Showing 1786 open source projects for "network security"

View related business solutions
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
  • The Secure Workspace for Remote Work Icon
    The Secure Workspace for Remote Work

    Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.

    Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
  • 1
    Docker Bench For Security

    Docker Bench For Security

    A script that checks for dozens of common best-practices around Docker

    ... with a lot of privilege, sharing the host's filesystem, pid and network namespaces, due to portions of the benchmark applying to the running host. The easiest way to run your hosts against the Docker Bench for Security is by running our pre-built container. Don't forget to adjust the shared volumes according to your operating system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Network Security Toolkit (NST)

    Network Security Toolkit (NST)

    A network security analysis and monitoring toolkit Linux distribution.

    Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 38 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available...
    Leader badge
    Downloads: 291 This Week
    Last Update:
    See Project
  • 3
    Tor Browser

    Tor Browser

    Browser for using Tor on Windows, Mac OS X or Linux

    Tor Browser enables you to use Tor on Windows, Mac OS X, or Linux without needing to install any software. Tor is a software that bounces your communications around a distributed network of relays run by volunteers. This effectively prevents anyone watching your Internet connection from learning what sites you visit; it prevents the sites you visit from learning your physical location; and allows you access to sites which are blocked. Tor Browser can run off a USB flash drive, comes...
    Downloads: 1,173 This Week
    Last Update:
    See Project
  • 4
    Optimizer

    Optimizer

    The finest Windows Optimizer

    Advanced configuration utility that helps you restore your privacy and increase your security. Optimizer is recommended after a fresh, clean installation of Windows to achieve maximum privacy and security. Depending on your version of Windows, Optimizer will also allow you to perform some specific tweaks.
    Downloads: 635 This Week
    Last Update:
    See Project
  • Business Continuity Solutions | ConnectWise BCDR Icon
    Business Continuity Solutions | ConnectWise BCDR

    Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

    Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
  • 5
    ProtonVPN for Android

    ProtonVPN for Android

    ProtonVPN Android app

    ... to any specific server that is available on your plan. You can now securely and privately browse the internet. The datat traveling between your device and the VPN server is encrypted. Secure Core protects your connection by routing your traffic through multiple servers before it leaves our network, defending you against advanced, network-based attacks.
    Downloads: 612 This Week
    Last Update:
    See Project
  • 6
    uBlock Origin

    uBlock Origin

    An efficient blocker for Chromium and Firefox

    ... blocker; it's a general-purpose blocker. uBlock Origin blocks ads through its support of the Adblock Plus filter syntax. uBlock Origin extends the syntax and is designed to work with custom rules and filters. Furthermore, the advanced mode allows uBlock Origin to work in default-deny mode, which mode will cause all 3rd-party network requests to be blocked by default unless allowed by the user.
    Downloads: 266 This Week
    Last Update:
    See Project
  • 7
    Huorong Security

    Huorong Security

    antivirus software

    Operation mode: EDR operation system, network-wide threat awareness With the Huorong terminal as the cornerstone, while protecting users, it detects various threats, aggregates and analyzes threat information to form a solution, and responds on the terminal Professional Release: Tracing and Analyzing Viruses, Exposing Hooligans and Black Products Trace the source and analyze various viruses, follow the clues to expose rogues, illegal activities and black industry chains, and protect users...
    Leader badge
    Downloads: 12 This Week
    Last Update:
    See Project
  • 8
    ZAP

    ZAP

    The OWASP ZAP core project

    The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by a dedicated international team of volunteers. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. It's also a great tool for experienced pentesters to use for manual security testing. ZAP is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications...
    Downloads: 76 This Week
    Last Update:
    See Project
  • 9
    Onion Browser

    Onion Browser

    An open-source, privacy-enhancing web browser for iOS

    Encrypted traffic through the Tor network gives you the highest standard of security and privacy. No extra eyes see your activity, save your history or influence your browsing. Targeted ads are history. Tabs don’t hang around. They close when you’re done, so every search is new. Onion Browser is your trusted connection to Tor on iOS. Tor offers the highest standard of privacy. You are not linked to your browsing activity. Your location doesn't influence the websites you’re able to visit. Onion...
    Downloads: 78 This Week
    Last Update:
    See Project
  • EBizCharge Payment Platform for Accounts Receivable Icon
    EBizCharge Payment Platform for Accounts Receivable

    Getting paid has never been easier.

    Don’t let unpaid invoices limit your business’s growth. EBizCharge plugs directly into the tools your business already uses to speed up payment collection.
  • 10
    bettercap

    bettercap

    The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks

    bettercap is a powerful, easily extensible and portable framework written in Go which aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking WiFi networks, Bluetooth Low Energy devices, wireless HID devices and Ethernet networks.
    Downloads: 58 This Week
    Last Update:
    See Project
  • 11
    hydra

    hydra

    Cloud native, security-first, API security for your infrastructure

    Secure access to your applications and APIs, and authenticate third party users. Ory ships regular product patches and updates. Subscribe to our newsletter to get the good stuff, and stay up to date. Ory / Hydra is Open Source and OpenID Connect Certified® technology that integrates with any login system. Get started in minutes, and provide secure access to your application and API endpoints. Ory / Hydra works with any login system and only a few lines of code are required. Ory / Hydra is...
    Downloads: 66 This Week
    Last Update:
    See Project
  • 12
    OpenProject

    OpenProject

    OpenProject is the leading open source project management software

    Open source project management software. Efficient classic, agile or hybrid project management in a secure environment. Take control of your data and stay secure. Take back your data ownership, we give you the power to protect your privacy in a secure environment and with highest standards in data security and privacy. OpenProject can be installed on-premises in your own infrastructure, having full control and 100% data ownership. You know where your data is stored and what happens...
    Downloads: 66 This Week
    Last Update:
    See Project
  • 13
    theHarvester

    theHarvester

    E-mails, subdomains and names

    theHarvester is a very simple to use, yet powerful and effective tool designed to be used in the early stages of a penetration test or red team engagement. Use it for open source intelligence (OSINT) gathering to help determine a company's external threat landscape on the internet. The tool gathers emails, names, subdomains, IPs and URLs using multiple public data sources.
    Downloads: 41 This Week
    Last Update:
    See Project
  • 14
    SoftEther VPN

    SoftEther VPN

    Cross-platform multi-protocol VPN software

    An open-source free cross-platform multi-protocol VPN program, as an academic project from University of Tsukuba, under the Apache License 2.0. The API Suite allows you to easily develop your original SoftEther VPN Server management application to control the VPN Server (e.g. creating users, adding Virtual Hubs, disconnecting a specified VPN sessions) from JavaScript, TypeScript, C# or other languages. SoftEther VPN ("SoftEther" means "Software Ethernet") is one of the world's most powerful...
    Downloads: 59 This Week
    Last Update:
    See Project
  • 15
    ntopng

    ntopng

    Web-based Traffic and Security Network Traffic Monitoring

    ntopng® is a web-based network traffic monitoring application released under GPLv3. It is the new incarnation of the original ntop written in 1998, and is now revamped in terms of performance, usability, and features. ntopng is a network traffic probe that provides 360° Network visibility, with its ability to gather traffic information from traffic mirrors, NetFlow exporters, SNMP devices, Firewall logs, and Intrusion Detection systems. ntopng has been written in a portable way in order...
    Downloads: 24 This Week
    Last Update:
    See Project
  • 16
    ZeroTier

    ZeroTier

    A smart Ethernet switch for Earth

    ... scalable security with 256-bit end-to-end encryption. Simplify your network stack by unifying VPNs, VLANs, and SD-WANs with one solution. Easily build common backplane networks spanning multiple cloud providers. Easily provision and de-provision remote access for users, contractors, and partners. Save on performance, storage, and bandwidth by unifying on-prem with cloud. Administrate and debug from anywhere.
    Downloads: 32 This Week
    Last Update:
    See Project
  • 17
    Portmaster

    Portmaster

    Block Mass Surveillance

    Portmaster is a free and open-source application firewall that does the heavy lifting for you. Restore privacy and take back control over all your computer's network activity. Discover everything that is happening on your computer. Expose every connection your applications make and detect evil ones. Finally, get the power to act accordingly. Protect your whole computer, not just your browser. Block all advertisements and trackers for every application. Easily add your own rules and block...
    Downloads: 22 This Week
    Last Update:
    See Project
  • 18
    apk-mitm

    apk-mitm

    Application that automatically prepares Android APK files for HTTPS

    Inspecting a mobile app's HTTPS traffic using a proxy is probably the easiest way to figure out how it works. However, with the Network Security Configuration introduced in Android 7 and app developers trying to prevent MITM attacks using certificate pinning, getting an app to work with an HTTPS proxy has become quite tedious.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 19
    gopass

    gopass

    The slightly more awesome standard unix password manager for teams

    gopass is a simple but powerful password manager for your terminal. Manage your credentials with ease. In a globally distributed team, on multiple devices or fully offline on an air-gapped machine. By default your credentials are encrypted with GPG and versioned in git. This can be customized easily. The primary interface is the command line, making it an excellent choice for CLI fans, CI/CD systems or anything you can hook it up with. Gopass can also integrate with your browser so you can...
    Downloads: 23 This Week
    Last Update:
    See Project
  • 20
    OWASP Amass

    OWASP Amass

    In-depth attack surface mapping and asset discovery

    The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery using open source information gathering and active reconnaissance techniques. The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software. All of our projects ,tools, documents, forums, and chapters are free and open to anyone interested in improving application...
    Downloads: 16 This Week
    Last Update:
    See Project
  • 21
    SimpleX

    SimpleX

    The first messaging platform operating without user identifiers

    ... user profile identifiers, providing better meta-data privacy than alternatives. Many communication platforms are vulnerable to MITM attacks by servers or network providers. To prevent it SimpleX apps pass one-time keys out-of-band when you share an address as a link or a QR code. Double-ratchet protocol. OTR messaging with perfect forward secrecy and break-in recovery. NaCL cryptobox in each queue to prevent traffic correlation between message queues if TLS is compromised.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 22
    H2 Database

    H2 Database

    H2 is an embeddable RDBMS written in Java

    Welcome to H2, the Java SQL database. Very fast, open source, JDBC API. Embedded and server modes; in-memory databases. Browser-based Console application. Small footprint: around 2.5 MB jar file size. Browser-based Console application. Encrypted databases. Fulltext search. Pure Java with small footprint: around 2.5 MB jar file size. ODBC driver. This database can be used in embedded mode, or in server mode. ou may get a security warning from the firewall. If you don't want other computers...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 23
    NATS

    NATS

    Server for NATS.io, the cloud and edge native messaging system

    With flexible deployments models using clusters, superclusters, and leaf nodes, optimize communications for your unique deployment. The NATS Adaptive Edge Architecture allows for a perfect fit for unique needs to connect devices, edge, cloud or hybrid deployments. With true multi-tenancy, securely isolate and share your data to fully meet your business needs, mitigating risk and achieving faster time to value. Security is bifurcated from topology, so you can connect anywhere in a deployment...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 24
    Brim

    Brim

    Application to efficiently search and analyze super-structured data

    Desktop application to efficiently search and analyze super-structured data. Powered by Zed. Zed is a system that makes data easier by utilizing our new super-structured data model. Brim is a desktop app to explore, query, and shape the data in your super-structured data lake. Brim is an open source desktop application for security and network specialists. Brim makes it easy to search and analyze data from packet captures, like those created by Wireshark, and structured logs, especially from...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 25
    Blokada Apps

    Blokada Apps

    Repo for Blokada apps

    ... privacy with just one application, then Blokada is for you. It is free, secure and open source. For ultimate privacy protection, upgrade to Blokada Plus and connect through our VPN. Available in both Blokada 6 and Blokada 5. We use WireGuard®, the most advanced VPN protocol, to encrypt your network activity and hide your IP address.
    Downloads: 8 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next