Showing 10954 open source projects for "security"

View related business solutions
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 1
    C++ class to handle reparse points (symlinks, junctions, volume mount points - Win32) plus a little tool based on that class. Superseded by LookFS.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    LibertyOS

    LibertyOS

    The kernel for LibertyOS

    ...LibertyOS is built with an emphasis on user freedom, aiming to avoid corporate tracking, offer user-centric control, and provide a robust alternative to mainstream operating systems. The kernel reflects these values through clean code, modular design, and a focus on fundamental security practices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    OPENTHOS

    OPENTHOS

    Run Android and Linux applications side by side

    OpenThos is a free, open-source operating system (OS) based on Android-x86. It's designed to run Android and Linux applications side by side. OpenThos is unique because it was designed with security and privacy in mind. You can run OpenThos on your PC or laptop without installing it.
    Downloads: 59 This Week
    Last Update:
    See Project
  • 4
    ...Orchid Studio is designed as a single user setup where the “admin” user does not require passwords for updates, installing software, and performing most administrative tasks. Other users will require passwords to be used for these functions. Passwords: root and admin initial passwords are “admin”, if you are security conscious you should change them.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 5
    VoltageOS for Realme GT Neo 2

    VoltageOS for Realme GT Neo 2

    Vanilla custom ROM with privacy enhancing features

    ...You have reached the gateway of a simplistic, no frills pure AOSP experience that will not let you down in getting through every day uninterrupted by inconveniences, with just the right dab of customization. Be it requiring safetynet for banking or payment apps to receiving the latest security patches from Google as soon as they're released, we've got you covered. It doesn't end there. Sit back, relax and let the system theme your device according to your preferences with Monet support. Step in and begin your journey with Voltage OS.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    try

    try

    Inspect a command's effects before modifying your live system

    ...This makes it useful for experimenting with package installation, system changes, and other shell commands where users want a chance to review the outcome first. The project is careful not to position itself as a full security sandbox, since trusted commands can still make network calls and the tool is presented as a prototype rather than a complete isolation boundary. It supports multiple Linux distributions and can fall back to mergerfs or unionfs in environments where overlayfs on nested mounts does not work as expected. In practice,
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    ElAdmin

    ElAdmin

    Backend management system based on Spring Boot

    Eladmin is a modular, full-featured backend management system based on Spring Boot, Spring Security, JWT, and Vue.js. It provides a front-end and back-end separation architecture suitable for enterprise-level projects and includes functionality like user and role management, logging, code generation, and monitoring. Eladmin is designed for quick deployment of admin systems and offers a robust base for building custom applications with authentication, authorization, and responsive UI components.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    touch-os

    touch-os

    A friendly OS for touchscreens

    ...Both the LTS and LIQUORIX versions allow you to switch between Wayland and Xorg window managers. While Xorg is the preferred choice for touch interfaces in tablet mode, Wayland delivers improved performances and enhanced security. touch OS is built upon Debian 12.1 with Gnome 43.6 and relies on its repositories for ongoing updates and support. You can also access its software store, with thousands of free apps ready for "one click" installation. touch OS was created thanks to the exceptional remastering tool by Penguins' Eggs and features the user-friendly Calamares installer.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9
    DeepBlueCLI

    DeepBlueCLI

    PowerShell Module for Threat Hunting via Windows Event Logs

    DeepBlueCLI is a PowerShell-centric threat-hunting toolkit built to extract, normalize, and flag suspicious activity from Windows event logs and Sysmon telemetry. It parses common sources—including Windows Security, System, Application, PowerShell logs, and Sysmon event ID 1—then applies a rich set of detection heuristics for things like suspicious account changes, password guessing and spraying, service tampering, PowerShell obfuscation and download-string usage, long or unusual command lines, and credential dumping attempts. Output is emitted as native PowerShell objects so analysts can pipe results to CSV, JSON, HTML, GridView, or custom pipelines for further triage and reporting. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 10
    Dumpper

    Dumpper

    WiFi and wireless network management tool for Windows

    Dumpper is a free and portable software focused on managing wireless networks on Windows. In addition, it incorporates several methods to show and check some security flaws discovered both in the Wps protocol, and in obtaining the default WPA/WPA2 key based on the Bssid and Essid.
    Leader badge
    Downloads: 1,171 This Week
    Last Update:
    See Project
  • 11
    CrossLinked

    CrossLinked

    LinkedIn employee enumeration tool using search engine scraping

    ...Instead of accessing LinkedIn directly or relying on its API, it performs search engine scraping using services such as Google and Bing to discover public LinkedIn profile results. By analyzing these search results, CrossLinked extracts employee names and processes them into usable formats for security assessments or reconnaissance activities. This approach allows the tool to operate without credentials, authentication tokens, or LinkedIn account access. CrossLinked is commonly used by penetration testers and security professionals during the reconnaissance phase to identify potential usernames or email address formats for a target organization. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    KubiScan

    KubiScan

    A tool to scan Kubernetes cluster for risky permissions

    A tool for scanning Kubernetes cluster for risky permissions in Kubernetes's Role-based access control (RBAC) authorization model. KubiScan helps cluster administrators identify permissions that attackers could potentially exploit to compromise the clusters. This can be especially helpful on large environments where there are lots of permissions that can be challenging to track. KubiScan gathers information about risky roles\clusterroles, rolebindings\clusterrolebindings, users and pods,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    imgp

    imgp

    Multi-core image resizer and rotator. Go crunch 'em!

