Feroot AI automates website security with 24/7 monitoring
Trusted by enterprises, healthcare providers, retailers, SaaS platforms, payment service providers, and public sector organizations.
Feroot unifies JavaScript behavior analysis, web compliance scanning, third-party script monitoring, consent enforcement, and data privacy posture management to stop Magecart, formjacking, and unauthorized tracking.
Learn More
Securing the Cloud Made Easy
Multi-cloud security delivered — now and in the future.
Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an agentless cloud Security Platform that provides security teams with 100% coverage their entire cloud environment.
Automated Computer Auditing Daemon - Keep a track of what's going on with your systems: suid, sgid, world writable, hidden and unowned files monitoring as well as important file's md5sums management audits sent to your mailbox on a regular basis.
This is a program in script shell to manage user accounts, groups, rules and parameters for Squid Proxy. This application was developed to help new system administrators providing an easier and faster way to do this job.
Single-honeypot is a powerfull tool, for security interest about the estudies of techniques of breaking systems.
This is, a singular or little honeypot for test your networks for hostiles visitors.
This made in perl script.
Simulate different servi
Mardot is a script for analize the logs of Iptables and calculate statistics about the package that the system reject. This statistics are use for make graphics, that the users can see whit a web browser. In the future whit the web browser you can use a
With CRM, Sales, and Marketing Automation in one, Act! gives you everything you need for happier clients, more revenue, and less stress.
Act! Premium is perfect for small and midsize businesses looking to market better, sell more, and create customers for life. With unparalleled flexibility and freedom of choice, Act! Premium accommodates the unique ways you do business. Whether it’s customizations to fit your specific business or industry processes or your preferences for deployment and access, the possibilities with Act! Premium are limitless.
Pace-ICMP is a utility that can allow X amount of ICMP (ping, etc) packets travel to the host, once X is exceeded, all ICMP traffic is blocked. This allows ping and traceroute functionality, while still protecting you against ICMP attacks.
Pace-IDS is an Intrusion Detection system designed to replace Tripwire, in that it is faster, and more effective of detecting trojan activity, and is easier to configure. All you have to do usually is simply change one variable to your email address.
Pace Check is a utility that searches through system logs and finds cases where someone has tried to gain access to your server (non-legit), then it saves them to a log, mails them to you, or sends them to stdout. It supports http, ftp, and others.
SyOSsh aims to be a full native ssh client pack (based on Simon Tatham's excellent Putty) for handhelds using SymbianOS (aka. EPOC): ER5 (like Psion Revo), GT6.x (like Nokia 92x0).
A RTLinux X10 CM11 Driver using RT_COM. Plan on having a configuration file for input and control. In addition, plan on having output via HTML/CGI. Possibly have some control items via the web page.
Generative Al is shaping brand discovery. AthenaHQ ensures your brand leads the conversation.
AthenaHQ is a cutting-edge platform for Generative Engine Optimization (GEO), designed to help brands optimize their visibility and performance across AI-driven search platforms like ChatGPT, Google AI, and more.
Linids is a modular, highly configurable, network IDS.
Almost stateful and soon to be able to connect to a management server (different agents).
Linids is rulebased (passive filters) and has active filters (portscan detection etc).
A security scanner coded in a tcl/tk extension for use with linux and unix systems . It automatically downloads patches and exploits how ever testing of them is left up to the user for security reasons
Sportal is made for people that need to know what is going on in their systems. It monitors files that you select, for "hot words" that you also select, through a graphical interface.This is work in progress, i spect it to grown to a full IDS.
Fingerprint Copy is a forensic copy utility. The utility creates copy of file(s) and verifies this copies with digital fingerprints(checksum) of the source file(s). The utility is in a early development state. Planed: March 2009 First Command-line Utiliy
ITkeys automates the security management process for Windows networks (Active Directory groups). Delegates the ability to amend relevant IT access for employees to their managers. Wizzard based web tool requiring no formal training. No more ADUC MMC!
This tool will query againt mssql to find any occurance of string in a database.
This will help system admin to locate if any, malicious scripted had been injected to the database.
Red Alert is a security alert system that can protect your computer area.
The main goal of the system is to keep intruders off of your computer property.
Cryptofon - a safe phone with integrated encryption.
The Cryptofon is designed to enable safe and secure communication trough a regular PSTN line. It supports narrowband connections (~2400 bit/s and lower).
Latest Release:
v07.01.2024.0 | http://adfoc.us/700817100065016
SHA256(.zip): 5e138cb20f017e958b30d3b548e1de4447c6affae53c4eabb63c38c0a9aa832d
SHA256(.exe): f064ee75e6f53b4e5448be794d1540fcba60a4f37aa12e2dd97aad6be5a2d5b3
Github (Don't trust us? Build the exe your self!):
https://github.com/GenesisFoundationCore/Katyusha
Katyusha, Multiple Payload DDoS Software, that uses images / gif files as Payloads in-order to flood a Group Chat / Discord Server with Messages and Images,...