Search Results for "linux security" - Page 16

Showing 7821 open source projects for "linux security"

View related business solutions
  • Ship AI Apps Faster with Vertex AI Icon
    Ship AI Apps Faster with Vertex AI

    Go from idea to deployed AI app without managing infrastructure. Vertex AI offers one platform for the entire AI development lifecycle.

    Ship AI apps and features faster with Vertex AI—your end-to-end AI platform. Access Gemini 3 and 200+ foundation models, fine-tune for your needs, and deploy with enterprise-grade MLOps. Build chatbots, agents, or custom models. New customers get $300 in free credit.
    Try Vertex AI Free
  • Deploy Apps in Seconds with Cloud Run Icon
    Deploy Apps in Seconds with Cloud Run

    Host and run your applications without the need to manage infrastructure. Scales up from and down to zero automatically.

    Cloud Run is the fastest way to deploy containerized apps. Push your code in Go, Python, Node.js, Java, or any language and Cloud Run builds and deploys it automatically. Get fast autoscaling, pay only when your code runs, and skip the infrastructure headaches. Two million requests free per month. And new customers get $300 in free credit.
    Try Cloud Run Free
  • 1
    DevSec Hardening

    DevSec Hardening

    This Ansible collection provides battle tested hardening

    Hardening adds a layer into your automation framework, that configures your operating systems and services. It takes care of difficult settings, compliance guidelines, cryptography recommendations, and secure defaults. Running secure infrastructure is a difficult task. Although server hardening is a well-known topic with many guides out in the wild, it is still very cumbersome to apply and verify secure configuration. If you manage many server, they need to be configured properly and...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    Chromium

    Chromium

    The official GitHub mirror of the Chromium source

    Chromium is the open‑source foundational web browser project that drives browsers like Google Chrome, Microsoft Edge, and Opera—built for speed, stability, security, and extendability across platforms. This directory is currently in a prototyping state and may be removed in the future. As we add support for multiple coding IDE/agents, we will likely pull common prompts and instructions into a central directory with stubs for bespoke IDE/agent integration. Please check with your organization...
    Downloads: 92 This Week
    Last Update:
    See Project
  • 3
    Deskreen

    Deskreen

    Deskreen turns any device with a web browser into a secondary screen

    Use any device with a web browser as a second screen for your computer (with the help of Virtual Display Adapter). Share your computer entire screen to any device that has a web browser. Limit Deskreen to share only a single application view to any device with a web browser. If you are a video blogger and you need a teleprompter, or you need to look at the camera during a video conference, Flip Screen Mode is just for you. Deskreen can share screen video over WiFi. No cables are needed....
    Downloads: 90 This Week
    Last Update:
    See Project
  • 4
    CloudQuery

    CloudQuery

    The open-source cloud asset inventory powered by SQL

    CloudQuery extracts, transforms and loads your cloud assets into normalized PostgreSQL tables. CloudQuery enables you to assess, audit, and monitor the configurations of your cloud assets. Use standard SQL to find any asset based on any configuration or relation to other assets. Connect CloudQuery standard PostgreSQL database to your favorite BI/Visualization tool such as Grafana, QuickSight, etc. Codify your security & compliance rules with SQL as the query engine. Integrate CloudQuery with...
    Downloads: 4 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    Laravel Enso

    Laravel Enso

    Laravel Vue SPA, Bulma themed

    Hit the ground running when building your new Laravel SPA project with boilerplate and extra functionality out of the box.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    AmazonMSK AWS Identity Access Management

    AmazonMSK AWS Identity Access Management

    Use AWS Identity and (IAM) to connect to Amazon Managed Streaming

    The Amazon MSK Library for AWS Identity and Access Management enables developers to use AWS Identity and Access Management (IAM) to connect to their Amazon Managed Streaming for Apache Kafka (Amazon MSK) clusters. It allows JVM-based Apache Kafka clients to use AWS IAM for authentication and authorization against Amazon MSK clusters that have AWS IAM enabled as an authentication mechanism. This library provides a new Simple Authentication and Security Layer (SASL) mechanism called...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Nebular

    Nebular

    Customizable Angular UI Library based on Eva Design System

    Nebular is a customizable Angular UI library that contains 40+ UI components, four visual themes, and Auth and Security modules. Recognized at the prestigious AngularConnect 2018, this Angular framework allows focusing on beautiful designs to adapt them to your brand. Nebular is free of charge and open-source. Nebular is a customizable Angular UI Library based on Eva Design System specifications, with 40+ UI components, 4 visual themes, Auth and Security modules. Each feature is a separate...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Monokle

