted with the file and handles ANY file type.
- DSI is a security framework addressing security needs of carrier-grade Linux clusters. - DigSig is a linux kernel module checking RSA signatures of ELF executables at run-time. **Those projects are no longer maintained**
Gateway Anti-Virus allows applications across the enterprise to check files for viruses by providing a SOAP-based virus scanning web service. The system uses clamav for virus definitions and detection.
Use prime numbers and pseudorandom number generators to create pseudorandom permutations to "shuffle" bits of given data (passwords, logins, PINs, files, directories). It is designed to be very secure (I hope so).
A toolkit of nitty-gritty classes from real-life projects. Contains generic snippets along with things like server-side DOM implementation or RSA or code generation tools.
KeyStone is an editor program for Java keystore files, licensed under the GPL. KeyStone may help make your life easier if you're working with symmetric cryptography in Java.
Open Eraser securely delete files by overwriting them. Every character in the file is overwritten so it is secure: softwares couldn't recover erased files by OpenEraser. Try it at http://www.aessepi.it/OpenEraser/dist/launch.html
Chameleon will provide malware resistance by allowing easy use and management of files and applications that are partitioned into separate roles. Components in Chameleon may also be helpful for using multiple X servers together.