Showing 47 open source projects for "usb security software"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    Prowler

    Prowler

    An open source security tool to perform AWS security assessment

    Prowler is an Open Source security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening, and forensics readiness. It contains more than 200 controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks. Prowler is a command-line tool that helps you with AWS security assessment, auditing, hardening, and incident response. It follows guidelines of the CIS Amazon Web Services...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    Toolbx Linux

    Toolbx Linux

    Tool for interactive command line environments on Linux

    Toolbx is a tool for Linux, which allows the use of interactive command line environments for development and troubleshooting the host operating system, without having to install software on the host. It is built on top of Podman and other standard container technologies from OCI. Toolbx environments have seamless access to the user's home directory, the Wayland and X11 sockets, networking (including Avahi), removable devices (like USB sticks), systemd journal, SSH agent, D-Bus, limits, /dev and the udev database, etc. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    NextDNS

    NextDNS

    NextDNS CLI client (DoH Proxy)

    NextDNS protects you from all kinds of security threats, blocks ads and trackers on websites and in apps and provides a safe and supervised Internet for kids, on all devices and on all networks. Determine your threat model and fine-tune your security strategy by enabling 10+ different types of protections. Use the most trusted threat intelligence feeds containing millions of malicious domains, all updated in real-time. Go beyond the domain, we analyze DNS questions and answers on-the-fly (in...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 4
    cargo-crev

    cargo-crev

    A cryptographically verifiable code review system for the cargo

    A cryptographically verifiable code review system for the cargo (Rust) package manager. cargo-crev is an implementation of Crev as a command-line tool integrated with cargo. This tool helps Rust users evaluate the quality and trustworthiness of their package dependencies. Crev is a language and ecosystem agnostic, distributed code review system. Use reviews produced by other users. Increase the trustworthiness of your own code. Build a web of trust of other reputable users to help verify the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 5
    aws-encryption-sdk-cli

    aws-encryption-sdk-cli

    CLI wrapper around aws-encryption-sdk-python

    This command line tool can be used to encrypt and decrypt files and directories using the AWS Encryption SDK. If you have not already installed cryptography, you might need to install additional prerequisites as detailed in the cryptography installation guide for your operating system. Installation using a python virtual environment is recommended to avoid conflicts between system packages and user-installed packages. For the most part, the behavior of aws-encryption-cli in handling files is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Google Apps Manager

    Google Apps Manager

    Command line management for Google G Suite

    Google Apps Manager or GAM is a free and open source command line tool for Google G Suite Administrators that allows them to manage many aspects of their Google Apps Account quickly and easily. With GAM you can create and manage users, groups and domains; manage email, security and calendar settings; manage admins and organizations and many more. To use GAM Google Apps Business, Education, Partner or Government Edition is required.
    Downloads: 23 This Week
    Last Update:
    See Project
  • 7
    Capslock

    Capslock

    Tool to remap Caps Lock key behavior on Windows systems

    ...Rather than detecting vulnerabilities, Capslock focuses on identifying capabilities — permissions implied by calls to sensitive or privileged standard library functions, such as file system access, networking, or process control. By following transitive call graphs, it classifies which security-sensitive operations each package can reach, giving developers visibility into what their dependencies are capable of doing. This helps apply the Principle of Least Privilege to Go software, guiding audits, supply chain reviews, and trust assessments. Capslock aims to make security posture analysis more proactive by surfacing capability-based risk signals before malicious or overly powerful code is introduced into production.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    kubeaudit

    kubeaudit

    kubeaudit helps you audit your Kubernetes clusters

    kubeaudit helps you audit your Kubernetes clusters against common security controls.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    testssl.sh

    testssl.sh

    Testing TLS/SSL encryption anywhere on any port

    testssl.sh is a free command-line tool that checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more. testssl.sh is free and open-source software. You can use it under the terms of GPLv2, please review the License before using it. Works for Linux, Mac OSX, FreeBSD, NetBSD and WSL/MSYS2/Cygwin out of the box, no need to install or configure something, no gems, CPAN, pip or the like. OpenBSD only needs bash to be...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 10
    ggshield

    ggshield

    Detect and validate 500+ types of hardcoded secrets

    GitGuardian’s ggshield is an open-source command-line interface (CLI) tool designed to help developers and security teams detect hardcoded secrets and sensitive credentials early in the development process, either locally or in CI/CD pipelines. It scans source code, configuration files, commit history, and other artifacts to automatically detect hundreds of different secret types — such as API keys, tokens, and passwords — helping prevent accidental leaks before they reach version control or...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    agent-browser

    agent-browser

    Browser automation CLI for AI agents

    agent-browser is a toolkit that embeds AI agent capabilities directly into the web browser, enabling agents to interact with web content, scripts, and user actions while maintaining security boundaries that respect user privacy and browser constraints. It effectively provides a sandbox where AI agents can read, scroll, click, and interpret pages in context, allowing them to automate workflows, answer questions about page content, or generate structured summaries directly from the user’s...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 12
    Claude Code Templates

    Claude Code Templates

    CLI tool for configuring and monitoring Claude Code

    Claude Code Templates is a popular open-source CLI tool and template ecosystem designed to streamline how developers work with Anthropic’s Claude Code by providing a rich catalog of ready-to-use code templates, AI agents, custom commands, settings, hooks, and external integrations that can be installed interactively or via the command line. It lets you quickly scaffold domain-specific AI agents (like security auditors, performance optimizers, or database architects), fill in consistent...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    CFSSL

    CFSSL

    Cloudflare's PKI and TLS toolkit

    CFSSL is CloudFlare's PKI/TLS swiss army knife. It is both a command line tool and an HTTP API server for signing, verifying, and bundling TLS certificates. It requires Go 1.12+ to build. Note that certain linux distributions have certain algorithms removed (RHEL-based distributions in particular), so the golang from the official repositories will not work. Users of these distributions should install go manually to install CFSSL. You can set the GOOS and GOARCH environment variables to have...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Largest Generic Hash and HMAC Program

    57 Hash Functions In One Program, plus each with HMAC or KMAC

    FEHASHMAC is the largest collection of publicly known hash algorithms integrated into a command-line utility. FEHASHMAC contains a set of known test vectors and results for each algorithm such that the correct implementation for each hardware platform and compiler version can directly be verified. Currently 57 hash algorithms like sha1 sha224 sha256 sha384 sha512 and variants, sha3 and shake, all SHA3 finalists and blake3, md2 md4 md5 md6, rmd128 rmd160 rmd256 rmd320, whirl gost lash160...
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    SiteOne Crawler (desktop app)

    SiteOne Crawler (desktop app)

    A free, feature-rich web analyzer and exporter/cloner you will love!

    A free in-depth website analyzer providing audits of security, performance, SEO, accessibility and other technical aspects. Available as a desktop application for Windows/macOS/Linux and as a CLI tool for advanced users and CI/CD processes. It also includes an offline web page exporter (website clone, mirror).
    Downloads: 7 This Week
    Last Update:
    See Project
  • 16
    TraceMAC - Traceroute for MAC addresses

    TraceMAC - Traceroute for MAC addresses

    TraceMAC is a command-line Layer 2 traceroute for Cisco switches

    TraceMAC is a Windows/Linux command-line tool that allows you to trace a specific MAC address thru Cisco switches. It works by connecting to a switch using SSH, SNMP, Telnet, HTTP or HTTPS and do some "show commands" and later process the output, this will happen recursively until it finds the switch where that MAC address (PC/Printer/Etc) is directly connected. Note: It works with Cisco switches only and you must have CDP enabled at least on trunks/links between switches! Is tested...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 17
    Cherrybomb

    Cherrybomb

    Cherrybomb is a CLI tool that helps you avoid undefined user behaviour

    Cherrybomb is an CLI tool written in Rust that helps prevent incorrect code implementation early in development. It works by validating and testing your API using an OpenAPI file. Its main goal is to reduce security errors and ensure your API functions as intended. Cherrybomb makes sure your API is working correctly. It checks your API's spec file (OpenAPI Specification) for good practices and makes sure it follows the OAS rules. Then, it tests your API for common issues and vulnerabilities....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    command-output-to-html-table

    command-output-to-html-table

    A shell script to convert any file or command output into a html table

    Please watch the video below, to convert any file or a command output into a nice html table, in less than 5 Minutes time. The output html file can then be browsed from any location, using a local webserver or an internet www domain. Usage Examples: (Type them on Terminal) cd ~/Downloads/tabulate # location chmod +x *.sh cat "student_marks.csv" | { cat ; echo ; } | ./tabulate.sh -d "," -t "My School" -h "First Term" > "marks.html" # or > "/var/www/html/marks.html" -d specifies...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 19
    Live CD With Zerofree Utility x86 32Bit

    Live CD With Zerofree Utility x86 32Bit

    A Custom Puppy Linux Live CD With Zerofree Utility x86 32Bit

    After Booting with this Live CD, just click on the MOUNT Application icon on the top of the Desktop, then click the Mount Button that is besides the CDROM entry only, to open its folder contents, then Right Click the zerofree.sh file and Choose the "Window" -> "Terminal Here" option and then type ./zerofree.sh and press Enter Key on the Terminal and follow the instructions shown on the terminal. As you may be aware, Booting with a Live CD, requires that you need to change the Boot Order...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 20
    try

    try

    Inspect a command's effects before modifying your live system

    Try is a Linux command-line utility that lets users run a command and inspect its effects before deciding whether to commit those changes to the live system. It works by using Linux namespaces through unshare together with overlay-based filesystem techniques so that commands can execute in an isolated view of the system rather than directly modifying the host environment immediately. This makes it useful for experimenting with package installation, system changes, and other shell commands...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Bank Vaults

    Bank Vaults

    K8s operator, Go client with automatic token renewal

    The Vault Swiss Army knife, which makes enterprise-grade security attainable on Kubernetes. It has many 'blades' that cut through the security problem: the Bank-Vaults operator provides automation; a Go client with automatic token renewal that provides dynamic secret generation, multiple unseal options, and more; a CLI tool to initialize, unseal and configure Vault with authentication methods and secret engines; and direct secret injection into Pods to reduce the attack surface. Automates...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    dirsearch

    dirsearch

    Web path scanner

    An advanced command-line tool designed to brute force directories and files in webservers, AKA web path scanner. Wordlist is a text file, each line is a path. About extensions, unlike other tools, dirsearch only replaces the %EXT% keyword with extensions from -e flag. For wordlists without %EXT% (like SecLists), -f | --force-extensions switch is required to append extensions to every word in wordlist, as well as the /. To use multiple wordlists, you can separate your wordlists with commas....
    Downloads: 18 This Week
    Last Update:
    See Project
  • 23
    Command Line

    Command Line

    Your Personal Hacking Terminal.

    Command Line is an Open-Source Software for Pentesters and Ethical Hackers it contains many Functionalities which helps Ethical Hackers. It is CLI Based Application use for checking Networks and IP's it also supports functionalities like downloading Packages from Internet Including YouTube.It is also used for Port scanning, IP-Finding it is also useful for checking ping and net speed with the functionality of scanning the net speed by selecting the best server. It also has Host IP finding...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 24
    XSIBackup-Classic

    XSIBackup-Classic

    Local and over IP backups for ©VMWare ©ESXi 5.1 to 6.7

    VMWare backup and replication for ESXi vSphere virtual machines to datastore or differential over IP. No agents, self capable, runs in the hypervisor host, ESXi 5.1, ESXi 5.5 & ESXi <=6.7 compatible, hot backups. Consists in a cron programmable service running in the hypervisor. Hot backups, fully functional, standalone, ideal for dedicated servers. Full version supports quiescing, differential backup, deduplication and much more... Download link:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    reg

    reg

    Docker registry v2 command line client and repo listing generator

    Docker registry v2 command line client and repo listing generator with security checks. We do not allow users to pass all the custom certificate flags on commands because it is unnecessarily messy and can be handled through Linux itself. Which we believe is a better user experience than having to pass three different flags just to communicate with a registry using self-signed or private certificates.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB