Showing 10944 open source projects for "security"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 1
    Docker-OSX

    Docker-OSX

    Run macOS VM in a Docker! Run near native OSX-KVM in Docker

    Run Mac OS X in Docker with near-native performance! X11 Forwarding. iMessage security research! iPhone USB working! macOS in a Docker container.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    IronClaw

    IronClaw

    IronClaw is OpenClaw inspired but focused on privacy & security

    IronClaw is a security-first, open-source personal AI assistant built in Rust and designed to keep your data fully under your control. It operates on the principle that your AI should work for you, not external vendors, ensuring all data is stored locally, encrypted, and never shared. The platform emphasizes transparency, offering auditable code with no hidden telemetry or data harvesting.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 3
    Secluso

    Secluso

    Privacy-preserving home security camera using end-to-end encryption

    Secluso is an open-source, privacy-focused home security camera system that uses advanced end-to-end encryption to protect video data from unauthorized access. Unlike many commercial smart cameras that send footage to cloud servers where providers can potentially access it, Secluso encrypts video streams directly on the camera before they are relayed, ensuring that only the user’s mobile app can view recorded or live content.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Flan Scan

    Flan Scan

    A pretty sweet vulnerability scanner

    Flan Scan is a lightweight open-source network vulnerability scanner designed to make it easy to detect exposed services, open ports, and associated vulnerabilities across IP ranges or network segments as part of security audit and compliance workflows. It is essentially a thin wrapper around the widely-used Nmap scanner, augmenting it with scripts and tooling that transform raw Nmap output into vulnerability-focused reports that map detected services to known CVEs, making results more actionable for administrators and auditors. Flan Scan supports automated builds via Docker and can be deployed in containers or Kubernetes clusters, allowing organizations to run scans consistently across distributed environments. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    BadUSB

    BadUSB

    Flipper Zero badusb payload library

    ...It typically contains firmware examples, payloads, and explanations showing how a device presenting as a Human Interface Device (HID) can inject keystrokes, open shells, or orchestrate data exfiltration when plugged into a machine. The codebase is frequently intended for security research and defensive testing: defenders and red teams use it to validate endpoint controls, USB whitelisting, and user training. Due to the dual-use nature of such techniques, responsible repositories emphasize lab-only experiments, consent-based testing, and mitigations like disabling autorun, enforcing device policies, and using endpoint detection.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    SafeLine

    SafeLine

    Serve as a reverse proxy to protect your web services from attacks

    SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits. A web application firewall helps protect web apps by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web apps from attacks such as SQL injection, XSS, code injection, os command injection, CRLF injection, LDAP injection, XPath injection, RCE, XXE, SSRF, path traversal, backdoor, brute force, HTTP-flood, bot abuse, among others. By...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    Rancher

    Rancher

    Complete container management platform

    ...Managing Kubernetes installed in your local or remote development environment is so much easier with Rancher. Now with full support for Windows containers, Istio service mesh, and enhanced security for cloud-native workloads, Rancher helps developers innovate faster and with greater confidence.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8
    tracecat

    tracecat

    The open source Tines / Splunk SOAR alternative for security engineers

    Tracecat is an open-source Tines / Splunk SOAR alternative for security engineers. We're building the features of Tines using enterprise-grade open-source tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Fingerprint Pro Server API PHP SDK

    Fingerprint Pro Server API PHP SDK

    PHP SDK for Fingerprint Pro Server API

    Fingerprint Pro Server API allows you to get information about visitors and about individual events in a server environment. It can be used for data exports, decision-making, and data analysis scenarios. Server API is intended for server-side usage, it's not intended to be used from the client side, whether it's a browser or a mobile device.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 10
    AmazonMSK AWS Identity Access Management

    AmazonMSK AWS Identity Access Management

    Use AWS Identity and (IAM) to connect to Amazon Managed Streaming

    ...It allows JVM-based Apache Kafka clients to use AWS IAM for authentication and authorization against Amazon MSK clusters that have AWS IAM enabled as an authentication mechanism. This library provides a new Simple Authentication and Security Layer (SASL) mechanism called AWS_MSK_IAM. This new SASL mechanism can be used by Kafka clients to authenticate against Amazon MSK clusters using AWS IAM. After you've downloaded the code from GitHub, you can build it using Gradle. An uber jar containing the library and all its relocated dependencies except the kafka client and slf4j-api can also be built. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    Nebular

    Nebular

    Customizable Angular UI Library based on Eva Design System

    Nebular is a customizable Angular UI library that contains 40+ UI components, four visual themes, and Auth and Security modules. Recognized at the prestigious AngularConnect 2018, this Angular framework allows focusing on beautiful designs to adapt them to your brand. Nebular is free of charge and open-source. Nebular is a customizable Angular UI Library based on Eva Design System specifications, with 40+ UI components, 4 visual themes, Auth and Security modules.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    AzureAD Attack Defense

    AzureAD Attack Defense

    This publication is a collection of various common attack scenarios

    ...The repository is organized into focused chapters — for example: Password Spray, Consent Grant, Service Principals in Azure DevOps, Entra Connect Sync Service Account, Replay of Primary Refresh Token (PRT), Entra ID Security Config Analyzer, and Adversary-in-the-Middle — each written to explain the attack, show detection approaches, and recommend mitigation steps. For each scenario the playbook describes the attack flow, maps the techniques to the MITRE ATT&CK framework, and explains how to leverage Microsoft’s security stack (Microsoft Defender XDR, Microsoft Sentinel, Azure Entra ID Connect, and Defender for Cloud) to detect and respond.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Infisical

    Infisical

    Infisical is the open-source platform for secrets management, PKI

    Infisical is an open-source, all-in-one platform for managing secrets, certificates, and privileged access. It delivers modern security workflows like secrets rotation, dynamic credentials, role-based access control, and SSH certificate-based access—tailored for development and infrastructure teams. Manage secrets across projects and environments (e.g. development, production, etc.) through a user-friendly interface. Sync secrets to platforms like GitHub, Vercel, AWS, and use tools like Terraform, Ansible, and more. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    fosite

    fosite

    Extensible security first OAuth 2.0 and OpenID Connect SDK for Go

    The security first OAuth2 & OpenID Connect framework for Go. Built simple, powerful, and extensible. This library implements peer-reviewed IETF RFC6749, counterfeits weaknesses covered in peer-reviewed IETF RFC6819 and countermeasures various database attack scenarios, keeping your application safe when that hacker penetrates or leaks your database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Hubble

    Hubble

    Network, Service & Security Observability for Kubernetes using eBPF

    Hubble is a fully distributed networking and security observability platform for cloud native workloads. It is built on top of Cilium and eBPF to enable deep visibility into the communication and behavior of services as well as the networking infrastructure in a completely transparent manner. The Linux kernel technology eBPF is enabling visibility into systems and applications at a granularity and efficiency that was not possible before.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    aws-encryption-sdk-cli

    aws-encryption-sdk-cli

    CLI wrapper around aws-encryption-sdk-python

    This command line tool can be used to encrypt and decrypt files and directories using the AWS Encryption SDK. If you have not already installed cryptography, you might need to install additional prerequisites as detailed in the cryptography installation guide for your operating system. Installation using a python virtual environment is recommended to avoid conflicts between system packages and user-installed packages. For the most part, the behavior of aws-encryption-cli in handling files is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Supabase

    Supabase

    The open source Firebase alternative

    ...Start your project with a Postgres database, authentication, instant APIs, real-time subscriptions and storage. Every project is a full Postgres database, the world's most trusted relational database. Add user sign-ups and logins, securing your data with Row Level Security. Store, organize and serve large files. Any media, including videos and images. Write custom code and cron jobs without deploying or scaling servers. We introspect your database to provide APIs instantly. Stop building repetitive CRUD endpoints and focus on your product. Type definitions built directly from your database schema. ...
    Downloads: 103 This Week
    Last Update:
    See Project
  • 18
    SiteDorks

    SiteDorks

    Automate search engine dorking across hundreds of websites

    SiteDorks is a command line tool designed to automate advanced search queries across multiple search engines and websites. It allows users to perform search engine “dork” queries against a large set of predefined domains, making it easier to discover publicly available information across different platforms. SiteDorks supports several major search engines including Google, Bing, Brave, Ecosia, DuckDuckGo, Yahoo, and Yandex. Instead of manually running the same query for many sites, SiteDorks...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 19
    Robin

    Robin

    AI-powered tool for dark web OSINT search and investigation

    Robin is an AI-powered open source tool designed to assist investigators and researchers in conducting dark web OSINT (Open Source Intelligence) investigations. It combines automated dark web search capabilities with large language models (LLMs) to analyze and summarize information discovered across hidden services and Tor-based search engines. The tool helps refine investigative queries, collect results from multiple dark web sources, and filter relevant intelligence using AI-driven...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 20
    BlackHole

    BlackHole

    BlackHole is a modern macOS audio loopback driver

    ...The driver integrates directly with macOS Core Audio and appears in Audio MIDI Setup and supported audio applications. Designed with performance and stability in mind, BlackHole works on both Intel and Apple Silicon Macs without requiring kernel extensions or system security modifications. As an open-source project, it offers transparency, customization options, and active community-driven development.
    Downloads: 162 This Week
    Last Update:
    See Project
  • 21
    Harbor

    Harbor

    An open source trusted cloud native registry project that stores

    Harbor is an open-source trusted cloud native registry project that stores, signs, and scans content. Harbor extends the open-source Docker Distribution by adding the functionalities usually required by users such as security, identity and management. Having a registry closer to the build-and-run environment can improve the image transfer efficiency. Harbor supports replication of images between registries, and also offers advanced security features such as user management, access control and activity auditing. Harbor is hosted by the Cloud Native Computing Foundation (CNCF). ...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 22
    Rundeck

    Rundeck

    Enable self-service operations, give specific users access

    Rundeck is an open-source automation service with a web console, command line tools and a WebAPI. It lets you easily run automation tasks across a set of nodes. There are several top-level targets for a full Rundeck build, but there are also ways to only build the lower-level components during development or testing. Rundeck is the leading runbook automation platform. Delegate self-service automation to operate faster and eliminate toil. Rundeck is the open source core of Rundeck products....
    Downloads: 11 This Week
    Last Update:
    See Project
  • 23
    Talos Linux

    Talos Linux

    Talos Linux is a modern Linux distribution built for Kubernetes

    Talos Linux is Linux designed for Kubernetes – secure, immutable, and minimal. Supports cloud platforms, bare metal, and virtualization platforms. All system management is done via an API. No SSH, shell or console. Production-ready supports some of the largest Kubernetes clusters in the world. Open source project from the team at Sidero Labs. It only takes 3 minutes to launch a Talos cluster on your laptop inside Docker. Talos reduces your attack surface. It's minimal, hardened and...
    Downloads: 24 This Week
    Last Update:
    See Project
  • 24
    Commando VM

    Commando VM

    Complete Mandiant Offensive VM (Commando VM)

    Commando VM (by Mandiant) is a Windows-based offensive security / red-team distribution built to turn a fresh Windows installation into a fully featured penetration testing environment. It provides an automated installer (PowerShell script) that uses Chocolatey, Boxstarter, and MyGet package feeds to download, install, and configure dozens (100+ / 170+ depending on version) of offensive, fuzzing, enumeration, and exploitation tools.
    Downloads: 23 This Week
    Last Update:
    See Project
  • 25
    Proton VPN for Android

    Proton VPN for Android

    ProtonVPN Android app

    The Proton VPN app for Android is intuitive to use, offers lots of useful features, and keeps you secure and private when surfing the internet. Once the app is installed, open it and log in with your Proton VPN username and password. If you are a Proton Mail user, you can access the Proton VPN Free plan by logging in with your Proton Mail username and password. Touch the Quick Connect button to automatically connect to the fastest VPN server for your location. You can also choose to connect...
    Downloads: 258 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB