Database protection suite with field level encryption and intrusion detection. Acra provides application-level encryption for data fields, multi-layered access control, database leakage prevention, and intrusion detection capabilities in one suite. Perfect for distributed apps (web, server-side and mobile) that store data in one or many databases / datastores. Typical industries: Web and mobile apps that store data in a centralised database or object storage, Healthcare, patient apps, Finance, fintech, neobanking, SaaS, Critical infrastructures, Apps with > 1000 users, IoT apps that collect telemetry and process data in the cloud, High-load data processing apps. Acra gives you tools for encrypting each sensitive data record (data field, database cell, json) before storing them in the database / file storage. And then decrypting them in a secure compartmented area (on Acra side). Acra allows to encrypt data as early as possible and operate on encrypted data.
FEATURES
ALTERNATIVES
International cybersecurity festival for all, who wants to dive into the world of cyber security and have a great time.
Script to check for artifacts with the same name between repositories to prevent Dependency Confusion Attacks.
A lab designed for defenders to quickly build a Windows domain pre-loaded with security tooling and best practices in system logging configurations.
A collection of CTF source files and write-ups that anyone can contribute to.
A comprehensive server cryptographic protocol analyzer with API and CLI interface.
Extracts resources (bitmaps, icons, cursors, AVI movies, HTML files, and more) from dll files
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Kriptos
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.