Showing 10954 open source projects for "security"

View related business solutions
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Automated_Quiz

    Automated_Quiz

    A Shell Script for Quizzing the whole class of students and log result

    Please download the above zip file and extract it to a secret folder and run the quiz.sh script from that folder in your terminal program, as shown in the youtube videos : https://youtu.be/kQi0XlIaT9M and https://youtu.be/prwKN5DiFp0 You may change the contents of the quiz.txt file to your liking, while maintaining the format of it. Note: Press Enter/Return key after typing on your Terminal, to proceed to the next step, while testing the quiz.sh script. Also, increase the terminal...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    EG ClamNet Antivirus

    EG ClamNet Antivirus

    A simple antivirus that provide a graphical interface for ClamAV

    ...With this feature you can optimize your system, increase memory space and system speed by cleaning junk files. Cleaning such junk files improves your system's security and speed-up your system.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    Fast Wipe

    Fast Wipe

    Fast Wipe

    - Fast Wipe: wipe files and/or free hd space FAST! - Fast wipe has also secure deletion! wipe&fswipe now supports up to 12 different wipe standards. - It works from command line: windows and linux os available. - Works on any mounted partition. - Added windows installer - Completely Rewritten and Improved - Fixed windows execution usn
    Downloads: 8 This Week
    Last Update:
    See Project
  • 4
    Conversations

    Conversations

    The very last word in instant messaging

    ...All communications are TLS encrypted and Conversations offers to enable one of two state of the art end-to-end encryption mechanisms, so you can be assured of the highest level of security in messaging. Conversations also offers plenty of unique features, such as image sharing, read markers, dynamic history loading and more.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    Vampire OS

    Vampire OS

    Vampire OS is the alternative to Windows and macOS

    ...Vampire OS is Open Source, so anyone can audit its source code to verify its privacy. Users can use hard disk or RAM so users can experience lightspeed with stunning animation. Vampire OS is comes with more than 5 advance security tools and user can also change their security level with vampire tools form low secure mode to high secure mode. Vampire Connect is integrated into the Vampire OS desktop to merge the experience between your computer and Android device.It works over an encrypted connection on your local network, so your data stays private and never reaches the cloud.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Pentest-Tools

    Pentest-Tools

    A collection of custom security tools for quick needs.

    Pentest-Tools is a collection of penetration testing scripts and utilities designed to help security professionals and ethical hackers perform vulnerability assessments. It includes a wide range of tools for tasks like web scraping, reconnaissance, data extraction, and network analysis. The suite is modular, allowing users to choose the tools that best fit their specific pentesting needs, from web application analysis to network penetration testing.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Assent

    Assent

    Android Runtime Permissions made easy and compact

    Assent is designed to make Android's runtime permissions easier and take less code in your app to use. Runtime permissions on Android are completely reliant on the UI the user is in. Permission requests go in and out of Activities and Fragments. This library provides its functionality as Kotlin extensions to Fragment Activities (e.g. AppCompatActivity) and AndroidX Fragments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Python script to get the last 5 minutes of accepted traffic logs via the trendmicro email security API and send them to a syslog server Script Python para obtener los ultimos 5 minutos de logs de trafico aceptado por medio de la API de trendmicro email security y enviarlos a un servidor de syslog Crontab */5 * * * * /usr/local/bin/python3.9 /home/user/tmes-syslog_0.02.py 2>&1 > /home/user/errores.txt ------------ # API documentation # Getting Started with Trend Micro Email Security APIs # https://docs.trendmicro.com/en-us/enterprise/trend-micro-email-security-rest-api-online-help/getting-started-with.aspx # Obtaining the API Key # https://docs.trendmicro.com/en-us/enterprise/trend-micro-email-security-rest-api-online-help/getting-started-with/obtaining-the-api-ke.aspx # List Mail Tracking Logs # https://docs.trendmicro.com/en-us/enterprise/trend-micro-email-security-rest-api-online-help/supported-apis/logs/list-mail-tracking-l.aspx
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    StarHackIt

    StarHackIt

    StarHackIt: React/Native/Node fullstack starter kit

    StarHackIt: React/Native/Node full-stack starter kit with authentication and authorization, data backed by SQL, the infrastructure deployed with GruCloud.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • 10

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes:...
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11
    FullDiskHash

    FullDiskHash

    Get and save hashes of files in a drive or folder.

    Get and save hashes (MD5 and SHA256) of files in a drive or folder. In later stages of the project, it will be possible to compare the hashes with previous scans to check which files have been changed. Additional information such as the author of the software or its certification in the case of executables or libraries is also read.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    Digital Signature For Gravity Forms

    A digital signature, where the prerequisites are satisfied

    Gravity Forms is a powerful WordPress plugin that allows users to create and manage complex forms with ease. Integrating digital signatures with Gravity Forms can enhance its capabilities and security. Benefits and Use Cases Contractual Agreements: Businesses can use Gravity Forms with digital signatures to streamline the process of obtaining signatures on contracts and agreements from remote parties. Online Orders and Transactions: Adding digital signatures to order forms can provide an additional layer of security for customers making purchases online. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    OpenSC

    OpenSC

    OpenSC - tools and libraries for smart cards

    The OpenSC project allows the use of PKCS #15 compatible SmartCards and other cryptographic tokens (e.g. the Aladdin eToken) in UNIX compatible operating systems. OpenSC can use PC/SC Lite or CT-API as its reader backend. https://github.com/OpenSC/OpenSC/wiki/OpenSC-Services
    Leader badge
    Downloads: 94 This Week
    Last Update:
    See Project
  • 14
    Shopizer

    Shopizer

    Shopizer java e-commerce software

    Create online stores, marketplaces, product listings, B2B applications, transactional portals and much more using Shopizer's secure, fast and reliable open-source e-commerce software. Shopizer is built by a dedicated, agile community of Java and e-commerce experts who are motivated by the desire to create great software that is easily adaptable to the demanding practices and changing trends of e-commerce. Shopizer's team is developing for developers first; we are working in a continuous...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    TeamPass

    Collaborative Passwords Manager

    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    solgraph

    solgraph

    Visualize Solidity control flow for smart contract security analysis

    Visualize Solidity control flow for smart contract security analysis. Generates a DOT graph that visualizes the function control flow of a Solidity contract and highlights potential security vulnerabilities. A nice example of piping contract source that is in your clipboard through solgraph, dot, and preview: (Use whatever image previewer is available on your system; Preview.app is available on Mac) You have to have graphviz installed (brew install graphviz) to render the DOT file as an image. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    PuntoGPS

    PuntoGPS

    Minimalistic wide-open GPS-locator/tracker

    ...As a php+mysql service can be installed on any web server (i.e. your bike-team site!). It's free, open source, portable and cross-platform. *** NB *** - Check the "allow unknown sources" option on your device security settings to setup on Android. Current version: 0.9 (beta) Release notes: -> https://sourceforge.net/p/puntogps/blog/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Virus-Scan-And-More-VSAM-

    A short batch script that allows a user to scan their pc!

    This is a batch script that allows the user to scan their pc for may different things and much much more! I don't remember a lot about this but it should be able for the user to scan for viruses! (this uses windows defender to work)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    JJException

    JJException

    Protect the objective-c application

    Common problems will not crash by the JJException, Hook the Unrecognized Selector, Out of bound, the parameter is nil, etc. Throw the exception to the interface, and then save the exception record to the log, and upgrade the app or Hot-Fix to resolve the exception.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Offensive Reverse Shell

    Offensive Reverse Shell

    Collection of reverse shells for red team operations

    The Offensive Reverse Shell Cheat Sheet is a compilation of reverse shell payloads useful for red team operations and penetration testing. It provides ready-to-use code snippets in various programming languages, facilitating the establishment of reverse shells during security assessments.​
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    Gerador de passwords

    Gerador de passwords

    Gerador de Passwords

    Este Gerador de passwords dá a possibilidade de escolher entre passwords com letras , números ou ambas , assim como o tamanho que quer para a password em caracteres. Versão 2 adicionada onde foi incluída a opção que inclui carateres especiais.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    WebDeets

    WebDeets

    WebDeets Powerful And Versatile Network Utility App

    WebDeets Is A Network Utility App That Is Used For Network Diagnostics And Troubleshooting. Provide Features That Can Help, Network Administrators And IT Professionals To Monitor And Troubleshoot Network Performance, Identify Potential Vulnerabilities And Take Proactive Steps To Address Any Issues. It Can Convert IP Addresses To Hostnames And Vice Versa And Comes With Preloaded Commands Of Netstat And Ping. It Allows You To Save Results In Different Formats And Has A Real-Time...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    SHA256-in-C

    SHA-256 Algorithm Implementation in C

    Downloads: 2 This Week
    Last Update:
    See Project
  • 25

    Sihas

    Helps you to ensure your cyber security through cyber hygiene

    Deffend.net Sihas aims to help small companies and individuals to avoid cyber security threats through cyber hygiene. It runs on Windows desktop and looks for misconfigurations that may result in cyber security risks. Ensuring cyber hygiene is the first step of preventing cyber security threats. Sihas will help to individuals who lack cyber security knowledge and to companies who can not afford getting cyber security consultancy.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB