A Dedicated Hardware Security Module (HSM) provided by Microsoft Azure for secure key management and cryptographic operations, ensuring the protection of sensitive data in the cloud environment.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A database protection suite that provides field-level encryption, access control, and intrusion detection for distributed applications storing sensitive data.
A steganographic file system in userspace for plausible deniability of files.
A secure file and drive wiping tool that overwrites data with randomized ASCII characters to prevent data recovery.
A PHP library that provides secure data encryption capabilities using keys or passwords, designed to minimize implementation errors.
Steganography brute-force utility with performance issues, deprecated in favor of stegseek.
Proton Pass is a cross-platform password manager that provides encrypted storage, password generation, and security monitoring features with integrated 2FA and dark web monitoring capabilities.
Red October is a TLS-based encryption server that implements two-man rule authorization, requiring multiple users to collaborate for cryptographic operations.
A tool for creating encrypted volumes with self-destruction capabilities that automatically destroy data when tampering is detected or commands are issued.
A tool for securely backing up and versioning production secrets or shared passwords
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.