Showing 10949 open source projects for "security"

View related business solutions
  • Streamline Azure Security with Palo Alto Networks VM-Series Icon
    Streamline Azure Security with Palo Alto Networks VM-Series

    Centrally manage physical and virtualized firewalls with Panorama

    Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
    Learn more
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    OpenShell

    OpenShell

    OpenShell is the safe, private runtime for autonomous AI agents.

    ...Developed by NVIDIA, it provides sandboxed execution spaces that protect system resources, credentials, and data from unauthorized access. Each agent runs inside a containerized sandbox governed by declarative YAML security policies that control network access, file permissions, and process behavior. The platform includes a gateway service that manages sandbox lifecycles and routes AI inference requests through controlled providers. OpenShell also features a privacy-aware routing system that prevents sensitive information from leaving the sandbox environment. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 2
    System Prompts Leaks

    System Prompts Leaks

    Collection of extracted System Prompts from popular chatbots

    ...By aggregating these prompts, the repository serves as a valuable resource for understanding how widely different models are being guided in the wild, which helps with comparative analysis across architectures and service providers. It also helps raise awareness around prompt security, showing how exposed system instructions can lead to unintended behaviors or exploitation if not properly protected.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 3
    Thorium for Mac

    Thorium for Mac

    High-performance, privacy-focused browser built as a fork of Chromium

    Thorium-MacOS packages the Thorium browser for Apple’s macOS platforms, providing a native-optimized version of this community-driven Chromium fork that emphasizes speed, performance, and configurable privacy protections. Built from the same source base as other Thorium variants, the MacOS edition includes architectural adjustments and compiler tweaks that take advantage of Apple hardware capabilities (including Apple Silicon and Intel architectures) to deliver smooth, efficient browsing...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    Tauri

    Tauri

    Build smaller, faster, and more secure desktop applications

    ...The framework supports multiple front-end frameworks such as React, Vue, Svelte, and others that compile to web technologies. Tauri provides a secure bridge between the frontend and the Rust backend, enabling native functionality while maintaining strong security practices. With cross-platform support, developers can build applications that run on Windows, macOS, Linux, Android, and iOS.
    Downloads: 15 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    Tox

    Tox

    A New Kind of Instant Messaging

    Tox is a peer to peer (serverless) instant messenger that focuses on security and privacy. In today's world where digital surveillance is rampant, Tox offers users a communication software alternative that's free from prying eyes and ears, and is, quite literally free and without advertising. Tox comes with all the great features you'd expect from an instant messenger application, including voice calls, video calls, file sharing and screen sharing.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 6
    Exegol

    Exegol

    Fully featured and community-driven hacking environment

    Exegol is a community-driven hacking environment, powerful and yet simple enough to be used by anyone in day-to-day engagements. Exegol is the best solution to deploy powerful hacking environments securely, easily, and professionally. No more unstable, not-so-security-focused systems lacking major offensive tools. Kali Linux (and similar alternatives) are great toolboxes for learners, students, and junior pentesters. However professionals have different needs, and their context requires a whole new design.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    Wire Desktop

    Wire Desktop

    Wire for desktop

    ...Start your secure business collaboration now. For businesses and organizations looking for a secure way to communicate and collaborate. For organizations that require the highest level of security and control. Wire's code is open source and available on GitHub for anyone to verify. If you compile the open source software that we make available from time to time to develop your own mobile, desktop or web application, and cause that application to connect to our servers for any purposes, we refer to that resulting application as an “Open Source App”.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8
    Jitsi Meet Electron

    Jitsi Meet Electron

    Jitsi Meet desktop application powered by electron

    Desktop application for Jitsi Meet built with Electron. End-to-End Encryption support (BETA). Works with any Jitsi Meet deployment. Builtin auto-updates. Remote control (currently disabled due to security issues). Always-On-Top window. A warning will show up mentioning the app is unsigned upon first install. This is expected. On macOS Catalina a warning will be displayed on first install. The app won't open unless "open" is pressed. This dialog is only shown once. Note that screen-sharing is currently not supported under Wayland, eg. the permissions prompt may loop endlessly. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9
    Gemini CLI

    Gemini CLI

    Open source AI agent CLI tool to bring Gemini into your terminal

    Gemini CLI is an open‑source AI agent that brings the capabilities of Google’s Gemini 2.5 Pro large‑language model directly into your terminal, enabling tasks ranging from coding and debugging to content creation and research via natural‑language prompts, with support for multimodal outputs like image and video generation. Gemini CLI integrates with external tools and MCP servers, enabling media generation and enhanced workflow automation. It also includes a built-in Google Search tool to...
    Downloads: 23 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 10
    DOMPurify

    DOMPurify

    XSS sanitizer for HTML, MathML and SVG

    ...Our automated tests cover 17 different browsers right now, more to come. We also cover Node.js v14.15.1, v15.4.0, running DOMPurify on jsdom. Older Node.js versions are known to work as well. DOMPurify is written by security people who have vast background in web attacks and XSS.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 11
    Model Context Protocol (MCP) Servers

    Model Context Protocol (MCP) Servers

    Model Context Protocol Servers

    The Model Context Protocol (MCP) is an open protocol that enables seamless integration between LLM applications and external data sources and tools. Whether you’re building an AI-powered IDE, enhancing a chat interface, or creating custom AI workflows, MCP provides a standardized way to connect LLMs with the context they need.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 12
    Codex Autoresearch

    Codex Autoresearch

    A codex plugin for running optimization loops inside a codebase

    ...Developers define a goal and verification command, and the agent continuously runs experiments to reach the desired outcome. The framework supports multiple operational modes, including debugging, planning, security auditing, and release validation. It can run unattended for extended periods, producing logs of experiments and improvements. This approach transforms software development into an iterative, evidence-driven optimization process rather than manual trial and error.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    LoLLMs Hub Fortress

    LoLLMs Hub Fortress

    A proxy server for multiple ollama instances with Key security

    LoLLMs Hub Fortress is a high-performance AI orchestration platform designed to unify multiple large language model backends into a single, secure, and scalable API layer. It acts as a central gateway that connects different inference engines such as Ollama, llama.cpp, vLLM, and OpenAI-compatible services, allowing them to function as interchangeable compute nodes within one system. The architecture is built around a hierarchical “master and slave” hub model, enabling distributed deployments...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    redshirt

    redshirt

    Operating system

    ...The system is designed to run on top of WebAssembly, using it as a portable and sandboxed execution layer for processes and services. Redshirt aims to rethink traditional operating system concepts by leveraging modern programming paradigms such as async/await and capability-based security. It includes components for task scheduling, device interaction, and system services, all implemented in a highly modular fashion. The project is still experimental but serves as a research platform for exploring how WebAssembly can be used as a foundation for operating systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    agentOS

    agentOS

    A portable open-source operating system for agents. ~6 ms coldstarts

    ...AgentOS is designed to run directly within an application process, enabling agents to interact with host functions and resources without network overhead or complex orchestration layers. It includes a permission-based security model that restricts access to system resources such as file systems and networks by default, ensuring safe execution of potentially untrusted code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    anti-distill

    anti-distill

    Anti-distillation for employee Skills

    ...The system is particularly relevant in contexts where models are exposed via APIs and risk being reverse-engineered through repeated querying. Its design reflects growing concerns around model security and competitive advantage in AI systems. It may also include experimental benchmarks to evaluate how resistant a model is to distillation attempts. Overall, anti-distill represents an emerging area of AI defense focused on safeguarding model behavior and preventing unauthorized replication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    x-ui-yg

    x-ui-yg

    The x-ui simplified and modified version of the script

    ...The project also integrates additional features such as certificate management and compatibility with modern transport protocols. While it offers ease of use, it also highlights security considerations, encouraging the use of HTTPS and proper authentication for panel access. Overall, x-ui-yg is a lightweight yet powerful management solution for proxy infrastructure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Google Kubernetes Engine (GKE) Samples

    Google Kubernetes Engine (GKE) Samples

    Sample applications for Google Kubernetes Engine (GKE)

    ...It serves as a practical companion to official GKE tutorials, providing real, runnable code that illustrates how containerized applications are packaged, deployed, and scaled within Kubernetes clusters. The repository is organized into multiple categories such as AI and machine learning, autoscaling, networking, observability, security, and cost optimization, allowing developers to explore specific use cases and architectural patterns. It includes both simple quickstart examples, like basic “hello world” applications, and more advanced scenarios such as migrating monolithic applications to microservices, implementing service meshes, and configuring custom autoscaling metrics.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    nono

    nono

    Secure, kernel-enforced sandbox CLI and SDKs for AI agents

    ...Unlike container-based approaches, the tool is intentionally lightweight and can wrap any command-line process without requiring images, VMs, or complex infrastructure. The system emphasizes capability-based security, where processes are granted only the exact filesystem paths and network access they need, and nothing more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    COCOON

    COCOON

    Confidential Compute Open Network, Decentralized AI Inference on TON

    ...At its core, it combines native desktop performance with web-like flexibility, packing a renderer, UI components, and plugin architecture that allows developers to craft rich experiences similar to those found in native apps. Cocoon’s architecture prioritizes privacy and security, making it suitable for applications where user data protection is critical, and its modular design lets teams include or exclude features as needed without bloating the core system. The framework abstracts platform-specific details, enabling cross-platform development for Windows, macOS, and Linux with consistent behavior and performance. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    rep+

    rep+

    Burp-style HTTP Repeater for Chrome DevTools with built‑in AI

    ...It captures HTTP traffic from the inspected page without needing a proxy, allowing users to replay, modify, and analyze individual requests with fine-grained control over headers, bodies, and methods. The tool offers hierarchical grouping, tagging, and filtering of captured requests so that developers and security testers can manage complex traffic flows efficiently. It includes AI-assisted insights, where contextual explanations and attack vector suggestions help interpret request outcomes or propose modifications. Additional productivity features like exporting/importing requests, various representation modes (pretty/raw/hex), and bulk replay mechanisms make it suitable for debugging, performance checking, or security probing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    TinyAuth

    TinyAuth

    The simplest way to protect your apps with a login screen

    TinyAuth is a lightweight authentication middleware designed to protect your self-hosted web services without forcing you to build a full login system from scratch. It integrates easily with reverse proxies and container orchestrators (like Traefik, Caddy, or Nginx) to gate access behind simple policies and supports multiple auth backends, giving you flexible control over who can reach your apps. TinyAuth operates by forwarding authentication requests to configured identity providers,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Gate22

    Gate22

    Open-source MCP gateway and control plane for teams

    ...It provides a centralized layer where organizations can configure permission boundaries, role-based access, and operational constraints that govern agent behavior and tool invocation across agentic IDEs or custom agent stacks. By integrating with MCP-aware systems, Gate22 helps maintain security and compliance while enabling teams to scale agent-enabled workflows without losing observability into what actions are taken and why. It can be used to enforce fine-grained policies that restrict dangerous or unauthorized operations, track which agents are calling which tools, and record metadata for auditing and debugging.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    DeployStack

    DeployStack

    Centralized credential vault, governance, and token optimization

    ...By abstracting common deployment patterns and capturing them as templates, Deploystack reduces duplication of effort that typically occurs when setting up stacks for different applications or environments. The project emphasizes repeatability and clarity, enabling teams to follow best practices for scalability, security, and operational reliability without hand-crafting deployment scripts for every new service. It supports integration with popular cloud providers and infrastructure tooling, streamlining workflows that span local development through staging and production environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Self Hosting Guide

    Self Hosting Guide

    Learn all about locally hosting (on premises & private web servers)

    The Self Hosting Guide repository is a comprehensive, community-curated handbook for individuals and teams who want to deploy and manage their own self-hosted services — from applications and infrastructure to networking and security. It covers conceptual guidance on why self-hosting can be advantageous (e.g., privacy, control, cost savings) as well as detailed, actionable instructions on setting up popular services such as web servers, media servers, home automation stacks, VPNs, backups, and monitoring tools. Throughout the guide, best practices for hardening, maintenance, and uptime are emphasized, helping users avoid common pitfalls and adopt resilient architectures. ...
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB