Showing 99 open source projects for "cybersecurity"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do bestβ€”building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 1
    Ghidra

    Ghidra

    Ghidra is a software reverse engineering (SRE) framework

    Ghidra is a free and open-source reverse engineering framework developed by the NSA for analyzing compiled software. It supports a wide array of instruction sets and executable formats, offering features such as decompilation, disassembly, scripting, and interactive graphing. Designed for security researchers and analysts, Ghidra provides a robust environment for understanding malware, auditing code, and performing software forensics. It includes both GUI-based and headless analysis modes.
    Downloads: 419 This Week
    Last Update:
    See Project
  • 2
    Watcher

    Watcher

    Open Source Cybersecurity Threat Hunting Platform

    Watcher is a file integrity monitoring tool that detects unauthorized changes to files, helping organizations maintain compliance and security.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    Maigret

    Maigret

    Collect a dossier on a person by username from thousands of sites

    Maigret is an open-source OSINT tool designed to collect a dossier on a person by username from thousands of sites. It automates the process of checking for a user's presence across various platforms, aiding in digital investigations.​
    Downloads: 77 This Week
    Last Update:
    See Project
  • 4
    Greenplum Database

    Greenplum Database

    Massive parallel data platform for analytics, machine learning and AI

    Rapidly create and deploy models for complex applications in cybersecurity, predictive maintenance, risk management, fraud detection, and many other areas. With its unique cost-based query optimizer designed for large-scale data workloads, Greenplum scales interactive and batch-mode analytics to large datasets in the petabytes without degrading query performance and throughput. Based on PostgreSQL, Greenplum provides you with more control over the software you deploy, reducing vendor lock-in, and allowing open influence on product direction. ...
    Downloads: 15 This Week
    Last Update:
    See Project
  • Transform months of data modeling and coding into days. Icon
    Transform months of data modeling and coding into days.

    Automatically generate, document, and govern your entire data architecture.

    Efficiently model your business and data models, and generate code for your data pipelines, data lakehouse, and analytical applications
    Learn More
  • 5
    Purple Llama

    Purple Llama

    Set of tools to assess and improve LLM security

    Purple Llama is an umbrella safety initiative that aggregates tools, benchmarks, and mitigations to help developers build responsibly with open generative AI. Its scope spans input and output safeguards, cybersecurity-focused evaluations, and reference shields that can be inserted at inference time. The project evolves as a hub for safety research artifacts like Llama Guard and Code Shield, along with dataset specs and how-to guides for integrating checks into applications. CyberSecEval, one of its flagship components, provides repeatable evaluations for security risk, including agent-oriented tasks such as automated patching benchmarks. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    SafeLine

    SafeLine

    Serve as a reverse proxy to protect your web services from attacks

    SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits. A web application firewall helps protect web apps by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web apps from attacks such as SQL injection, XSS, code injection, os command injection, CRLF injection, LDAP injection, XPath injection, RCE, XXE, SSRF, path traversal, backdoor, brute force, HTTP-flood, bot abuse, among others. By...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    MCP ZoomEye

    MCP ZoomEye

    A Model Context Protocol server that provides network asset info

    The ZoomEye MCP Server is a Model Context Protocol server that provides network asset information based on query conditions, allowing Large Language Models to obtain data by querying ZoomEye using dorks and other search parameters. ​
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Kheish

    Kheish

    Kheish: A multi-role LLM agent for tasks like code auditing

    Kheish is a framework designed for cybersecurity professionals to automate penetration testing tasks, providing tools to streamline security assessments.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Seeker

    Seeker

    Accurately Locate Smartphones using Social Engineering

    ...While primarily intended as an educational resource on security awareness, it highlights the risks of exposing geolocation data online. Its simplicity and effectiveness have made it a popular project in cybersecurity learning circles.
    Downloads: 14 This Week
    Last Update:
    See Project
  • Web Hosting, Reseller Hosting and Cloud Server Hosting | ScalaHosting Icon
    Web Hosting, Reseller Hosting and Cloud Server Hosting | ScalaHosting

    Help your website thrive by hosting it on the cloud which delivers scalability, high speed and security 24/7/365.

    From freelance web developers, to web design agencies, to bustling e-commerce websites, to savvy domain resellers, clients trust our managed cloud-hosting solutions to reach their full potential on the web.
    Learn More
  • 10
    UTMStack

    UTMStack

    Customizable SIEM and XDR powered by Real-Time correlation

    ...Our software platform can swiftly analyze log data to identify and halt threats at their source in real-time, even if the threat was not directly detected on the server itself. This seamless integration of SIEM and XDR capabilities sets UTMStack apart from competitors, providing organizations with an effective, holistic cybersecurity suite that enhances threat detection, response, and remediation across clients’ valuable digital infrastructure.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 11
    Digital Forensics Guide

    Digital Forensics Guide

    Learn all about Digital Forensics and Computer Forensics

    The Digital Forensics Guide repository is a comprehensive, structured reference for investigators, analysts, students, and cybersecurity professionals interested in digital forensics principles, tools, methodologies, and workflows. It organizes foundational topics such as evidence acquisition, disk and memory analysis, file system structures, network forensics, artifact extraction, timeline generation, and reporting into digestible modules that help build core competency.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Vector Element

    Vector Element

    A glossy Matrix collaboration client for the web

    Protect the most sensitive parts of your organization; from senior executive discussion to intellectual property and cybersecurity. An entire communications platform under your control, with end-to-end encrypted voice, video, messaging and collaboration. Easily scales to serve the largest of organizations, supply chains and entire ecosystems. Support thousands of users in a single end-to-end encrypted chat room. Connect millions in real time across multiple organizations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Trivy Operator

    Trivy Operator

    Kubernetes-native security toolkit

    The Trivy Operator leverages Trivy to continuously scan your Kubernetes cluster for security issues. The scans are summarised in security reports as Kubernetes Custom Resource Definitions, which become accessible through the Kubernetes API. The Operator does this by watching Kubernetes for state changes and automatically triggering security scans in response. For example, a vulnerability scan is initiated when a new Pod is created. This way, users can find and view the risks that relate to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    HackerOS

    HackerOS

    HackerOS based on Debian testing.

