Showing 12 open source projects for "network security"

View related business solutions
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place. Icon
    Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place.

    For healthcare Providers and Facilities

    Incredable streamlines and simplifies the complex process of medical credentialing for hospitals and medical facilities, helping you save valuable time, reduce costs, and minimize risks. With Incredable, you can effortlessly manage all your healthcare providers and their credentials within a single, unified platform. Our state-of-the-art technology ensures top-notch data security, giving you peace of mind.
    Learn More
  • 1
    UDPStressTest

    UDPStressTest

    A Desktop app for network stress testing, TCP-Ping and icmp ping.

    ... * You can see your machine IP Address, gateway, subnet mask. * You can ping any ip address you want and get measure of TTL. * It gets the available range of IP's in your local network. * When you start the test you see testing throughput as a graph against time also total size of packet sent in (MB). *You can use it as DOS attack tool. *Every action done on the app is logged in XML file as data source (only stress test + ping). *TCP-Ping is a perfect way to discover network devices which active firewall to ignore ping packets or you can use it as TCP port scanner to check your network security. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    MV2
    There are a lot of tools and plugins to fix security issues of the dignified mail system. The goal of this project is to redefine a system that takes the problems of our time into account. Be sure to visit this project on github: https://github.com/mv2project/mv2
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    AVAYA CMS API Server

    AVAYA CMS API Server

    CMS API Server with web site

    Free version of AVREMO.CMS.API exposing REST Services. With this software you can browse for all CMS reports. Design a report with AVAYA CMS Supervisor designer, application automatically expose data as XML or JSON. You can also browse reports with your preferred browser (desktop or mobile) and execute CMS operations like modify dictionaries, modify agent skills, modify VDN/Vector associations and more. Application package include : - A responsive WEB server interface (compatible...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    MRelay

    Host to Host Network Acceleration and Encryption

    MRelay splits and distributes the traffic of a single TCP connection to several connections and merges the data at the other end. Using this approach, it is possible to achieve high throughput between two points on the network regardless of the delay between two points. MRelay can optionally encrypt the data and exchange some http headers before the relay process to make the traffic look like a regular http file download. This can be used to overcome the highly restrictive firewalls that are...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Network Management Software and Tools for Businesses and Organizations | Auvik Networks Icon
    Network Management Software and Tools for Businesses and Organizations | Auvik Networks

    Mapping, inventory, config backup, and more.

    Reduce IT headaches and save time with a proven solution for automated network discovery, documentation, and performance monitoring. Choose Auvik because you'll see value in minutes, and stay with us to improve your IT for years to come.
    Learn More
  • 5
    Toes Online is a person registration and management system which can be used by organisations to registrate members. It is a powerful tool with many features, including e-mailing, grouping and financial tools, with much focus on security and easy usage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    TWIT SYSLOG

    TWIT SYSLOG

    A free SYSLOG Client

    This is a free syslog client. Available in multiple languages Feel free to request features to client by making a ticket.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    RawPacketSuite

    A suite to forge network packets or use preexisting utilities

    This is a suite for multiple network packets to be used in their raw format in an easy to use graphical interface. It gives you the opportunity to send arp, icmp etc requests and also some utilities like a listener to map ip's and MAC addresses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Distributed Document/Media Management System (Client Server). Centrally manages files Offers Version Control, Labels/Tags, User Security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This is a VNC Administration application that uses active directory security groups and credentials matched against a SQL database to decide what computers an end user can connect too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • All-in-one security tool helps you prevent ransomware and breaches. Icon
    All-in-one security tool helps you prevent ransomware and breaches.

    SIEM + Detection and Response for IT Teams

    Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
    Learn More
  • 10
    X10 Server for controlling X10 devices and an X10 Client for connecting to the X10 Server allowing user create/edit devices remotely in their home and control these devices remotely all over a secure channel using DES and Public key cryptography methods.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Ano (Anonymous Network Overlay) is a decentralized IP router based on relaying principle. In Ano all IP traffic is anonymized, including TCP, UDP, ICMP and DNS protocols. Each node acts as a relay and NAT for external traffic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Seagull is a peer to peer network client software that allows user to communicate and share files over secure connections and secure peer to peer identification and handshaking.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next