    Monokle

    Better create, understand, and deploy YAML manifests

    Monokle's integrated open-source tools and cloud platform make it easy to define, manage, and enforce Kubernetes YAML configuration policies in minutes. Deploy, manage and audit policies for your teams across the entire configuration lifecycle from a centralized Dashboard. Define polices using 100+ pre-existing rules for Security, Resource Usage, and Compliance. Create your own Validation Extensions 
for your organization's compliance
 and conventions. Assess policy enforcement impact by...
    Downloads: 17 This Week
    Last Update:
    See Project
  • 9
    Modlishka

    Modlishka

    Powerful and flexible HTTP reverse proxy

    Modlishka is a powerful and flexible HTTP reverse proxy. It implements an entirely new and interesting approach of handling browser-based HTTP traffic flow, which allows to transparently proxy of multi-domain destination traffic, both TLS and non-TLS, over a single domain, without the requirement of installing any additional certificate on the client. What exactly does this mean? In short, it simply has a lot of potential, that can be used in many use case scenarios. Modlishka was written as...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 10
    Awesome Stars

    Awesome Stars

    A curated collection of top-tier penetration testing tools

    awesome-hacking-lists is a curated directory of penetration-testing tools and productivity utilities spanning multiple security domains. Curated lists across many offensive security domains. The repository’s focus is breadth with organization: it collects respected tools into themed lists for discoverability and quick triage. Stars and forks indicate an active audience, which helps keep entries fresh and useful for practitioners. Community contributions to keep coverage current. The project...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Halite

    Halite

    High-level cryptography interface powered by libsodium

    Halite is a high-level cryptography interface that relies on libsodium for all of its underlying cryptography operations. Halite was created by Paragon Initiative Enterprises as a result of our continued efforts to improve the ecosystem and make cryptography in PHP safer and easier to implement. You can read the Halite Documentation online. Halite is released under Mozilla Public License 2.0. Commercial licenses are available from Paragon Initiative Enterprises if you wish to extend Halite...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Apache Impala

    Apache Impala

    Apache Impala

    Impala provides low latency and high concurrency for BI/analytic queries on the Hadoop ecosystem, including Iceberg, open data formats, and most cloud storage options. Impala also scales linearly, even in multitenant environments. Impala is integrated with native Hadoop security and Kerberos for authentication, and via the Ranger module, you can ensure that the right users and applications are authorized for the right data. Utilize the same file and data formats and metadata, security, and...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 13
    GTFOBins

    GTFOBins

    GTFOBins is a curated list of Unix binaries

    GTFOBins is a curated catalog of Unix / POSIX system binaries and how they can be misused to bypass restrictions, escalate privileges, exfiltrate data, spawn shells, or otherwise act as “living off the land” tools in a compromised environment. It collects documented techniques for how everyday binaries (e.g. awk, bash, tar, scp) can be abused under constrained conditions. Indexed list of Unix binaries and documented misuse techniques. Examples of command invocations to exploit...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 14
    Alerta

    Alerta

    Alerta monitoring system

    Email was not designed to be used as an alert console. It is not a scalable solution when it comes to monitoring and alert visualization. A minimal installation of Alerta can be deployed quickly and easily as monitoring requirements and confidence grow. There are integrations available with Prometheus, Riemann, Nagios, Zabbix, netdata, Sensu, Pingdom and Cloudwatch. Integrating bespoke systems is easy using the API or command-line tool. Alerts are submitted in JSON format to an HTTP API....
    Downloads: 4 This Week
    Last Update:
    See Project
  • 15
    Laravel Breeze

    Laravel Breeze

    Minimal Laravel authentication scaffolding with Blade, Vue, or React

    Breeze provides a minimal and simple starting point for building a Laravel application with authentication. Styled with Tailwind, Breeze publishes authentication controllers and views to your application that can be easily customized based on your own application's needs. Laravel Breeze is powered by Blade and Tailwind. While you are welcome to use these starter kits, they are not required. You are free to build your own application from the ground up by simply installing a fresh copy of...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 16
    Kubernetes Goat

    Kubernetes Goat

    Kubernetes Goat is a "Vulnerable by Design" cluster environment

    Learn to attack or find security issues, misconfigurations, and real-world hacks within containers, Kubernetes, and cloud-native environments. Enumerate, exploit, and gain access to the workloads right from your browser. Understand how attackers think, work, and exploit security issues, and apply these learnings to detect and defend them. Also, learn best practices, defenses, and tools to mitigate, and detect in the real world. Learn the hacks, defenses, and tools. So that you can think like...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 17
    Central Authentication Service (CAS)

    Central Authentication Service (CAS)

    Identity & Single Sign On for all earthlings and beyond

    Welcome to the home of the Apereo Central Authentication Service project, more commonly referred to as CAS. CAS is an enterprise multilingual single sign-on solution and identity provider for the web and attempts to be a comprehensive platform for your authentication and authorization needs. CAS is an open and well-documented authentication protocol. The primary implementation of the protocol is an open-source Java server component by the same name hosted here, with support for a plethora of...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 18
    Sign-In with Ethereum

    Sign-In with Ethereum

    Sign-In with Ethereum library

    Sign-In with Ethereum is a new form of authentication that enables users to control their digital identity with their Ethereum account and ENS profile instead of relying on a traditional intermediary. Already used throughout web3, this is an effort to standardize the method with best practices and to make it easier for web2 services to adopt it. Sign-In with Ethereum describes how Ethereum accounts authenticate with off-chain services by signing a standard message format parameterized by...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    SELKS

    SELKS

    A Suricata based IDS/IPS/NSM distro

    SELKS is a free and open source Debian-based IDS/IPS/Network Security Monitoring platform released under GPLv3 from Stamus Networks. SELKS can be installed via docker-compose on any Linux or Windows OS. Once installed it is ready to use out of the box solution. SELKS ISOs are also available for air-gapped environments or bare metal or VM installation. SELKS is a showcase of what Suricata IDS/IPS/NSM can do and the network protocol monitoring logs and alerts it produces. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Deckhouse

    Deckhouse

    Kubernetes platform from Flant

    Deckhouse is a Kubernetes platform that allows you to create homogeneous K8s clusters on any infrastructure. It manages clusters comprehensively and “automagically” and provides all necessary modules and add-ons for autoscaling, observability, security, and service mesh implementation. Deckhouse has vanilla Kubernetes under the hood and integrates a balanced set of Open Source tools that have become the industry standard. Out-of-the-box secure configuration of the Kubernetes cluster, least...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    garak

    garak

    Developers and anyone seeking an LLM solution to scan for vulnerabilit

    garak checks if an LLM can be made to fail in a way we don't want. garak probes for hallucination, data leakage, prompt injection, misinformation, toxicity generation, jailbreaks, and many other weaknesses. garak's a free tool, we love developing it and are always interested in adding functionality to support applications. garak is a command-line tool, it's developed in Linux and OSX. Just grab it from PyPI and you should be good to go. The standard pip version of garak is updated...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    Supabase

    Supabase

    The open source Firebase alternative

    Create a backend in less than 2 minutes. Start your project with a Postgres database, authentication, instant APIs, real-time subscriptions and storage. Every project is a full Postgres database, the world's most trusted relational database. Add user sign-ups and logins, securing your data with Row Level Security. Store, organize and serve large files. Any media, including videos and images. Write custom code and cron jobs without deploying or scaling servers. We introspect your database to...
    Downloads: 56 This Week
    Last Update:
    See Project
  • 23
    teler

    teler

    Real-time HTTP Intrusion Detection

    teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that we collect and provide by the community. kitabisa/teler-waf: teler-waf is a Go HTTP middleware that provide teler IDS functionality to protect against web-based attacks and improve the security of Go-based web applications. It is highly configurable and easy to integrate into existing Go applications. teler provides alerting when a threat is detected, push notifications...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 24
    YubiKey Guide

    YubiKey Guide

    Community guide to using YubiKey for GnuPG and SSH

    The YubiKey-Guide by drduh is a community-maintained, in-depth tutorial and reference on how to use a YubiKey (hardware authentication token) with GPG, SSH, and related cryptographic setups. It explains how to generate, manage, and use keys, configure pin / touch policies, and integrate the YubiKey into secure workflows. Configuration instructions for requiring touch for operations. Step-by-step instructions for generating GPG keys and migrating them to a YubiKey. Troubleshooting and advice...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Waterfox

    Waterfox

    Privacy browser built for users who value customization & control

    ...Because it’s open source and actively developed by the community, new features, security updates, and performance improvements arrive regularly to align with web standards.
    Downloads: 65 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB
Gen AI apps are built with MongoDB Atlas
Atlas offers built-in vector search and global availability across 125+ regions. Start building AI apps faster, all in one place.