• More...
  • More...
    • More...
    • More...
    • More...

Category Category

    • More...
    • More...
      • More...
    • More...
    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

    • More...
    • More...
  • More...

Database Environment Database Environment

    • More...

Freshness Freshness

Top Apps

  • Trial SolarWinds Backup and you could receive a free Amazon Echo Dot Trial SolarWinds Backup and you could receive a free Amazon Echo Dot Icon
    SolarWinds Backup provides lightning-quick recovery that can restore business continuity after a disaster. For a limited time only, when you try SolarWinds Backup and store at least 100GB of selected data, you have the chance to receive a free Amazon Echo Dot.
  • Want to improve your MSP’s revenue? Price your services right. Want to improve your MSP’s revenue? Price your services right. Icon
    Want to improve your MSP’s revenue? Price your services right. Icon

    Get the ebook, The Managed Services Pricing Guide 2.0 to get industry best practices on pricing managed services.

    You choose software for your IT business so it makes you money. The margins must be good enough to justify the cost. SolarWinds® RMM was priced to give you the margins you need to earn a healthy amount of monthly recurring revenue. Download our all-new Managed Services Pricing Guide 2.0 to find what revenue to expect for your services, including light monitoring, web protection, patching management, backup and more.
  • Pharos Icon


    RTOS for Secure Systems

    Pharos is a Real-Time Operating System designed for Secure Systems with the following characteristics: -Security: With space partitions and enhanced time partitioning. Each partition protected with hardware MMU/MPU and operating in user mode. -Quality: Low cyclomatic, high comments, low nesting level, MISRA. -Mixed Criticality: Partition independence and isolation. Native support for sporadic, periodic and aperiodic threads under a fixed-priority preemptive scheduler, including execution time protection (threads are not allowed to run for more time than they are configured to). -Determinism: Hard real-time determinism, most calls areO(1) and very few cases are O(Log(N)) - they are well indentified in the user manual. Pharos takes ARINC and moves it one step further, improving responsiveness and isolation. Supports ARM R5, M4, 926EJ-S. We are a group of enthusiastic software developers that also implements client custom software. Contact:

    Downloads: 26 This Week Last Update: See Project
  • wip-kernel Icon


    WIP Patched Kernel Sources (Linux 4.15.11-wip-x39)

    WIP Patched Kernel distribution with custom settings (Linux 4.15.11-wip-x39) and new features. Optimized to take full advantage of Desktops, PC Gamers, Workstations, Media Centers and others. PERFORMANCE AND TO POWER AMAZING EXPERIENCE FOR GAMING G SERIES Experience a whole new way to interact with your PC like never before. Supports all recent 64-bit versions of Debian and Ubuntu-based systems.

  • GoldBug - Encrypted Communications Icon

    GoldBug - Encrypted Communications

    Instant Chat Messenger. E-Mail-Client. Websearch. Filetransfer.

    GoldBug is a decentralized & secure communication suite that offers an integrated e-mail client, an instant messenger, and a file transfer utility. Also included is a URL-distribution and search tool. ● English Manual: ● Deutsches Handbuch: ● ● Audit: BIG SEVEN Study ● Source: ● Compiling-Info: ● GoldBug has Server-Software included and also works with the Android Chat Server "SmokeStack" under: By 2017-09-30 the project test server has been discarded, please learn to set up your own crypto chat server or use the POPTASTIC function (crypto chat over IMAP/POP3 servers)

    Downloads: 48 This Week Last Update: See Project
  • Network Security Toolkit (NST) Icon

    Network Security Toolkit (NST)

    A network security analysis and monitoring toolkit Linux distribution.

    Network Security Toolkit (NST) is a bootable ISO image (Live DVD/USB Flash Drive) based on Fedora 26 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available in the toolkit. An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, network monitoring, host geolocation, network analysis and configuration of many network and security applications found within the NST distribution. In the virtual world, NST can be used as a network security analysis, validation and monitoring tool on enterprise virtual servers hosting virtual machines.

  • VeraCrypt Icon


    Open source disk encryption with strong security for the Paranoid

    VeraCrypt is a free disk encryption software brought to you by IDRIX ( and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data. All released files are PGP signed with key ID=0x54DDD393, available on key servers and downloadable at VeraCrypt can mount TrueCrypt volumes. It also can convert them to VeraCrypt format. Documentation: FAQ :

  • Monitor Your Most Critical Cloud & SaaS Applications Monitor Your Most Critical Cloud & SaaS Applications Icon
    Monitor Your Most Critical Cloud & SaaS Applications Icon

    Get insights into the performance of applications and services such as AWS, Salesforce, Office 365 and WebEx.

    With a view into both web and network health, you'll be able to pinpoint the cause of an outage instantly, whether it's within your network, a provider's network or the SaaS application. Save time, track SLAs and clear tickets faster.
    Are you involved with your company's network performance/operations team?
    Try It FREE!
  • RCDCap

    RCDCap is a remote capture preprocessor

    RCDCap is a packet processing framework. At its core, it incorporates basic mechanisms for local and remote capturing and decapsulation of packets (CISCO ERSPAN and HP ERM are supported). It can be extended to support many types of packet-based traffic analysis by creating plug-ins and loading them in the main application. It includes many optimizations to ensure high performance traffic processing. Some of them are: multithreaded traffic processing; explicit thread pinning; configurable packet burst processing; support for PF_PACKET and PF_RING. It can be also used to inject the processed traffic to a TAP device or regular physical Ethernet interface. Its basic functuonalities make it a viable solution for preprocessing CISCO ERSPAN and HP ERM traffic which can be handed to some other application. RCDCap offers its own set of plug-ins for doing different types of traffic analysis. Notably, it has its own plug-in for analysing NDP, ARP, DHCP and DHCPv6 traffic.

  • Scrollout F1 Icon

    Scrollout F1

    An easy-to-use anti-spam email gateway

    • Designed for Linux and Windows email system administrators, Scrollout F1 is an easy to use, already adjusted email firewall (gateway) offering free anti-spam and anti-virus protection aiming to secure existing email servers, old or new, such as Microsoft Exchange, Lotus Domino, Postfix, Exim, Sendmail, Qmail and others. • Built-in multilayer security levels make configuration effort equal to a car radio. • It combines simplicity with effective protection using powerful open source with additional set of rules & filters. • Available as 64bit: - ISO image (Internet connection required during installation) - install from scratch (Internet connection required during installation). • Minimum Requirements (for 5,000 messages/day): 1 GB of RAM 30 GB storage drive 1 Processor x86/AMD64 1 Ethernet x 1 IPv4 address UDP ports: 53 123 4500 6277 24441 TCP ports: 25 80 443 2703

  • OnionFruit Connect Icon

    OnionFruit Connect

    OnionFruit Connect is a Tor proxy, allowing you to use tor anywhere

    OnionFruit Connect is a different way to access the tor network. Instead of downloading a different browser, you can use whatever one you already use. This app starts the tor service, and then modifies your proxy settings to route most of your apps through the tunnel made by tor. When you see the page saying you're connected, All your internet data passing through the tunnel is encrypted. Every site you visit is routed through a different set of servers, making it impossible to track your data.

    Downloads: 13 This Week Last Update: See Project
  • x64dbg Icon


    An open-source x64/x32 debugger for windows.

    An open-source x64/x32 debugger for windows. Development is done on GitHub ( Daily snapshots are uploaded here, snapshots for every commit can be found on

  • Proxy Studio

    Proxy & Socks Scanner

    mIRC Script for scanning and leeching CONNECT PROXYS & SOCKS v4/5. There are dialogs easy to use and stats for nerds. Le script mIRC, est doter d'un scanneur de proxys et un scanneur de socks v4/5. Vous pouvez specifier des pages a "leecher" (donc pas besoins de visiter les site un par un) Il y a un interface facile a comprendre et a utiliser. Vos proxys sont les miens xD

    Downloads: 25 This Week Last Update: See Project
  • Get the most out of your virtual environment. Get the most out of your virtual environment. Icon
    Get the most out of your virtual environment. Icon

    Monitor VMware® vSphere® and Microsoft® Hyper-V® environments from one screen. Rule your VM environment with SolarWinds® Virtualization Manager.

    SolarWinds Virtualization Manager (VMAN) provides VMware vSphere and Microsoft Hyper-V performance monitoring in a single pane of glass. Use built-in management actions to instantly remediate virtualization issues. VMAN also features PerStack ™, helping you accelerate identification of root cause by dragging-and-dropping VM performance metrics on a common timeline for immediate visual correlation across all your VM data. Try it free for 30 days!
  • Free VMware ESXi backup Icon

    Free VMware ESXi backup

    Local and over IP backups for ESXi 5.1, 5.5, 6.0 and 6.5

    Free VMWare Backup software solution for ESXi hypervisor, compatible with free unlicensed ESXi. Hot backups, fully functional, standalone, ideal for dedicated servers. Full version supports quiescing, differential backup, deduplication and much more... Download link: VMWare backup and replication for ESXi vSphere virtual machines to datastore or differential over IP. No agents, self capable, runs in the hypervisor host, ESXi 5.1, ESXi 5.5 & ESXi 6.0 compatible, hot backups. Free VMWare backup solution for the ESXi hypervisor. Linux style command line tool. Crontab with configurable disk space autoprovision, set the room you want to reserve for your backups and rotate them. Full backups may be done with vmkfstools or by means of Rsync and its Delta algorithm (read:, to a local datastore or over TCP/IP tunneled through SSH, so any transfer over IP is secure.

  • VersionInfo Icon


    Generate file version information

    This command-line utility produces a report of file information including version information where available. The reports can be useful for release information, manifests, and integrity verification.

    Downloads: 5 This Week Last Update: See Project
  • OWASP Juice Shop Icon

    OWASP Juice Shop

    An intentionally insecure Javascript Web Application

    OWASP Juice Shop is an intentionally insecure web application written entirely in Javascript which encompasses the entire range of OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. It was the first application written entirely in JavaScript listed in the OWASP VWA Directory. The application contains a vast number of hacking challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. The hacking progress is tracked on a score board. Finding this score board is actually one of the (easy) challenges! Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a "guinea pig"-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.

    Downloads: 42 This Week Last Update: See Project
  • survol

    RDF-based framework monitoring business systems activity

    A Python agent and a web interface aiming to help the analysis and investigation of a legacy application. A set of machines, processes, databases, programs etc ... all communicating with each other, manipulating your data, and whose software architecture has become, with time, complicated, difficult to understand, and undocumented. Data are aggregated with an RDF inference engine, creating a global vision of the business information processing.

    Downloads: 0 This Week Last Update: See Project
  • wingkalabs Icon


    Wingkalabs (Linux) Wingkalabs es una máquina Virtual Linux intencionalmente vulnerable. Esta máquina virtual se puede utilizar para realizar entrenamientos de seguridad, probar herramientas de seguridad y practicar técnicas comunes de pruebas de penetración. El inicio de sesión y la contraseña predeterminados son wingkalabs:wingkalabs. Nunca exponga esta máquina virtual a una red que no sea de confianza (use NAT o el modo solo de host si tiene alguna pregunta). Descarga: Contacto: Developer:Sebastian Veliz Donoso Happy Hacking!

    Downloads: 0 This Week Last Update: See Project
  • OWASP Mutillidae II Icon

    OWASP Mutillidae II

    OWASP Mutillidae II Web Pen-Test Practice Application

    OWASP Mutillidae II is a free, open source, deliberately vulnerable web-application providing a target for web-security enthusiast. Mutillidae can be installed on Linux and Windows using LAMP, WAMP, and XAMMP. It is pre-installed on SamuraiWTF and OWASP BWA. The existing version can be updated on these platforms. With dozens of vulnerabilities and hints to help the user; this is an easy-to-use web hacking environment designed for labs, security enthusiast, classrooms, CTF, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, corporate web sec training courses, and as an "assess the assessor" target for vulnerability assessment software.

    Downloads: 870 This Week Last Update: See Project
  • ufonet Icon


    UFONet - (DDoS botnet + DoS tool) via Web Abuse

    UFONet - is a tool designed to launch Layer 7 (HTTP/Web Abuse) DDoS & DoS attacks. + FAQ: -> UFONet-v1.0 "TachY0n!" (.zip) -> md5 = a928524c167238d6a95a8a38ada5c334 --------------------------------------------

    Downloads: 235 This Week Last Update: See Project
  • mts-ericsson Icon


    MTS is a OpenSource Multi-protocol tester for IP-based protocol

    MTS (Multi-protocol Test Suite) is a multi-protocol testing tool specially designed for telecom IP-based architectures (see above "Features" section for more details). MTS meets needs like : * Functional, non-regression or protocol tests => ‘Sequential’ mode * Load, performance endurance stress tests => ‘Parallel’ mode (master/slave) * Simulates equipment => client, server or both sides * System supervision => capture mode (like wireshark) Product characteristics : * Definition of tests case in XML files : test and scenarios input files * Graphical (very convivial) or command line (for test automation) user interfaces * Easy to use : logging management and rich statistics presentation. * Pure software solution => support only IP based protocol * Written in java => supports many famous platforms : Windows and Linux supported * Open Source product since begin 2012 with GPLV3 license => free to use

  • Sagacity Icon


    Security Assessment Data Management and Analysis Tool

    Sagacity is a vulnerability assessment and STIG compliance data management tool designed to make security testing more efficient, effective and complete. Security assessments, especially those done for DoD and Federal organizations, produce tremendous amounts of scan and compliance data that security engineers must sort through and deconflict, identify untested requirements, and somehow analyze to communicate risk to their employers. Sagacity, originally written to support a government customer, was designed to fill that need. What if an organization could turn massive amounts of irreconcilable vulnerability scan data into true knowledge and insight about their networks? They would be able to make wise decisions resulting in cost-effective actions to improve their security with the best return on investment. Keen insight. Sound judgment. Wise decisions. Sagacity.

    Downloads: 6 This Week Last Update: See Project
  • crackpkcs12

    Multithreaded program to crack PKCS#12 files (p12 and pfx extensions)

  • HTTP Test Tool Icon

    HTTP Test Tool

    httest is a script based tool for testing and benchmarking web applications, web servers, proxy servers and web browsers. httest can emulate clients and servers in the same test script, very useful for testing proxys.

  • Robolinux Icon


    New Robolinux Cinnamon 9.1 LTE (2021) which runs Windows XP, 7 & 10

    Robolinux has been working night and day listening carefully to its User base and is extremely excited to release its brand new Robolinux 64 bit 9 series Cinnamon version which includes automated driver installers, Free Stealth VM, Free C Drive to VM & Free Apps installers, programmable ear candy and much much more built upon the 4.13 Linux kernel sporting the newest Cinnamon version 3.6 This second of five brand new Robolinux 9 series versions focuses on Privacy and was built with a flawless crash free balance of the best current but highly stable Debian & Ubuntu source code, delivering exactly what our Users asked for in a blazing fast Linux OS that runs Windows XP, 7 & 10 natively inside it virus Free. Please see the Readme.txt file for complete Robolinux Cinnamon V9.1 details For all downloads click on the "Files" button above. Thank you John Martinson Founder

  • T50

    Very fast network stress tool

    the fatest network packet injector *WARNING*: Don't use versions prior to 5.7.0. There is a major bug (some IPv4 were being reversed), recently discovered, fixed in this release.

  • i-doit - Open Source CMDB & ITSM Tool Icon

    i-doit - Open Source CMDB & ITSM Tool

    ITIL conforming CMDB solution for the documentation of the entire IT.

    i-doit is a web based IT documentation and CMDB. i-doit documents IT-systems and their changes, defines emergency plans, displays vital information and helps to ensure a stable and efficient IT operation: The technical documentation: This means that all information can be organised (details flexibly adjusted), stored and maintained in one place. This allows simple Helpdesk, Support and Planning functions and provides the basis for quality assurance and certification. i-doit allows services to be documented as a logical grouping of objects placed in relation to each other. This provides the basis for (ITIL) processes such as Change and Problem Management, helps to control and manage the SLA (Service Level Agreement) or the communication with users. Its interfaces to other ITSM applications (like Nagios, Request Tracker etc.) allow the entering of data only once in the ITSM environment. i-doit maintains one holistic view of the operational situation.

  • Polarity Browser Icon

    Polarity Browser

    A fast, secure, stable web browser powered by Chromium and Trident.

    Polarity is a dual engine browser powered by both Chromium and Trident that focuses on system efficiency by bringing low RAM and low CPU usage. This browser was also programmed to be optimized for Windows with an Android version available. Browse the web with an uncomplicated UI that is highly customizable with themes, apps, and extensions from the Polarity Store, GreasyFork, OpenUserJS, and UserStyles. Polarity also comes with a built in password manager which safely encrypts all data to prevent theft. Polarity also comes with a built in adblocker and privacy tools such as proxy/VPN support and header masking to prevent further tracking online. If you appreciate all the hard work that we put into creating and developing Polarity, please consider giving a small donation at:

  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you