• More...
  • More...
    • More...
    • More...
    • More...

Category Category

    • More...
    • More...
    • More...
    • More...
    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

    • More...
    • More...
  • More...

Database Environment Database Environment

    • More...
    • More...

Freshness Freshness

Top Apps

  • Focus on Business Growth with a VoIP Solution Focus on Business Growth with a VoIP Solution Icon
    Focus on Business Growth with a VoIP Solution Icon

    Cloud Phone Service. Built for Business.

    • Over 50 business-class features
    • Easy setup. Professional installation.
    • CRM integration
  • Use DigitalOcean to Build, Deploy & Scale Web Apps Use DigitalOcean to Build, Deploy & Scale Web Apps Icon
    Use DigitalOcean to Build, Deploy & Scale Web Apps Icon

    The ease and simplicity of DigitalOcean gives developers more time to build and innovate for their customers.

    Thousands of businesses and developers around the world use DigitalOcean to easily deploy, manage, and scale applications of any size with less infrastructure friction. Go from one to a thousand virtual servers in seconds. Also, we continue to add hundreds of in-depth tutorials to our documentation library and have an active online community to get the support you need to succeed.
  • RND Icon


    Random data generator: secure character streams and large files

    Generate a lot of random junk. Create: • huge files • random character stream • specific character sequence Example uses - generate: • specific number of characters for testing web forms • restricted range character stream • control characters, 'high characters', emojis for fuzzing application input • specific byte sequence • Unicode character range • file overwrites to the exact byte count • custom text strings as content filler • long password strings • specific file size (e.g. 777 bytes, 10 MB, 2 GB) • huge files (x64 version: 4GB+ files) • fast generation rates on x64 version: ~1.25GB/sec by modest CPUs on Linux • files for zipping / hashing / integrity / transfer / speed tests. contains the source code and the x86/x64 executables for Linux, Windows, Raspberry Pi.

    Downloads: 5 This Week Last Update: See Project
  • Securo Icon


    AES text encryption based on Java

    If you like this app, please consider tipping via bitcoin- 1Be7RSb6wBq8LXbnCmvEkSRQugK549uTDy See the far more advanced alternative to Securo here >> Secure Mail -- Securo is an app for encrypting & decrypting Text files (.txt) [alternately, you can manually input data too] using AES (Advanced Encryption Standard) based on the Rijndael cipher.You may import text from .txt files and export it back to a .txt file after encryption. AES uses a symmetric key, meaning that the same key/password (16 character long) that you enter for encrypting the data can be used to decrypt the same data later.

    Downloads: 5 This Week Last Update: See Project
  • SuStorID

    SuStorID is an advanced Intrusion Detection System (IDS) for web services, based on machine learning. Its name comes from the term “Su Stori”, which in Sardinian language means “The Falcon”. It’s version is experimental, but demonstrates a number of interesting features, that can be readily exploited to detect and act against web attacks. SuStorID can be coupled with modsecurity, the well known web application firewall, to gather training data and provide for real-time counteractions. So, SuStorID is a host-based Intrusion Detection System, and by means of modsecurity can access internal web server’s data (i.e. http request/response fields) exactly as Apache does.

    Downloads: 5 This Week Last Update: See Project
  • Vulnerawa Icon


    Vulnerawa stands for vulnerable web application, though I think it should be renamed Vulnerable website. Unlike other vulnerable web apps, this application strives to be close to reality as possible. To know more about Vulnerawa, go here See how to setup vulnerawa in Wamp server. To see how to set up a web app pentest lab with Vulnerawa.

    Downloads: 5 This Week Last Update: See Project
  • Arcanum Editor Icon

    Arcanum Editor

    The Arcanum Editor is a small but powerful tool to encrypt and decrypt messages. The program also comes with it's own format CTXT. This format is based on XML and allows you to save texts with the Advanced Encryption Standard.

    Downloads: 4 This Week Last Update: See Project
  • ManageEngine now lets you patch computers from cloud ManageEngine now lets you patch computers from cloud Icon
    ManageEngine now lets you patch computers from cloud Icon

    ManageEngine Patch Manager Plus offers patching capabilities on cloud - Patch all OS updates and 550 third party apps on-demand and stay secure!

    Last year saw the hackers unleash their expertise in skills for a ransom - targeting those unpatched computers in data-critical institutions. Only if the computers were patched on time, billions of dollars could have been saved. ManageEngine’s Patch Manager Plus comes to your rescue, offering you an automated patching solution, now on cloud, for latest hotfixes of Windows updates and a wide range of third-party applications (over 550 of them).
    Automate patching with Patch Manager Plus, sit back & relax!
    Patch On Cloud Now
  • Certificate create and sign tool Icon

    Certificate create and sign tool

    Easy create and sign x509 certificates and generate RSA key pairs

    With this tool you can create and sign x509 certificates, certificate request, create self-signed certificates, RSA private and public keys with simple and intuitive GUI. This program is using OpenSSL.

    Downloads: 4 This Week Last Update: See Project
  • Free Print Monitor Icon

    Free Print Monitor

    Monitor de impresiones gratuito

    Free Print Monitor es un monitor de impresiones gratuito para entornos Windows escrito en Matlab. Está pensado para ser utilizado en pequeñas comunidades que requieran de un sistema automático de cobro de impresiones. Caso práctico: Ordenador público conectado a una serie de impresoras. Con Free Print Monitor usted podría listar un conjunto de usuarios cuya actividad en el centro de impresión quedaría cobrada y registrada sin apenas mantenimiento. Para que el programa funcione correctamente es IMPRESCINDIBLE la instalación de los siguientes programas: - MCRInstaller: Contenido en carpeta Dependencias - PaperCut Print Logger: Changelog nueva versión: - Aumento de la velocidad en un 80% - Soporte multi idioma - Máscara de contraseña Espero que, con todos sus defectos, este programa y sus futuras versiones le sean de utilidad tanto o más que a mí mismo. Álvaro Romero Calvo

    Downloads: 4 This Week Last Update: See Project
  • JPG Warlock Icon

    JPG Warlock

    Program that allows you to hide any file inside a JPG.

    Program that allows you to hide any file inside a JPG.

  • Java Email Spammer

    This application allows email spamming from gmail account.

    This application allows you to spam emails from your gmail account to any other destination. In the near future it will be possible to spam from different smtp server providers such as Google, Yahoo and more. Please support this application by visiting the official website at

    Downloads: 4 This Week Last Update: See Project
  • Open Help Desk Tools

    Free tools for helpdesk and security admins

    Open Help Desk Tools aims to help IT departments to solve users problems with Windows stations. It could be also helpfull for security audits. IT allows to: - Read Windows Event Log (with sorting, filtering) Not everything works yet ... working on it :)

    Downloads: 4 This Week Last Update: See Project
  • Monitor Your Most Critical Cloud & SaaS Applications Monitor Your Most Critical Cloud & SaaS Applications Icon
    Monitor Your Most Critical Cloud & SaaS Applications Icon

    Get insights into the performance of applications and services such as AWS, Salesforce, Office 365 and WebEx.

    With a view into both web and network health, you'll be able to pinpoint the cause of an outage instantly, whether it's within your network, a provider's network or the SaaS application. Save time, track SLAs and clear tickets faster.
    Are you involved with your company's network performance/operations team?
    Try It FREE!
  • UnMask

    The system is designed to upload phishing emails to a database where they are automatically analyzed and customized reports can be generated. UnMask was developed by ECIT Labs, Dept of Computer Science, FSU. The director of the Lab is Dr. Sudhir Aggarwal. UnMask has substantial on-line help features and should mainly be self-explanatory.

    Downloads: 4 This Week Last Update: See Project
  • Unlocker Icon


    use to crack the process "StudentMain.exe"

    use to crack the process "StudentMain.exe" so that the teacher can't control your PC

    Downloads: 4 This Week Last Update: See Project
  • codeZ

    A program to en/decrypt texts that are only crackable using bruteforce

    codeZ is a program that can encrypt/decrypt texts that are not crackable without using brute-force attacks. It supports loads of characters, including symbols like brackets.

    Downloads: 4 This Week Last Update: See Project
  • hNix OS Icon

    hNix OS

    A vulnerable lab for IT Security professionals & students

    A vulnerable toolkit & lab for IT Security Professionals, Hackers and Students. This is a Linux based Operating System & has been developed for those concerned with IT Security. Contains various software, exploits and is vulnerable to attacks. This project is a fork of the project MyLab@Home developed by Huzaib Shafi (

    Downloads: 4 This Week Last Update: See Project
  • multiOTP open source Icon

    multiOTP open source

    PHP strong authentication library, web interface & CLI, OATH certified

    multiOTP is a PHP class, a powerful command line utility and a web interface developed by SysCo systèmes de communication sa in order to provide a completely free and easy operating system independent server side implementation for strong two factors authentication solution. multiOTP supports hardware and software tokens with different One-Time Password algorithms like OATH/HOTP, OATH/TOTP and mOTP (Mobile-OTP). QRcode generation is also embedded in order to support provisioning of Google Authenticator software tokens. SMS code sending is currently implemented for several providers (ASPSMS, Clickatell and IntelliSMS). The data storage of the command line utility is by default flat files based in order to simplify deployment in a few minutes, but MySQL backend is supported too. multiOTP can be easily integrated in RADIUS servers like FreeRADIUS under Linux/Windows or TekRADIUS LT under Windows. multiOTP is also the engine of the credential provider multiOTP Credential Provider.

    Downloads: 4 This Week Last Update: See Project
  • Connection Verify Icon

    Connection Verify

    Connection Verify È un software, dotato di numerose caratteristiche interessanti e utili all'utente. Permette di verificare in qualsiasi momento la presenza di connessione internet, ma non solo, permette all'utente di verificare la raggiungibilità del proprio sito web ed è anche un semplice browser per piccole ricerche.


    [WARNING! PROJECT IS NOT READY TO USE. DO NOT DOWNLOAD FILES FROM FILES REPOSITORIES!] ModernCMS - a powerful php engine that can up your website. You can create your own portal, forum, blog, website, company website, multimedia portal and other! Visit site for more information!

  • OpenMTP

    An open source implementation of SS7 Message Transfer Part (MTP). This is a fork of DIGIUM LIBSS7. This project will focus on Distributed MTP, MTP in the cloud, MTP over TCP, MTP over SCTP, MTP over TLS, MTP API, ...etc.

  • QuickPasswordGenerator Icon


    Generates random password

    This program generate random password of a specified length, using numbers, upper and lowercase letters and special symbols.


    .NET Secure Password Hashing API

    This API uses the PBKDF2 specification with HMACSHA512 as the underlying pseudo random function (PRF) to perform the salted hashing over a specified number of instances to eliminate the feasibility of rainbow table attacks & drive up the computing cost of generating said tables, this is known as key stretching. This API also provides the capability to create BIG crypto random salt strings, because the BIGGER & more RANDOM your salt, the better! (anti-rainbow tables) I was going to use Microsofts Rfc2898DeriveBytes(cb) implementation but after learning that it is using HMACSHA1 as the underlying PRF, I decided to modernise this & implement PBKDF2 with HMACSHA512 instead (Stronger against GPUs) Get binaries here but for source code please use the PWDTK.NET repo on GitHub which you can clone from here: Please consider donating (5th button above) if you find PWDTK.NET useful! Package AVAILABLE on NuGet!!! Thanks - Ian

  • AllCheckSumer Icon


    Calculate and compare files with 3 different file signature algorithms

    AllCheckSumer is a handy tool for computer forensics and is helpful for investigators to search throughout a computer’s file system for a bad hash specified by the investigator. The tool will search throughout a location, specified by the investigator. It can be either an entire file system or a specific folder, and create a hash set with the following file signature algorithms: • MD5 (Message-Digest Algorithm v. 5) • SHA-1 (Secure Hash Algorithm v. 1) • CRC (Cyclic Redundancy Check)

    Downloads: 3 This Week Last Update: See Project
  • Basic Facebook Login Source

    Looking for a simple way to use FB login method without FB sdk?

    Looking for a simple way to use FB login method without FB sdk? Then you are in luck, because this is the most simplest login method for Facebook that could be made. Requirements - Timer - Textbox 1 "Username" - TextBox 2 "Password" - Button1 "Login" It's simple as that, no need for any other addons! Read more about it @

    Downloads: 3 This Week Last Update: See Project
  • Botnet Detectors Comparer

    Compares botnet detection methods

    Compares botnet detection methods by computing the error metrics by reading the labels on a NetFlow file. The original NetFlow should have a new column for the ground-truth label, and a new column with the prediction label for each botnet detection method. This program computes all the error metrics (TPR, TNR, FPR, FNR, Precision, Accuracy, ErrorRate, FMeasure1, FMeasure2, FMeasure0.5) and output the comparison results. It also ouputs a png plot. The program can compare in a flow-by-flow basis, or it can apply our new botnet detection error metrics, that is time-based, detects IP addresses instead of flows and it is weighted to favor sooner detections. See the paper for more details.

    Downloads: 3 This Week Last Update: See Project
  • Directory Finder

    Tool for finding directory

    This tool can usage to finding directory in web aplication. it's running with Command Line Interface to to simplify the work of prosessor.

    Downloads: 3 This Week Last Update: See Project
  • DoS As You Are Icon

    DoS As You Are

    Another one of em' DoS Tools!

    Just a little project I've made last summer.Nothing too serious.If you want to help be my guest.It's written in .NET(C#) so you can de-compile it using IL-Spy.

    Downloads: 3 This Week Last Update: See Project

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you