    HackerOS is based on Debian Testing, but the LTS and Cybersecurity editions are Debian Stable. HackerOS includes several GUI/CLI tools. The distribution is intended for: cybersecurity, daily use, and gaming.
    Leader badge
    Downloads: 195 This Week
    Last Update:
    See Project
  • 16
    HydraPWK GNU/Linux

    HydraPWK GNU/Linux

    HydraPWK GNU/Linux Official SourceForge Pages.

    Leader badge
    Downloads: 115 This Week
    Last Update:
    See Project
  • 17
    vidurOS

    vidurOS

    An ultra-light Linux distro built for cybersecurity, AI/ML work

    πŸš€ Introducing VidurOS β€” A Custom Linux Distro for Cybersecurity, Programming & AI/ML After weeks of deep customization, testing, and design, I’m excited to announce the launch of VidurOS πŸŽ‰ πŸ”₯ What is VidurOS? A lightweight, blazing-fast Linux distribution built from Ubuntu Server 22.04 β€” optimized for: β€’ πŸ›‘οΈ Cybersecurity Tools (Nmap, Wireshark, Metasploit & more) β€’ πŸ’» Programmers & Devs (Python, Node.js, C/C++, Git, Vim) β€’ 🧠 AI/ML Enthusiasts (Jupyter, pip, SciPy preloaded β€” with TensorFlow/PyTorch optional) β€’ πŸ’Ύ Old PCs & VMs (XFCE-based, ISO size ~1.7 GB) 🌟 Built using Cubic, with custom theming, a responsive UI/UX, and designed to revive low-spec hardware...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18

    Oculus

    Oculus - OSINT VM

    A pre-configured Kali Linux virtual machine designed for Open Source Intelligence investigations, including essential tools for reconnaissance, social media research, metadata analysis, and reporting, with privacy and cleanup adjustments applied
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19

    AsyncPortScanner

    Cross-platform asynchronous port scanner written in Nim.

    Fast cross-platform asynchronous port scanner written in Nim.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    PVPLE
    ...NOTE:- "Only run in VMWare Pls Don’t run in VirtualBox" Will also run on the ProxMox server to understand how to do it pls refer to the doc in the zip named "Cybersecurity Lab Deployment on Proxmox" The default login and password is administrator: password. List Of All Labs in one VM:- 1. Web-DVWA 2. Mutillidae 3. Webgoat 4. Bwapp 5. Juice-shop 6. Security-ninjas 7. WordPress We are adding more labs in few days
    Downloads: 14 This Week
    Last Update:
    See Project
  • 21
    Discord Message Spammer

    Discord Message Spammer

    Discord chat spammer

    easy to use, set the tokens & channels and have fun, don't use it in a bad way if you catch my drift, if you want to use it you better use a vpn so discord won't ban you're ip smh. DMS version 0.3 ill keep updating this tool for sure license By downloading this, you agree to the Commons Clause license and that you're not allowed to sell this repository or any code from this repository. For more info see https://commonsclause.com/. my discord server: https://discord.gg/MJu44Kdh
    Leader badge
    Downloads: 41 This Week
    Last Update:
    See Project
  • 22
    Siber Milis Linux

    Siber Milis Linux

    This cybersecurity distribution is a customized security distribution

    You can reach me on telegram https://t.me/Jacobeth1
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    SmartTown Email&DNS Server

    Email and DNS server suitable to practice Cybersecurity phishing lab

    ...Web apps: Open a browser in another VM (e.g., Kali or Windows) and navigate to http://smarttown.com SSH/SFTP: Connect using the VM’s IP and port 22 (enable in VM settings if disabled). Suitable to work with another ova (https://sourceforge.net/projects/hullu/), to setup a Cybersecurity lab with more features for deep practicing. Please let me know if you have any questions or suggestions. Kaled Aljebur.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    tirreno

    tirreno

    Open Security Analytics

    tirreno is open security analytics. tirreno [tir.ˈrΙ›.no] helps understand, monitor, and protect your applications from cyber threats, account takeovers, bots, and abuse. While classic cybersecurity focuses on infrastructure and network perimeter, most breaches occur through compromised accounts and application logic abuse that bypasses firewalls, SIEM, WAFs, and other defenses. tirreno detects threats where they actually happen: inside your product. It adds a security layer to internal or external applications to identify malicious activity by analyzing user behavior, account activity, field changes history, and business logic abuse that infrastructure tools are unable to detect.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 25

    hdom_access

    receive an email when a file is accessed or modified on linux-unix

    receive an email or done a command when a file is accessed or modified or renamed or erased on linux, watch your files access, secure your workstation against viruses and ransomware
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next