Showing 40 open source projects for "usb security software"

View related business solutions
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 1
    Prowler

    Prowler

    An open source security tool to perform AWS security assessment

    Prowler is an Open Source security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening, and forensics readiness. It contains more than 200 controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks. Prowler is a command-line tool that helps you with AWS security assessment, auditing, hardening, and incident response. It follows guidelines of the CIS Amazon Web Services...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    Toolbx Linux

    Toolbx Linux

    Tool for interactive command line environments on Linux

    Toolbx is a tool for Linux, which allows the use of interactive command line environments for development and troubleshooting the host operating system, without having to install software on the host. It is built on top of Podman and other standard container technologies from OCI. Toolbx environments have seamless access to the user's home directory, the Wayland and X11 sockets, networking (including Avahi), removable devices (like USB sticks), systemd journal, SSH agent, D-Bus, limits, /dev and the udev database, etc. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    cargo-crev

    cargo-crev

    A cryptographically verifiable code review system for the cargo

    A cryptographically verifiable code review system for the cargo (Rust) package manager. cargo-crev is an implementation of Crev as a command-line tool integrated with cargo. This tool helps Rust users evaluate the quality and trustworthiness of their package dependencies. Crev is a language and ecosystem agnostic, distributed code review system. Use reviews produced by other users. Increase the trustworthiness of your own code. Build a web of trust of other reputable users to help verify the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    aws-encryption-sdk-cli

    aws-encryption-sdk-cli

    CLI wrapper around aws-encryption-sdk-python

    This command line tool can be used to encrypt and decrypt files and directories using the AWS Encryption SDK. If you have not already installed cryptography, you might need to install additional prerequisites as detailed in the cryptography installation guide for your operating system. Installation using a python virtual environment is recommended to avoid conflicts between system packages and user-installed packages. For the most part, the behavior of aws-encryption-cli in handling files is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    NextDNS

    NextDNS

    NextDNS CLI client (DoH Proxy)

    NextDNS protects you from all kinds of security threats, blocks ads and trackers on websites and in apps and provides a safe and supervised Internet for kids, on all devices and on all networks. Determine your threat model and fine-tune your security strategy by enabling 10+ different types of protections. Use the most trusted threat intelligence feeds containing millions of malicious domains, all updated in real-time. Go beyond the domain, we analyze DNS questions and answers on-the-fly (in...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 6
    Capslock

    Capslock

    Tool to remap Caps Lock key behavior on Windows systems

    ...Rather than detecting vulnerabilities, Capslock focuses on identifying capabilities — permissions implied by calls to sensitive or privileged standard library functions, such as file system access, networking, or process control. By following transitive call graphs, it classifies which security-sensitive operations each package can reach, giving developers visibility into what their dependencies are capable of doing. This helps apply the Principle of Least Privilege to Go software, guiding audits, supply chain reviews, and trust assessments. Capslock aims to make security posture analysis more proactive by surfacing capability-based risk signals before malicious or overly powerful code is introduced into production.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    Google Apps Manager

    Google Apps Manager

    Command line management for Google G Suite

    Google Apps Manager or GAM is a free and open source command line tool for Google G Suite Administrators that allows them to manage many aspects of their Google Apps Account quickly and easily. With GAM you can create and manage users, groups and domains; manage email, security and calendar settings; manage admins and organizations and many more. To use GAM Google Apps Business, Education, Partner or Government Edition is required.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 8
    testssl.sh

    testssl.sh

    Testing TLS/SSL encryption anywhere on any port

    testssl.sh is a free command-line tool that checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more. testssl.sh is free and open-source software. You can use it under the terms of GPLv2, please review the License before using it. Works for Linux, Mac OSX, FreeBSD, NetBSD and WSL/MSYS2/Cygwin out of the box, no need to install or configure something, no gems, CPAN, pip or the like. OpenBSD only needs bash to be...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 9
    kubeaudit

    kubeaudit

    kubeaudit helps you audit your Kubernetes clusters

    kubeaudit helps you audit your Kubernetes clusters against common security controls.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    react2shell-scanner

    react2shell-scanner

    High Fidelity Detection Mechanism for RSC/Next.js RCE

    react2shell-scanner is a security-oriented tool that bridges modern JavaScript (React) applications and shell scripting by auditing web front-ends for exposed interfaces that could be manipulated or controlled through command execution. It scans React codebases, identifies places where user input interacts with shell-executable contexts, and flags risky patterns that might lead to command injection, unvalidated arguments, or unsafe bindings between UI controls and underlying system actions....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    ggshield

    ggshield

    Detect and validate 500+ types of hardcoded secrets

    GitGuardian’s ggshield is an open-source command-line interface (CLI) tool designed to help developers and security teams detect hardcoded secrets and sensitive credentials early in the development process, either locally or in CI/CD pipelines. It scans source code, configuration files, commit history, and other artifacts to automatically detect hundreds of different secret types — such as API keys, tokens, and passwords — helping prevent accidental leaks before they reach version control or...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    agent-browser

    agent-browser

    Browser automation CLI for AI agents

    agent-browser is a toolkit that embeds AI agent capabilities directly into the web browser, enabling agents to interact with web content, scripts, and user actions while maintaining security boundaries that respect user privacy and browser constraints. It effectively provides a sandbox where AI agents can read, scroll, click, and interpret pages in context, allowing them to automate workflows, answer questions about page content, or generate structured summaries directly from the user’s...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 13
    Claude Code Templates

    Claude Code Templates

    CLI tool for configuring and monitoring Claude Code

    Claude Code Templates is a popular open-source CLI tool and template ecosystem designed to streamline how developers work with Anthropic’s Claude Code by providing a rich catalog of ready-to-use code templates, AI agents, custom commands, settings, hooks, and external integrations that can be installed interactively or via the command line. It lets you quickly scaffold domain-specific AI agents (like security auditors, performance optimizers, or database architects), fill in consistent...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    MTKRoot

    MTKRoot

    MTKroot 3 – Root Tool for MediaTek (MTK) Devices

    MTKroot 3 is an open-source tool designed to simplify the process of obtaining root access on Android devices powered by MediaTek (MTK) chipsets. Developed with a focus on compatibility and ease of use, this tool provides advanced users and developers with the ability to unlock their device's full potential, enabling custom ROM installations, system-level modifications, and deeper control over the Android OS.
    Leader badge
    Downloads: 212 This Week
    Last Update:
    See Project
  • 15

    ProxyCrypt

    Encrypted volumes through command line

    ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. See the features below. It works as a "proxy" for the AIM driver or the ImDisk driver. AIM driver is included in the full package. See the documentation for more informations...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    SiteOne Crawler (desktop app)

    SiteOne Crawler (desktop app)

    A free, feature-rich web analyzer and exporter/cloner you will love!

    A free in-depth website analyzer providing audits of security, performance, SEO, accessibility and other technical aspects. Available as a desktop application for Windows/macOS/Linux and as a CLI tool for advanced users and CI/CD processes. It also includes an offline web page exporter (website clone, mirror).
    Downloads: 6 This Week
    Last Update:
    See Project
  • 17
    TraceMAC - Traceroute for MAC addresses

    TraceMAC - Traceroute for MAC addresses

    TraceMAC is a command-line Layer 2 traceroute for Cisco switches

    TraceMAC is a Windows/Linux command-line tool that allows you to trace a specific MAC address thru Cisco switches. It works by connecting to a switch using SSH, SNMP, Telnet, HTTP or HTTPS and do some "show commands" and later process the output, this will happen recursively until it finds the switch where that MAC address (PC/Printer/Etc) is directly connected. Note: It works with Cisco switches only and you must have CDP enabled at least on trunks/links between switches! Is tested...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 18
    Cherrybomb

    Cherrybomb

    Cherrybomb is a CLI tool that helps you avoid undefined user behaviour

    Cherrybomb is an CLI tool written in Rust that helps prevent incorrect code implementation early in development. It works by validating and testing your API using an OpenAPI file. Its main goal is to reduce security errors and ensure your API functions as intended. Cherrybomb makes sure your API is working correctly. It checks your API's spec file (OpenAPI Specification) for good practices and makes sure it follows the OAS rules. Then, it tests your API for common issues and vulnerabilities....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    command-output-to-html-table

    command-output-to-html-table

    A shell script to convert any file or command output into a html table

    Please watch the video below, to convert any file or a command output into a nice html table, in less than 5 Minutes time. The output html file can then be browsed from any location, using a local webserver or an internet www domain. Usage Examples: (Type them on Terminal) cd ~/Downloads/tabulate # location chmod +x *.sh cat "student_marks.csv" | { cat ; echo ; } | ./tabulate.sh -d "," -t "My School" -h "First Term" > "marks.html" # or > "/var/www/html/marks.html" -d specifies...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 20
    Live CD With Zerofree Utility x86 32Bit

    Live CD With Zerofree Utility x86 32Bit

    A Custom Puppy Linux Live CD With Zerofree Utility x86 32Bit

    After Booting with this Live CD, just click on the MOUNT Application icon on the top of the Desktop, then click the Mount Button that is besides the CDROM entry only, to open its folder contents, then Right Click the zerofree.sh file and Choose the "Window" -> "Terminal Here" option and then type ./zerofree.sh and press Enter Key on the Terminal and follow the instructions shown on the terminal. As you may be aware, Booting with a Live CD, requires that you need to change the Boot Order...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 21
    Bank Vaults

    Bank Vaults

    K8s operator, Go client with automatic token renewal

    The Vault Swiss Army knife, which makes enterprise-grade security attainable on Kubernetes. It has many 'blades' that cut through the security problem: the Bank-Vaults operator provides automation; a Go client with automatic token renewal that provides dynamic secret generation, multiple unseal options, and more; a CLI tool to initialize, unseal and configure Vault with authentication methods and secret engines; and direct secret injection into Pods to reduce the attack surface. Automates...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Command Line

    Command Line

    Your Personal Hacking Terminal.

    Command Line is an Open-Source Software for Pentesters and Ethical Hackers it contains many Functionalities which helps Ethical Hackers. It is CLI Based Application use for checking Networks and IP's it also supports functionalities like downloading Packages from Internet Including YouTube.It is also used for Port scanning, IP-Finding it is also useful for checking ping and net speed with the functionality of scanning the net speed by selecting the best server. It also has Host IP finding...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 23
    XSIBackup-Classic

    XSIBackup-Classic

    Local and over IP backups for ©VMWare ©ESXi 5.1 to 6.7

    VMWare backup and replication for ESXi vSphere virtual machines to datastore or differential over IP. No agents, self capable, runs in the hypervisor host, ESXi 5.1, ESXi 5.5 & ESXi <=6.7 compatible, hot backups. Consists in a cron programmable service running in the hypervisor. Hot backups, fully functional, standalone, ideal for dedicated servers. Full version supports quiescing, differential backup, deduplication and much more... Download link:...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24

    PlaylistForVolvo

    Playlist generator for Volvo cars

    Command line tool for Windows platform to generate playlists (m3u) for every folder on USB drive. Useful for Volvo cars. Playlists are gererated for first 2 levels of folder structure. Playlist names are generated by rule: 1. first level - _<folder name> 2. second level - <first 3 letters of root folder name>. <folder name> Playlist for folder contains all audio files in folder subtree. Recommended folder organization: 1. first level - genres 2. second level -...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 25
    reg

    reg

    Docker registry v2 command line client and repo listing generator

    Docker registry v2 command line client and repo listing generator with security checks. We do not allow users to pass all the custom certificate flags on commands because it is unnecessarily messy and can be handled through Linux itself. Which we believe is a better user experience than having to pass three different flags just to communicate with a registry using self-signed or private certificates.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB