Showing 10949 open source projects for "security"

View related business solutions
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure Icon
    Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure

    Native application identity and user-based security for your Azure cloud

    Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
    Get a free trial
  • 1
    NGINX Proxy Manager

    NGINX Proxy Manager

    Docker container for managing Nginx proxy hosts

    Expose web services on your network. Free SSL with Let's Encrypt. Designed with security in mind. Perfect for home networks. Expose your private network Web services and get connected anywhere. Based on Tabler, the interface is a pleasure to use. Configuring a server has never been so fun. Configure other users to either view or manage their own hosts. Full access permissions are available. Built as a Docker Image, Nginx Proxy Manager only requires a database.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 2
    AskUI Vision Agent

    AskUI Vision Agent

    Enable AI to control your desktop, mobile and HMI devices

    AskUI’s Vision Agent is an automation framework that allows you—and AI agents—to control real desktops, mobile devices, and HMI systems by perceiving the UI and performing actions like clicking, typing, scrolling, and drag-and-drop. It is designed for multi-platform compatibility and supports multiple AI models so you can tailor perception and decision-making to your workload. The repository presents a feature overview, sample media, and frequent release notes, which show ongoing...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 3
    React Doctor

    React Doctor

    Your agent writes bad React

    ...It gives projects a clear health score from 0 to 100, making technical issues easier to understand, prioritize, and communicate. The scanner checks areas such as state management, effects, performance, architecture, accessibility, security, and dead code. It works across popular React environments, including Next.js, Vite, and React Native. It can also be installed into coding agents so they learn better React practices before generating new code. For teams, it supports GitHub Actions workflows that can comment on pull requests and expose scores for automated quality gates.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    SWUpdate

    SWUpdate

    Software Update for Embedded Systems

    SWUpdate is a Linux Update agent with the goal to provide an efficient and safe way to update an embedded Linux system in the field. SWUpdate supports local and OTA updates and multiple update strategies and it is designed with security in mind. To start with SWUpdate, it is suggested you look at the documentation and build for one evaluation board (or you run SWUpdate on your host for a first overview). If you plan to update your device locally or remotely, SWUpdate is the right framework for you. Thanks to its high flexibility, you can tune any aspect of the update and integrate it into your project. ...
    Downloads: 13 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    Apereo CAS WAR Overlay Template

    Apereo CAS WAR Overlay Template

    Apereo CAS WAR Overlay template

    Welcome to the home of the Apereo Central Authentication Service project, more commonly referred to as CAS. CAS is an enterprise multilingual single sign-on solution and identity provider for the web and attempts to be a comprehensive platform for your authentication and authorization needs. CAS Overlay Template is a ready-to-use template for quickly deploying the Apereo CAS (Central Authentication Service) server, simplifying authentication management for developers.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    katana

    katana

    Fast CLI web crawler for discovering endpoints in modern web apps

    ...It is designed to efficiently crawl websites and web applications in order to discover endpoints, resources, and other useful information that may not be easily visible through manual browsing. Katana focuses on speed and automation, making it suitable for use in security reconnaissance workflows and automated pipelines. Katana supports both standard HTTP crawling and headless browser crawling, allowing it to navigate modern web applications that rely heavily on JavaScript. Through headless browsing, it can analyze dynamic content and single-page applications built with modern frameworks, improving its ability to uncover hidden paths and assets. ...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 7
    Gitleaks

    Gitleaks

    Protect and discover secrets using Gitleaks

    ...With over 6.8 million docker downloads, 11.2k GitHub stars, 1.7 million GitHub Downloads, thousands of weekly clones, and over 400k homebrew installs, gitleaks is the most trusted secret scanner among security professionals, enterprises, and developers. Gitleaks-Action is our official GitHub Action. You can use it to automatically run a gitleaks scan on all your team's pull requests and commits, or run on-demand scans. If you are scanning repos that belong to a GitHub organization account, then you'll have to obtain a license. Gitleaks can be installed using Homebrew, Docker, or Go. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 8
    Semgrep

    Semgrep

    Lightweight static analysis for many languages

    Static analysis at ludicrous speed. Find bugs and enforce code standards. Find and prevent security issues in Terraform, Docker, Kubernetes, nginx, and AWS configs before they go into production. Go beyond application code and protect the entire stack with a breadth of scanning capabilities. Don't leak secrets, scan every commit and ensure secrets don't make it to production. Protect the privileged CI/CD environment from malicious activity that could result in access to source code, secrets, and more. ...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 9
    Amaze File Manager

    Amaze File Manager

    Material design file manager for Android

    Amaze File Manager is an open source Material Design file manager for Android. It makes Material Design's exceptional features easier than ever to access on your Android device. It comes with an easy-to-use navigation drawer for quick navigation plus plenty of awesome features. It allows you to work on multiple tabs at a time; provides quick access to history, bookmarks or any file; has an inbuilt Database Reader, Zip/Rar Reader, Apk Reader, Text Reader and so much more! Amaze File Manager...
    Downloads: 12 This Week
    Last Update:
    See Project
  • Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • 10
    Vector Element

    Vector Element

    A glossy Matrix collaboration client for the web

    ...Element gives you the independence and flexibility to create a communications platform you can trust. Whether self-hosted or fully managed. Operate on a separate decentralised network for resilience and incident response. Functionality to suit your security profile and options to brand as your own.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 11
    VeraCrypt

    VeraCrypt

    Open source disk encryption with strong security for the Paranoid

    VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase. ...
    Leader badge
    Downloads: 34,658 This Week
    Last Update:
    See Project
  • 12
    Google2FA

    Google2FA

    One Time Password Authentication package, compatible with Google Auth

    Google2FA is a PHP package that implements two-factor authentication (2FA) using Time-based One-Time Passwords (TOTP) compatible with Google Authenticator and similar apps. It enhances account security by requiring users to enter a time-sensitive code in addition to their password. The library is lightweight, reliable, and easy to integrate into any PHP or Laravel-based authentication flow.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    A2UI

    A2UI

    A Protocol for Agent-Driven Interfaces

    ...This approach separates UI intent from UI implementation, making it possible for the same agent-generated interface to be rendered across different platforms such as web, mobile, and desktop applications. A key design principle of A2UI is security, as it avoids executing arbitrary code generated by models and instead restricts output to structured data that maps to a predefined catalog of trusted UI components. The system also supports incremental updates, allowing agents to progressively modify the interface as a conversation evolves.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    One-Lin3r

    One-Lin3r

    Gives you one-liners that aids in penetration testing operations

    One-Lin3r is a modular and lightweight penetration testing framework designed to provide security professionals with a centralized collection of one-liner commands for a wide range of offensive security tasks. It focuses on simplifying the execution of complex commands by organizing them into categorized modules, allowing users to quickly access and deploy payloads without manually searching or crafting them. The framework includes hundreds of prebuilt one-liners covering areas such as reverse shells, privilege escalation, bind shells, and payload delivery techniques. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Open Gauss

    Open Gauss

    Project-scoped Lean workflow orchestrator from Math, Inc.

    Open Gauss is an enterprise-grade open-source relational database management system designed to handle large-scale data processing with high performance, reliability, and security. It is based on the PostgreSQL ecosystem but significantly extends its capabilities through architectural optimizations, AI-driven features, and enterprise-level enhancements. The database organizes data using the relational model, storing structured information in tables composed of rows and columns while supporting standard SQL for querying and management. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Microsandbox

    Microsandbox

    Secure local-first microVM sandbox for running untrusted code fast

    Microsandbox is an open source platform designed to securely execute untrusted code in isolated environments using lightweight virtualization techniques. It focuses on combining strong security guarantees with fast startup times by leveraging hardware-level microVM isolation instead of relying solely on traditional containers or full virtual machines. It aims to solve the common tradeoffs between speed, isolation, and control that developers encounter when running untrusted workloads. It provides a local-first and self-hosted approach, allowing users to maintain full ownership of their execution environment without depending on external cloud services. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    AWS Agent Skills

    AWS Agent Skills

    AWS Skills for Agents

    ...The skills cover critical AWS services such as IAM, Lambda, DynamoDB, S3, API Gateway, EKS, and many more, letting agents offer actionable advice on infrastructure as code, debugging, security configurations, and architectural workflows. Skills are kept up to date with weekly documentation checks, ensuring they reflect current AWS patterns and service changes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Kubernetes Network Policy Recipes

    Kubernetes Network Policy Recipes

    Example recipes for Kubernetes Network Policies that you can just copy

    Kubernetes Network Policy Recipes is a practical, example-driven repository offering ready-to-use Kubernetes NetworkPolicy manifests and patterns for real application networking scenarios. Rather than just listing theoretical API specs, it groups recipes that implement common intent-based policies — such as isolating namespaces, restricting cross-pod traffic, enabling ingress from specific services, and locking down egress to only necessary endpoints — so users can pick and apply what they...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Ansible for DevOps

    Ansible for DevOps

    Ansible for DevOps examples

    ...Rather than being theoretical, the examples span real-world infrastructure setups: multi-server orchestration, LAMP stacks, Docker deployments, Kubernetes cluster spins, rolling updates, and security hardening. You can clone the repo and play with actual scenarios using Vagrant, VirtualBox, or cloud hosts, making it ideal for both learning and reference in production readiness. The code is structured by chapter/topic, so you can pick a scenario (for example “nodejs deployment” or “ELK stack”) and dive into a fully featured Ansible solution rather than starting from scratch. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    SSRFmap

    SSRFmap

    Automatic SSRF fuzzer and exploitation tool

    ...Because SSRF often leads to lateral movement or internal network access, SSRFmap is especially useful for red-teamers and pentesters who want to explore chains rather than just the vulnerability surface. The repository also demonstrates a pragmatic mindset; rather than just “find SSRF”, it tries to “exploit SSRF” for impact, helping security testers build full end-to-end workflows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Node.js Best Practices

    Node.js Best Practices

    The Node.js best practices list (July 2024)

    This repository is a living, community-curated guide to writing robust, maintainable Node.js applications at scale. It organizes advice into clear sections—project structure, error handling, security, testing, performance, reliability, and maintainability—so teams can adopt improvements incrementally. Each guideline is phrased as a practical recommendation with motivation and trade-offs, not just a rule, which makes it easier to reach team consensus. The content aims to be technology-agnostic within the Node ecosystem, providing patterns that work whether you’re using Express, Fastify, Nest, or custom frameworks. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    EKS Best Practices

    EKS Best Practices

    A best practices guide for day 2 operations

    The Amazon EKS Best Practices Guide is a public repository containing comprehensive documentation and guidance for operating production-grade Kubernetes clusters on AWS’s managed service, Amazon EKS. Rather than a code library, it serves as a reference catalogue of patterns, anti-patterns, checklists and architectures across domains such as security, reliability, scalability, networking, cost optimization and hybrid cloud deployments. The repository is maintained by AWS but open to contributions from the community, making it a living document that evolves as Kubernetes and AWS features evolve. Each section dives into operational details—for example, how to manage IAM roles for service accounts, secure the EKS endpoint, handle node auto-scaling, and design for multi-AZ resilience. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Wuffs

    Wuffs

    Wrangling Untrusted File Formats Safely

    ...Its standard library emphasizes portability and constant-time behavior where appropriate, which is valuable in security-sensitive contexts. Because the language is purpose-built, the resulting C output is small, auditable, and easy to embed in larger systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Claude Code Subagents Command Collection

    Claude Code Subagents Command Collection

    Claude Code Subagents & Commands Collection + CLI Tool

    ...Each subagent is defined by a concise role, tools, and behaviors, and ships as Markdown you can drop into your .claude/agents/ directory. The collection targets common developer workflows such as scaffolding, refactoring, test writing, documentation, security checks, and project management. It includes a CLI helper and documentation site that streamline installation, customization, and authoring of your own agents. The project’s framing mirrors modern software teams—delegate tasks to experts that can run in parallel under Claude’s subagent support. Frequent updates and community contributions keep the catalog current with new roles and best practices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Purple Llama

    Purple Llama

    Set of tools to assess and improve LLM security

    ...The project evolves as a hub for safety research artifacts like Llama Guard and Code Shield, along with dataset specs and how-to guides for integrating checks into applications. CyberSecEval, one of its flagship components, provides repeatable evaluations for security risk, including agent-oriented tasks such as automated patching benchmarks. The aim is to make safety practical: ship testable baselines, publish metrics, and provide drop-in implementations that reduce friction for teams adopting Llama. Documentation and sites attached to the repo walk through setup, usage, and the rationale behind each safeguard, encouraging community contributions.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB