Open Source Perl Security Software for Linux - Page 5

Perl Security Software for Linux

View 591 business solutions

Browse free open source Perl Security Software for Linux and projects below. Use the toggles on the left to filter open source Perl Security Software for Linux by OS, license, language, programming language, and project status.

  • An All-in-One EMR Exclusively for Therapy and Rehab. Icon
    An All-in-One EMR Exclusively for Therapy and Rehab.

    Electronic Medical Records Software

    Managing your therapy and rehab practice is a time-consuming process. You spend hours on paperwork, billing, scheduling, and more. Raintree’s Therapy & Rehab EHR is here to help you manage your practice more efficiently. With our all-in-one solution, you’ll get the tools you need to streamline your therapy and rehab practice, improve patient care, and get back to doing what you love.
  • Cybersecurity Management Software for MSPs Icon
    Cybersecurity Management Software for MSPs

    Secure your clients from cyber threats.

    Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
  • 1
    ARCCIOS aim is to analyze network config through the security prism. It is working at that time for Cisco devices and provide security dashboard, full reports and todo list under html and csv.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Advisory Check is a tool for monitoring the security of installed software. It gathers security advisories using RSS/RDF/XML feeds, compares them against a list of known software, and alerts you if you're vulnerable. Let advchk read advisories for you!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Automated Incident Reporting (AirCERT) is an Internet-scalable infrastructure to automatically receive, process, and analyze security event information reported from across administrative domains.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Alfandega is a strong and Modular IpTables Firewall. It provides NAT, port-forwarding, spoofing list, blacklist of crackers and spywares sites, protection for tcp/udp scans, DOS/DDOS and Smurf attacks, TCP tuning, DHCP and PPP support and much more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Holistically view your business data within a single solution. Icon
    Holistically view your business data within a single solution.

    For IT service providers and MSPs that need a data platform to manage their processes

    BrightGauge, a ConnectWise solution, was started in 2011 to fill a missing need in the small-to-medium IT Services industry: a better way to manage data and provide the value of work to clients. BrightGauge Software allows you to display all of your important business metrics in one place through the use of gauges, dashboards, and client reports. Used by more than 1,800 companies worldwide, BrightGauge integrates with popular business solutions on the market, like ConnectWise, Continuum, Webroot, QuickBooks, Datto, IT Glue, Zendesk, Harvest, Smileback, and so many more. Dig deeper into your data by adding, subtracting, multiplying, and dividing one metric against another. BrightGauge automatically computes these formulas for you. Want to show your prospects how quick you are to respond to tickets? Show off your data with embeddable gauges on public sites.
  • 5
    Alien Cipher

    Alien Cipher

    A bespoke symmetric cipher.

    Released under 'Creative Commons v3' license Alien Cipher is an endevour to build my own symmetric cipher. The primary aim is to simply learn the fundementals and finer details of cryptography in general and build working examples of my ideas in code. The code is shared here for prosterity (future folk) in the guise that it may help others also on the path to cryptography. This code demo uses a 512bit rolling hash table (8x8bytes) at its heart to mix together pre-defined parameters in a way that allows the cipher to produce encoded output that is locked to a key of arbitrary length without padding. Based upon some random data points the cipher produces encoded output that is non-deterministic in nature, ie the same key and message will never produce the same output each time it's run. The cipher attempts to render output that is resistant to several types of analysis although this has yet to be proven. Please note that I make no claims to this being safe. Cheers o7.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Apache::AppSamurai is a mod_perl based authenticating reverse proxy/application front end designed to protect applications from direct Internet attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Ariesbot, is an ircbot, which will be able of doing basic bot functions such as op/deop/kick/ban/moderate. Plus being able to Wu-Ftpd scans, cgi/php scans port scans, subnet scans and scan for vuln version of apache to nosejob.c.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The goal of the project is to build a framework to allow Astaro firewall users to install optional software packages on their firewalls. (Astaro is a Linux-based firewall available from www.astaro.com.) Such a framework includes a package-management syst
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This is a apache v2.0 authentication module. Based on html form authentication and cookie authentication session. Cookie session are stored in memcache deamon. Can be used has an simple "Single Signe-On" (SSO). All the code source and the bug tracking has migrated to github: https://github.com/ZenProjects/Apache-Authmemcookie-Module All the documentation are here: https://zenprojects.github.io/Apache-Authmemcookie-Module/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Enterprise and Small Business CRM Solution | Clear C2 C2CRM Icon
    Enterprise and Small Business CRM Solution | Clear C2 C2CRM

    Voted Best CRM System with Top Ranked Customer Support. CRM Management includes Sales, Marketing, Relationship Management, and Help Desk.

    C2CRM consists of four modules that integrate to provide a comprehensive CRM solution: Relationship Management, Sales Automation, Marketing Automation, and Customer Service. Only buy what each user needs.
  • 10
    Authdefender is a filtering application that, in combination with iptables, blocks malicious users from accessing any aspect of the server in question. Malicious users are defined by brute force ssh/ftp attempts and blocked regardless of tcp wrappers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Authen::Simple::WebForm - Perl library for simple authentication against existing web based forms using Authen::Simple framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Automaton: An Automated Forensic Auditing, Security & Control Framework
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    BGPWatch is a Linux and BSD background process monitor written in Perl. It is useful for controlling how many processes each user has running , what processes they are running, and what they are allowed to run.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The Bro Re-usable Architecture (BRA) is a project by Christopher Jay Manders that will allow one, with minimal effort, to set up a working Bro (real-time intrusion detection) environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    BlockSSHD protects computers from SSH brute force attacks by dynamically blocking IP addresses by adding iptables rules.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    BogoSec is a utility that calculates source code security quality metrics. A flexible framework interprets the results of existing scanners to compute these metrics. BogoSec is useful to track security quality across releases and competing packages.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Perl-based syslog watcher that matches certain login failures (SSH, FTP, POP3) and can dynamically block and email an alert, helping to monitor and manage hosting servers. NOTE: Although no recent updates, I'm still able/willing to update this code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Simple Intrusion Detection System which monitors failed access (SSH and Dovecot) attempts. If hack attempt is detected above the configurable threshold level then a number of actions are taken to block the IP and alert administrators of the attempts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Buffer0verfl0w Security is a team of skilled security developers, who are authoring security applications, whitepapers, and discovering security flaws in software, publicly disclosing their projects and encouraging volunteers to help improving them.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Build FW1 Cisco Netscreen PolicyFromLogs
    These three tools build Checkpoint, Cisco ASA or Netscreen policys from logfiles. They write dbedit, access-list or set address, set service and set policy commands for the traffic seen in the logs, that can be cut and pasted into the firewalls. WOOT
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This software is a set of tools that hides C source code in txt files. Also the software is able to restore the txt files to C source code again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Helper web application writen in PhP and Perl to mantain local Certificate Authority based on openssl. Provides ability to view issued certificates, issue new certificates, revoke compromised certificates.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    This is an attempt to port the CIS Benchmark tool (http://cisecurity.org/index.html) to OS X from its Linux implementation. This project is working on taking the source from the Level 1 Linux implementation, written in Perl, and porting it to OS X. The
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Cancerbero (the watchdog of the ports) is a portscan frontend based in nmap. Scans the hosts of net ranges every configured interval and it'll store the results in a mysql DB. Detect changes in ports, services and OS and notice you with an email ale
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Capture is a high interaction honeypot client that finds malicious servers on a network. Capture monitors the systems state, and checks for changes which malicious resources may cause. THIS PROJECT HAS MOVE TO HTTP://www.nz-honeynet.org/capture.html
    Downloads: 0 This Week
    Last Update:
    See Project