Showing 119 open source projects for "security"

View related business solutions
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 1
    BoringSSL

    BoringSSL

    Mirror of BoringSSL

    ...The project prioritizes security, simplicity, and maintainability over backward compatibility. Unlike OpenSSL, BoringSSL provides no guarantee of stable APIs or ABIs, meaning third-party projects depending on it may frequently break. Google products that use BoringSSL ship their own copies and update them as needed, enabling faster iteration without legacy constraints.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 2
    Swift Crypto

    Swift Crypto

    Open-source implementation of a substantial portion of the API

    Swift Crypto is a cross-platform, open-source implementation that mirrors a substantial portion of CryptoKit so server and Linux/Windows ARM64 apps can share one modern crypto API. It exposes high-level, misuse-resistant primitives with Swift ergonomics while delegating to well-vetted backends under the hood. The repository maintains active releases and issue tracking for enhancements like PEM handling and ecosystem compatibility. High-level, misuse-resistant primitives and key handling....
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Capslock

    Capslock

    Tool to remap Caps Lock key behavior on Windows systems

    ...Rather than detecting vulnerabilities, Capslock focuses on identifying capabilities — permissions implied by calls to sensitive or privileged standard library functions, such as file system access, networking, or process control. By following transitive call graphs, it classifies which security-sensitive operations each package can reach, giving developers visibility into what their dependencies are capable of doing. This helps apply the Principle of Least Privilege to Go software, guiding audits, supply chain reviews, and trust assessments. Capslock aims to make security posture analysis more proactive by surfacing capability-based risk signals before malicious or overly powerful code is introduced into production.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    gVisor

    gVisor

    Application Kernel for Containers

    ...Written in Go, it implements a Linux-compatible system call interface that runs entirely in user space, creating a secure sandboxed environment for containers. Unlike traditional virtual machines or lightweight syscall filters, gVisor follows a third approach that offers many of the security benefits of virtualization while maintaining the speed, resource efficiency, and flexibility of containers. Its key runtime, runsc, integrates seamlessly with container ecosystems such as Docker and Kubernetes, making it easy to deploy sandboxed workloads using familiar tools. By intercepting and safely handling syscalls from applications, gVisor reduces the attack surface of the host kernel, mitigating risks associated with running untrusted or potentially malicious code in containerized environments.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5
    VeraCrypt

    VeraCrypt

    Open source disk encryption with strong security for the Paranoid

    VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase. ...
    Leader badge
    Downloads: 24,331 This Week
    Last Update:
    See Project
  • 6
    BerserkArch

    BerserkArch

    A bleeding-edge, security-centric Arch-based Linux distribution.

    BerserkArch is a security-focused, performance-tuned Linux operating system (OS) based on Arch Linux, designed for developers, hackers, and technical users. A bleeding-edge, security-centric Arch-based Linux distribution crafted for hackers, developers, and nerds alike. Following the Arch Linux philosophy, it is designed to be highly customizable, allowing users to build their environment with only the components they need, rather than having a lot of pre-installed software like some other security distributions (e.g., Kali Linux). ...
    Downloads: 66 This Week
    Last Update:
    See Project
  • 7

    Ed448-Goldilocks

    A 448-bit Edwards curve

    This is an implementation of elliptic curve cryptography using the Montgomery and Edwards curves Curve25519, Ed25519, Ed448-Goldilocks and Curve448, using the Decaf / Ristretto encoding.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 8

    SHS VPN Client

    VPN client for Small HTTP server

    VPN client for Small HTTP server Small HTTP server includes a VPN server that works on the https protocol. This is a client application for this server.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9
    BitVisor is a tiny hypervisor initially designed for mediating I/O access from a single guest OS. Its implementation is mature enough to run Windows and Linux, and can be used as a generic platform for various research and development projects.
    Downloads: 10 This Week
    Last Update:
    See Project
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 10
    PE Scanner
    PE Scanner is a software for catching / modifying / analysis of portable executable (patform: Windows XP & above). Also, all PEiD's plugins are compatible to be load and run.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    FastRC4

    Optimized implementation of RC4 (Rivest Cipher 4, ARCFOUR) in ASMx64.

    Optimized implementation of RC4 (Rivest Cipher 4, ARCFOUR) in ASM (x64) for Linux and Windows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Alan Framework

    Alan Framework

    A C2 post-exploitation framework

    Alan Framework is a post-exploitation framework useful during red-team activities. You can run your preferred tool directly in-memory. JavaScript script execution (in-memory without third party dependency) Fully compliant SOCKS5 proxy. Supported agent types: Powershell (x86/x64), DLL (x86/x64), Executable (x86/x64), Shellcode (x86/x64). Server.exe can be executed in Linux (via dotnet core) The network communication is fully encrypted with a session key not recoverable from the agent binary...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    OsEID

    AVR based smartcard/token with ECC and RSA cryptography

    AVR128DA /Atmega128 microcontroller based open source EID smartcard with RSA (512-2048) and ECC (prime192v1, prime256v1, secp384r1, secp521r1 and secp256k1) support. Compatible with MyEID card from Aventra. Supported in windows and linux by opensc package. Allow about 64KiB space for keys/certificates. PKCS#15 structure supported. USB token with CCID interface based on xmega128a4u with same features as card. High speed AVR multiple precision arithmetic: squaring, multiplication, exponentiation.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    ANDRAX Hacker's Platform

    ANDRAX Hacker's Platform

    Advanced Ethical Hacking and Penetration Testing Platform

    The most complete and Advanced Penetration Testing and Ethical Hacking Platform dedicated to Advanced Professionals. Developed to bring the power of Offensive Security in the anyone's pocket 100% OPEN SOURCE - ANDRAX is a independent solution for Security professionals who loves Linux
    Leader badge
    Downloads: 123 This Week
    Last Update:
    See Project
  • 15
    Libecc is an Elliptic Curve Cryptography C++ library for fixed size keys in order to achieve a maximum speed. The goal of this project is to become the first free Open Source library providing the means to generate safe elliptic curves.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    AttackSurfaceMapper

    AttackSurfaceMapper

    Automated tool for mapping & expanding organization’s attack surface

    AttackSurfaceMapper (ASM) is a reconnaissance and attack surface discovery tool designed to automate the process of mapping potential targets within an organization's infrastructure. It combines open source intelligence (OSINT) with selective active reconnaissance techniques to expand and analyze a target’s external attack surface. Users can supply domains, subdomains, or IP addresses as input, and applies multiple discovery methods to identify additional related assets such as new...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Pharos

    Pharos

    RTOS for Secure, Safe and Real-Time Systems

    Pharos is a free open-source RTOS for secure, safe and real-time systems with the following characteristics: - Memory and enhanced time partitioning (TSP) - Native support for sporadic, periodic and aperiodic threads - Fixed-priority preemptive scheduler - Execution time protection (threads are prevented from executing for more time than they are configured to) - Small size (full image has ~100 to 300KiB text, ~30KiB data) - Hard real-time determinism - Fast critical sections -...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Cloudium OS

    Cloudium OS

    Written in pure ASM and Exode with cloud computing in mind.

    Cloudium OS is being written in pure ASM. It's designed for speed and ease, having cloud computing in mind. It also is secure (without requiring constant user input like Windows). But, how are we going to do this? Well every os wants/says these kind of things, so to accomplish our goals we follow these simple rules: keep it simple (that's way better then these complex interfaces etc. almost nobody wants), generalize (this makes things easier and more useful without extra complexity) and be...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Advanced Onion Router
    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and...
    Downloads: 58 This Week
    Last Update:
    See Project
  • 20

    Cryptography Tools

    Classic & Modern Cryptography tools

    Cryptography Tools is a project to develop demonstration tools on classic (currently Caesar and Playfair) & modern crypto-systems, including private & public key encryptions, digital signatures, cryptographic hashes and authenticated encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Enigma

    Enigma

    Secure Striker Manager

    Copyright (C) 2016 Jonas Penno This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    SNET (Several Network Explore Tool) allows you to safely browse, discover and exploit vulnerabilities in your network, replicating the kinds of access an intruder can achieve, and proving actual paths of attacks that must be eliminated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Bagf Bae

    Bagf Bae

    A advanced graphical operating system.

    Our goal with this OS is to compete against Windows, Linux and Mac OS! We know it's still in early stage. But this fact will not demotivate us! License: Proprietary
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Flicker is a project to execute security-sensitive code in isolation from an operating system such as Windows or Linux. Flicker works on x86-class systems from AMD and Intel with support for dynamic root of trust.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    USE secure operating system

    USE secure operating system

    a secure, open source OS for use inside USEagency facilities

    ...Downloaded files (and any other files entering the system) will be subjected to both an exception-based and signature-based virus scan. After that, they will be placed in a leveled security storage space, each more secure--with the most secure being 50. Under 50 will be 46-49; under that is 36-45; under that is 27-25; under that is 26; under that is 14-25; under that is 6-13; under that is 5-3; lastly there is level 2 the most insecure. The operating system itself will require many passwords: boot up, access logon screen, login, admin, and more/ Mainly, it will be built with strong security as its base
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB