Showing 20 open source projects for "silont-kernel-onclite"

View related business solutions
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1
    Fast and transparent file system and swap encryption package for linux. No source code changes to linux kernel. Works with 7.x, 6.x, 5.x, 4.x, 3.x, 2.6, 2.4, 2.2 and 2.0 kernels.
    Downloads: 17 This Week
    Last Update:
    See Project
  • 2
    stegfs is a steganographic file system in userspace. It uses the FUSE module which allows it to be incorporated into more than just the Linux Kernel, i.e. it's also known to work in FreeBSD :) For more details visit: https://albinoloverats.net/projects/stegfs
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    GoldBug - Encrypted Communications

    GoldBug - Encrypted Communications

    Chat Messenger. E-Mail-Client. Websearch. Filetransfer.

    GoldBug is a decentralized & secure communication suite that offers an integrated e-mail client, an instant messenger & a file transfer. Also included is an URL-RSS-DB & a p2p web search. Current vers. w/ McEliece Algorithm. GoldBug has been 2013 - 2023 ten years just another Graphical User Interface of the Spot-On Encryption Suite. Main GUI features: Minimal & colorful Interface with Tabs in the East. Microsoft & Qt MinGW deprecated Win32 & for Compiling: ●...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 4

    rtl2832-entropyd

    Use an rtl2832 USB dongle to generate random data for the linux kernel

    ...The kernel already has a module to use the rtl2832 for its intended purpose, listening to radio, so if you want to use it to generate entropy, you will have to blacklist that module, so it doesn't load. If it is loaded, this program will not be able to acquire the rtl2832 device, and won't run. Create the file /etc/modprobe.d/blacklist-dvb_usb_rtl28xxu.conf with the line blacklist dvb_usb_rtl28xxu in it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    A Linux port of the OpenBSD/FreeBSD Cryptographic Framework (OCF). This port aims to bring full asynchronous HW/SW crypto acceleration to the Linux kernel, OpenSwan, OpenSSL and applications using DES, 3DES, AES, MD5, SHA, PublicKey, RNGs and more.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6

    Rockhopper VPN software

    IPsec / IKEv2-based VPN software for Linux.

    ...This software is interoperable with Windows 7, Windows 8 and Windows 10 VPN clients and it provides a handy AJAX-based Web console to manage Secure Virtual Ethernet(LAN), Routing-based VPN, Remote Access VPN and servers protected by IPsec. No kernel modules are needed. The ESP protocol stack is also implemented in user space.
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    AttackVector Linux

    AttackVector Linux

    linux distro for anonymized penetration based on Kali and TAILS

    AttackVector Linux is a new distribution for anonymized penetration and security. It is based on Kali and TAILS, which are both based on Debian. While Kali requires a modified kernel for network drivers to use injection and so forth, the Tor Project's TAILS is designed from the bottom up for encryption, and anonymity. Nmap can't UDP via Tor. The intention of AttackVector Linux is to provide the capability to anonymize attacks while warning the user when he or she takes actions that may compromize anonymity. The two projects have different design philosophies that can directly conflict with one another. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Kernel drivers and support ports to use "Trusted Platform Modules" on FreeBSD and OpenBSD
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    EverCrack cryptanalysis engine. The goal is cryptanalysis of any class of cipher. The focus now is the kernel - cryptanalysis of unilateral monalpha substitution ciphers extremely quickly, and later, cryptanalysis of complex ciphers for the kernel.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    Cryproc is module for the Linux kernel 2.6 which allows user space programs to access the kernel's CryptoAPI functions via a file called "cryproc" created in the /proc filesystem.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Development area for GNU/Linux 2.6.x for the KS8695 ARM SoC. Covers kernel patches, drivers for serial, Ethernet, PCI, GPIO, watchdog subsystems, and drivers for optional PCI based devices such as USB, WiFi, WiMAX, IPSec, SSL, and RSA devices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Qryptix consists of a PAM object and utilities for session- and key-management for encrypted home directories using the International Kernel (CryptoAPI) patches for Linux. It simplifies login/logout, mounting/unmounting, and key generation and changing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    OS based on Agent based Security with a new type of split kernel and agents platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Get your files crypted in easy way, absolutely non-painful. For Linux kernel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    stands for Active Integrity Software, provide quick alert of elf file modifications. Based on Gnu/Linux OS, with a daemon to analyse datas give by the kernel module, written in C.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    CryptoAPI adds a framework for cryptography to the GNU/Linux kernel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The Entropy Gathering Daemon is a portable perl script which provides a source of randomness on systems that lack an in-kernel /dev/random. GnuPG, OpenSSH, and the OpenSSL toolkit can use EGD to seed their random number generators.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18
    RSA-IP is a Linux kernel net _protocol_ which encrypts IPv[4;6] using RSA public/private key.Think of it as a kernel level implementation of ssl. RSA needs prime number so we release a prime searcher.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The Linux Transparent Encryption project aims for integrating transparent read/write access to encrypted data into the linux kernel. This enables any application to use encrypted data without modifying the application itself.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    How to set up a Linux system to use encryption in disk and network accesses. This document describes how you can use the International Kernel Patch and other packages to make harddisk contents and network traffic inaccessible to others by encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB