Showing 15 open source projects for "privilege management"

View related business solutions
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
    Learn More
  • The #1 Embedded Analytics Solution for SaaS Teams. Icon
    The #1 Embedded Analytics Solution for SaaS Teams.

    Qrvey saves engineering teams time and money with a turnkey multi-tenant solution connecting your data warehouse to your SaaS application.

    Qrvey’s comprehensive embedded analytics software enables you to design more customizable analytics experiences for your end users.
    Try Developer Playground
  • 1
    sqlmap

    sqlmap

    Automatic SQL injection and database takeover tool

    sqlmap is a powerful, feature-filled, open source penetration testing tool. It makes detecting and exploiting SQL injection flaws and taking over the database servers an automated process. sqlmap comes with a great range of features that along with its powerful detection engine make it the ultimate penetration tester. It offers full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, and many other database management systems. It also...
    Downloads: 65 This Week
    Last Update:
    See Project
  • 2
    KubeLinter

    KubeLinter

    KubeLinter is a static analysis tool that checks Kubernetes YAML files

    KubeLinter analyzes Kubernetes YAML files and Helm charts, and checks them against a variety of best practices, with a focus on production readiness and security. KubeLinter runs sensible default checks, designed to give you useful information about your Kubernetes YAML files and Helm charts. This is to help teams check early and often for security misconfigurations and DevOps best practices. Some common examples of these include running containers as a non-root user, enforcing least privilege...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    BloodHound

    BloodHound

    Six Degrees of Domain Admin

    ... paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory or Azure environment. BloodHound Enterprise is an Attack Path Management solution that continuously maps and quantifies Active Directory Attack Paths. You can remove millions, even billions of Attack Paths within your existing architecture and eliminate the attacker’s easiest, most reliable, and most attractive techniques.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Singularity

    Singularity

    Open source container platform designed to be simple, fast, and secure

    Singularity is an open-source container platform designed to be simple, fast, and secure. Many container platforms are available, but Singularity is designed for ease of use on shared systems and in high-performance computing (HPC) environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • 5
    StreamAlert

    StreamAlert

    StreamAlert is a serverless, realtime data analysis framework

    ... or functions. Merge similar alerts and automatically promote new rules if they are not too noisy. Ingested logs and generated alerts can be retroactively searched for compliance and research. Serverless design is cheaper, easier to maintain, and scales to terabytes per day. Deployment is automated, simple, safe and repeatable for any AWS account. Secure by design, least-privilege execution, containerized analysis, and encrypted data storage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    bWAPP

    an extremely buggy web app !

    bWAPP, or a buggy web application, is a free and open source deliberately insecure web application. bWAPP helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities. bWAPP prepares one to conduct successful penetration testing and ethical hacking projects. What makes bWAPP so unique? Well, it has over 100 web bugs! It covers all major known web vulnerabilities, including all risks from the OWASP Top 10 project. The focus is not just on one specific...
    Leader badge
    Downloads: 2,083 This Week
    Last Update:
    See Project
  • 7
    Access Road

    Access Road

    Simulator of access controls

    The Access Road software is a universal simulator of access controls that is intended to improve design and auditing of IT security. Access Road offers the out-of-the-box simulations of GNU/Linux Ubuntu® (components and rights on the file system), MySQL Server®, and a generic Role-Based-Access-Control application to adapt to your needs. It is designed for database, system, and application administrators, IT architects and developers, auditors. Access Road provides a full simulation of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Weblooker

    Weblooker

    Weblooker monitors serveral services on multiple systems for their sta

    Weblooker monitors serveral services on multiple systems for their status, up- and downtimes. A webgui and Android client to view the current status and logged downtimes is available as separately package.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Ralasafe Access Control Middleware focus on data-level privilege management, including database row/column and content privilege management. It also manages 2) login control; 3) function-level privilege management; and 4) URL privilege authentication
    Downloads: 0 This Week
    Last Update:
    See Project
  • Deliver secure remote access with OpenVPN. Icon
    Deliver secure remote access with OpenVPN.

    Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

    OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
    Get started — no credit card required.
  • 10
    Kd SQL is a cross platform MySQL Front End Database management utility. It contains a visual database designer and Query Editor, and an advanced user privilege manager. We are inviting interested developers to join the project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Falah FireBird Manager
    NEW version 1.0.6!!! is released. Bugs fixed related to system thread. Database Management Control for FireBird database developed using .NET (C#) .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Open Privilege Management Infrastructure
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    pwz_auth is a PHP lib to help you secure pages with login and password. It stores data in a MySQL database and handles users authentication and privilege levels.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    InfoWeb is a web based tool for handling public webpages, intranet and is a course administrative tool. It has features like booking lists, discussion, news, etc. It supports multi-language, distributed user and privilege handling, XML/XSLT for layout.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    The goal of Keen Manager is to design a simple and highly expandable control panel system for use by end-users and developers. It is also meant for having a multi-user authentication system in which each control panel can have it's own privilege system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next