Open Source Linux Security Software - Page 2

Security Software for Linux

View 617 business solutions
  • Contract Automation Made Easy Icon
    Contract Automation Made Easy

    Use Docubee to easily gather data, generate contracts, share them your way, and collect secure eSignatures

    Docubee is an intelligent contract automation platform that allows you to quickly and painlessly generate, manage, share, and sign contracts. Featuring powerful conditional logic-based workflows, generative AI technology, and an easily adaptable interface, Docubee makes it easy to automate your most complex contracts and agreements.
  • Make Recruiting and Onboarding Easy Icon
    Make Recruiting and Onboarding Easy

    Simple, easy-to-use applicant tracking and employee Onboarding system for any sized organization.

    Take away the pain and hassle associated with applicant recruitment, hiring, and onboarding with ApplicantStack. Designed for HR professionals and recruiters, ApplicantStack helps streamline the recruiting and onboarding processes to improve productivity and reduce costs. ApplicantStack provides a complete toolkit that includes tools for posting, launching, and advertising jobs, assessing and managing candidates, collaborating with teams, centralizing information for quick hiring and onboarding, and more.
  • 1
    Sterlingcoin

    Sterlingcoin

    Low Fees | No Banks | 5.5% Interest | Transfer Worldwide

    Sterlingcoin is a digital currency used to pay for goods or services in daily life both offline and online. It is a decentralised system controlled by an open market and not by a corporation, bank or government. Because of its decentralisation everyone who runs the Sterlingcoin wallets shares the public ledger*. Sterlingcoin is a completely fair**, transparent and a highly secure form of currency for all needs. The price of Sterlingcoin is determined by supply & demand, use, trading and mining***. *Transaction history of every Sterlingcoin wallet **A limited supply of money would allow for a better economy; where ‘better’ means ‘fairer’, more stable and devoid of government intervention. ***Maintaining the block chain is called mining, and those who do so are rewarded with newly created Sterlingcoin and transaction fees.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    messor-opencart

    messor-opencart

    Messor Security - IPS/WAF anti DDOS/bot and more for OpenCart3

    Messor Free open source extension for OpenCart to protect your store. Each network member collects intruders and attacks data and then sends it to central servers, as well as distributes the current database to the rest network participants. The current concept provides real-time protection of your store from the network attacks.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    phpMussel

    phpMussel

    PHP-based anti-virus anti-trojan anti-malware solution.

    A PHP script designed to detect trojans, viruses, malware and other threats within files uploaded to your system wherever the script is hooked, based on the signatures of ClamAV and others. Un PHP script pour la détection de virus, logiciels malveillants et autres menaces dans les fichiers téléchargés sur votre système partout où le script est accroché, basé sur les signatures de ClamAV et autres. Einem PHP-Script, um Trojaner, Viren, Malware und andere Bedrohungen in Dateien zu entdecken, die auf Ihr System hochgeladen werden könnten, welches die Signaturen von ClamAV und weitere nutzt. Uno PHP script progettato per la rilevazione di trojan, virus, malware e altre minacce all'interno di file caricati nel sistema ovunque lo script è collegato, basato su firme di ClamAV e altri.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4

    sls

    SLS Team Java Library

    Java library with Cryptographic algorithms. Easy to use Crypto algorithms. Works on Windows, Linux, Android. No external lib dependencies, no useless abstractions, no 'crypto provider'. Elliptic curves was borrowed from BouncyCastle and simplified a lot. Most of EC classes are custom algorithms for certain curves. Can be easily deleted if u dont need them. With couple of classes u can parse and construct those ugly ASN.1 structures, look at RSA and EC key formats for example. No bad dependencies between classes, so u can easily cut off unnecessary code and simply include what u need in your project. Feel free and simple without headache. We are using class Binary as best for us to work with byte arrays. Simple classes for console-like colored apps in GUI-mode. Look also http://demo.sls.team
    Downloads: 1 This Week
    Last Update:
    See Project
  • Recruit and Manage your Workforce Icon
    Recruit and Manage your Workforce

    Evolia makes it easier to hire, schedule and track time worked by frontline in medium and large-sized businesses.

    Evolia is a web and mobile platform that connects enterprises with 1000’s of local shift workers and offers free workforce scheduling and time and attendance solutions. Is your business on Evolia?
  • 5
    Udpproxy is very simple but usefull tool for udp traffic forwarding. Can be used if you can't or don't want to mess with kernel level forwarding.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    WARNING: Project moved to http://github.com/plashchynski/viewssld viewssld is a free and open source non-terminating SSLv2/SSLv3/TLS traffic decryption daemon for Snort and other Network Intrusion Detection Systems (IDS).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    ADC

    ADC

    configuration auditing and security policy compliance

    ADC is a tool that helps security administrators to maintain policy compliance of configurations and policies on numerous systems. ADC is similar to OpenAudit or OCS, however ADC is designed to collect arbitrary data (not limited to PC inventory), thus it helps information security experts control configurations and policies on remote servers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    BIS Development Kit protects your web content (texts, images, html etc) from copying and direct downloading. It also protects your Java(tm) applications from reverse engineering and your algorithms and ideas from the plagiarism.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Engage for Amazon Connect, the Pre-built Contact Center Platform Icon
    Engage for Amazon Connect, the Pre-built Contact Center Platform

    Utilizing the power of AWS and Generative AI, Engage provides your customers with highly personalized, exceptional experiences.

    Engage is a pre-built, intelligent contact center platform that transforms customer service.
  • 10
    BruteNet is a system of the distributed brute force and distributed calculations built on user extensions capable to solve a great number of problems related to the partition on a lot of machines.With sample extention you can distribute brute md5-hash
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    CIDRAM

    CIDRAM: Classless Inter-Domain Routing Access Manager.

    CIDRAM (Classless Inter-Domain Routing Access Manager) is a PHP script designed to protect websites by blocking requests originating from IP addresses regarded as being sources of undesirable traffic, including (but not limited to) traffic from non-human access endpoints, cloud services, spambots, scrapers, etc. It does this by calculating the possible CIDRs of the IP addresses supplied from inbound requests and then attempting to match these possible CIDRs against its signature files (these signature files contain lists of CIDRs of IP addresses regarded as being sources of undesirable traffic); If matches are found, the requests are blocked.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Clipperz Password Manager
    Clipperz is a web based password manager. Local encryption within the browser guarantees that no one except you can read your data. A true zero-knowledge (or host-proof) web app!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this program has a graphical user interface, an Enigma like subsystem must be devised for data whitening. For content encryption, the use of Java's facilities is being considered as a long term option. This project's initial sourcecode is related to : http://www.fourmilab.ch/codegroup/ http://winmorse.com/ https://bitbucket.org/bgneal/cpp-enigma http://www.whence.com/minimodem/ For the User Interface http://www.oracle.com/technetwork/java/javafx/tools/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This is cryptographic disk driver for FreeBSD. It provides transparent encryption and decryption of selected devices. It is based on vn(4).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    CyberDemon is highly experimental prototype of the antivirus engine and is based on a new model of artificial neuron (cyberneuron).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Simple OpenID support for Django Framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Portable and simple program for text and files encryption (Symmetric, Asymmetric and Steganography)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Estonian national ID Card management GUI tool.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Experimental Hybrid Intrusion Detection System written in Java
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    A modern secure, robust, multithreaded, exception aware, internationalisable, portable GUI toolkit library designed for mission-critical work in C++ and Python forked from the FOX library. Replicates the Qt API in many places.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Open-source/PHP front-end system for full gateway management based on Iptables/Netfilter, using only built-in features of Netfilter package.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    GTCop Professional Security Appliance aims to provide a powerful tool for satellite communications, with enhanced QoS and bandwidth controls. As derived from IPCop Firewall, it is a stable, secure, easy to configure and maintain GNU/Linux firewall box.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Four-channel daemon of video observation for IP video servers Aviosys IP9100A (B, Plus). This program is intended for indemnification of hardware restrictions four-channel IP video servers Aviosys
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Itilect FTP Proxy

    Itilect FTP Proxy

    Provide users with a managed temporary access to arbitary FTP

    This tool allows you to set proxied access for your users, using predefined FTP accounts. System works like this: Users connects to FTP proxy just like they do with a regular FTP, but using specially formed string as a username (string, that includes their internal profile name and desired target FTP) and their internal password. If they are allowed to access this host, proxy will establish connection with a target FTP and authenticate using real credentials. After that, server will act as a proxy between user and target FTP, forwarding requests back and forth.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    JDS: Data Security

    JDS: Data Security

    JDS is a powerful data protection program

    JDS is a powerful tool for data protection. Documents are encrypted using a special algorithm. The data encryption algorithm is constantly updated to improve security. The program also provides other functions. Such as sending a file to a vault with password access, fast text encryption in 3 types, and much more. The program is easy to use and does not require special knowledge. The standard version has 2 languages (Russian and English) and 9 themes. You can download the language and theme pack separately.
    Downloads: 0 This Week
    Last Update:
    See Project