    imgp is a command line image resizer and rotator for JPEG and PNG images. If you have tons of images you want to resize adaptively to a screen resolution or rotate by an angle using a single command, imgp is the utility for you. It can save a lot on storage too. Powered by multiprocessing, an intelligent adaptive algorithm, recursive operations, shell completion scripts, EXIF preservation (and more), imgp is a very flexible utility with well-documented easy to use options. imgp intends...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14

    Orca AntiVirus

    Orca antivirus for Windows PC, virus and malware cleaner

    Free antivirus for Windows PC, speeds up Windows PC and laptop. Orca antivirus is made to work on all versions of windows above Windows Vista and is capable of detecting viruses and malware. Orca antivirus does not offer any premium and is 100% free
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Advanced Power Manager for Synology NAS
    A powerful power management application subsuming Synology Diskstation's integrated one and enabling the administrator to perform automatic on-demand power up and shut down of the Diskstation, based on simple rules. It also enables to derogate to a program, typically by allowing hibernation to occur (typically used when leaving home for the vacations), suspend the current schedule until told you (typically used when performing administration tasks), but also shut down the Diskstation...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 16
    XpressEngine

    XpressEngine

    PHP Open Source CMS

    ...The platform includes a modular bundle system that allows users to easily extend functionality and customize their sites. With Laravel at its core, XpressEngine benefits from a robust ecosystem, security features, and well-tested components. It is particularly suited for developers and organizations seeking a customizable CMS with strong backend capabilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    BloodHound Legacy

    BloodHound Legacy

    Six Degrees of Domain Admin

    BloodHound Legacy is the deprecated open‑source version of the BloodHound Active Directory attack path analysis tool. It uses graph theory to model and visualize privileged relationships in AD, Entra ID, and Azure environments. Security professionals use it to enumerate domain privilege escalation paths, misconfigurations, and attack surfaces in corporate networks
    Downloads: 19 This Week
    Last Update:
    See Project
  • 18
    Penetration Testing Tools

    Penetration Testing Tools

    A collection of more than 170+ tools, scripts, cheatsheets

    Penetration-Testing-Tools is a curated collection of tools, scripts, cheatsheets and reference materials assembled to help security researchers, red-teamers, and students perform hands-on penetration testing across multiple domains. The repository groups resources by discipline — reconnaissance, web application testing, network exploitation, privilege escalation, post-exploitation and reporting — so users can quickly find relevant utilities and walkthroughs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Exadel CompreFace

    Exadel CompreFace

    Leading free and open-source face recognition system

    Exadel CompreFace is a free and open-source face recognition GitHub project. Essentially, it is a docker-based application that can be used as a standalone server or deployed in the cloud. You don’t need prior machine learning skills to set up and use CompreFace. The system provides REST API for face recognition, face verification, face detection, face mask detection, landmark detection, age, and gender recognition. The solution also features a role management system that allows you to...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 20
    C-Total

    C-Total

    Control Total sobre las conecciones de RED

    Administra reglas del Firewall de Windows de forma transparente sin ocultar información, muestra reglas creadas por el sistema y cualquier programa que utilice internet. NOTA: Para crear reglas y/o eliminarlas debe ejecutar C-Total como administrador.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Nutshell OS (MX Linux Respin)

    Nutshell OS (MX Linux Respin)

    A security and privacy-centric operating system.

    Nutshell OS builds the bridge between privacy and security, by utilising a tool designed with users in mind: the Nutshell Installer. It allows you to access your favourite apps - from web browsers, to office tools, to entire desktops - in such a way that no personal data is stored. This means that nobody (even those evil tech giants!) can get ahold of your private information for long.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    go_brut_x

    Brut force X

    This program find roots in equation front brute all X'es in diapason of numbers. For run installed "gcc" compiler was needed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    htmLawed

    PHP code to purify & filter HTML

    The htmLawed PHP script makes HTML more secure and standards- & policy-compliant. The customizable HTML filter/purifier can balance tags, ensure proper nestings, neutralize XSS, restrict HTML, beautify code like Tidy, implement anti-spam measures, etc.
    Leader badge
    Downloads: 164 This Week
    Last Update:
    See Project
  • 24
    Good Man in the Middle

    Good Man in the Middle

    Rule-based MITM engine. Rewriting, redirecting and rejecting on HTTP

    Rule-based MITM engine. Rewriting, redirecting and rejecting on HTTP(S) requests and responses, supports JavaScript.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    weighbridge software

    Best Weighbridge Software For All Types Of Weighbridges And Indicators

    1.Weighbridge Software Working On Local Area Network(LAN) Weighbridge Software Shall Installed On The Server PC And Shared On LAN Network For Client Access. Network Based Multi Weighbridge Software Works On LAN On LAN Weighbridge Software Can Work On 2 Possible Ways 1.Truck Takes First Weight On Weighbridge 1 and Second Weight On Any Vacant Weighbridge Like Weighbridge 2 or 3 etc Or Many Be 1 itself In This Case Ticket Serial Number Is Common And Accessible To All Weighbridges For...
    Downloads: 5 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB