Authentication

Explore 110 curated cybersecurity tools, with 15,161 visitors searching for solutions

Akamai MFA Logo

Akamai MFA is a cloud-based multi-factor authentication solution using FIDO2 standard to secure workforce logins across various applications through smartphone push notifications.

0
Akamai Identity Cloud Logo

Akamai Identity Cloud is a CIAM solution that manages customer identities, enhances user experiences, and ensures data protection and regulatory compliance for high-volume consumer brands.

0
Hapi Logo

Hapi is a Node.js web application framework that provides built-in functionality for building scalable server-side applications and APIs with security features and plugin architecture.

0
Tang Logo

Tang is a network-based server that binds encrypted data access to network presence, allowing data decryption only when clients are connected to the specific network where the Tang server operates.

0
panic_bcast Logo

A decentralized network panic button that triggers emergency system shutdowns across networked machines via UDP broadcasts and HTTP to prevent cold boot attacks.

0
DefaultCreds-cheat-sheet Logo

A centralized reference resource containing default credentials for various devices and systems to assist security professionals in both offensive and defensive operations.

0
ssh-auth-logger Logo

A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.

0
Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation Logo

A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation

0
Themis Logo

Themis is an open-source cryptographic services library that provides high-level encryption and data protection capabilities for securing data during authentication, storage, messaging, and network exchange.

0
kube2iam Logo

kube2iam provides IAM credentials to Kubernetes containers by intercepting EC2 metadata API calls and retrieving temporary AWS credentials based on pod annotations.

0
HonnyPotter Logo

A WordPress plugin that logs failed login attempts to help monitor unauthorized access attempts on WordPress websites.

0
PwnAuth Logo

PwnAuth is an open-source tool for generating and managing authentication tokens across multiple protocols, designed for penetration testing and red team exercises.

0
Red October Logo

Red October is a TLS-based encryption server that implements two-man rule authorization, requiring multiple users to collaborate for cryptographic operations.

0
ConsoleMe Logo

ConsoleMe is a web service that simplifies AWS IAM permissions and credential management across multiple accounts through self-service workflows and centralized administration.

0