Showing 46 open source projects for "server security system"

View related business solutions
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    SafeLine

    SafeLine

    Serve as a reverse proxy to protect your web services from attacks

    SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits. A web application firewall helps protect web apps by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web apps from attacks such as SQL injection, XSS, code injection, os command injection, CRLF injection, LDAP injection, XPath injection, RCE, XXE, SSRF, path traversal, backdoor, brute force, HTTP-flood, bot abuse, among others. By...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    Ghidra

    Ghidra

    Ghidra is a software reverse engineering (SRE) framework

    Ghidra is a free and open-source reverse engineering framework developed by the NSA for analyzing compiled software. It supports a wide array of instruction sets and executable formats, offering features such as decompilation, disassembly, scripting, and interactive graphing. Designed for security researchers and analysts, Ghidra provides a robust environment for understanding malware, auditing code, and performing software forensics. It includes both GUI-based and headless analysis modes.
    Downloads: 906 This Week
    Last Update:
    See Project
  • 3

    System Hardening Benchmark

    System Hardening Compliance Auditor

    This tool simulates a security compliance audit, checking system configurations against a defined benchmark (e.g., DISA STIG or CIS).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    PVPLE
    VPLE (Linux) Vulnerable Pentesting Lab Environment VPLE is an Intentionally Vulnerable Linux Virtual Machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing Labs. In VPLE bunch of labs are Available. NOTE:- "Only run in VMWare Pls Don’t run in VirtualBox" Will also run on the ProxMox server to understand how to do it pls refer to the doc in the zip named "Cybersecurity Lab Deployment on Proxmox" The default login and password is administrator: password. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 5
    S2OPC - Safe & Secure OPC UA

    S2OPC - Safe & Secure OPC UA

    An Open Source Safe & Secure OPC UA stack

    Open-source Safe and Secure OPC UA Toolkit designed with embedded devices in mind (see https://www.s2opc.com). Its demo server is certified by the OPC Foundation and CSPN(-BSZ).
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    justniffer
    justniffer is a TCP sniffer. It reassembles and reorders packets and displays the tcp flow in a customizable way. It can log network traffic in web server log format. It can also log network services performances (e.g. web server response times) and extract http content (images, html, scripts, etc)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    BunkerWeb

    BunkerWeb

    Next-generation and open-source Web Application Firewall (WAF).

    Being a full-featured web server (based on NGINX under the hood), it will protect your web services to make them "secure by default". BunkerWeb integrates seamlessly into your existing environments (Linux, Docker, Swarm, Kubernetes, …) and is fully configurable (don't panic, there is an awesome web UI if you don't like the CLI) to meet your own use-cases . In other words, cybersecurity is no more a hassle.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 8
    BerserkArch

    BerserkArch

    A bleeding-edge, security-centric Arch-based Linux distribution.

    BerserkArch is a security-focused, performance-tuned Linux operating system (OS) based on Arch Linux, designed for developers, hackers, and technical users. A bleeding-edge, security-centric Arch-based Linux distribution crafted for hackers, developers, and nerds alike. Following the Arch Linux philosophy, it is designed to be highly customizable, allowing users to build their environment with only the components they need, rather than having a lot of pre-installed software like some other security distributions (e.g., Kali Linux). ...
    Leader badge
    Downloads: 32 This Week
    Last Update:
    See Project
  • 9
    Scalytics Open Intelligence - OSINT

    Scalytics Open Intelligence - OSINT

    Open OSINT stack for monitoring, analysis, and risk detection

    ...It is a packaged operational stack with a web interface, a Go-based collector runtime, configurable ingestion and refresh cadence, Docker-first deployment, and local or server installation options. The public release removes non-public and protected integrations while preserving the pipeline structure and deployment model that make the system usable in practice. EUOSINT is built for teams that need continuous monitoring, reproducible installs, and a base they can extend for their own intelligence and security workflows.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 10
    MalbianLinux

    MalbianLinux

    GNU/Linux Distribution for Malware Analysis and Reverse Engineering.

    Malbian is a Light-weight Debian Based GNU/Linux Distribution for Malware Analysis and Reverse Engineering designed to aid the user in both Static and Dynamic analysis of malware samples. 100% Free to use and distribute. About: https://github.com/MalbianLinux Installation Guide in: https://github.com/MalbianLinux/Malbian-ISOs/
    Downloads: 9 This Week
    Last Update:
    See Project
  • 11

    Thunderbird Free Scanner

    Thunderbird Anti Virus Online Free Scanner

    What is Thunder Anti-Virus Free Scanner? Experience the scanning capabilities of Thunder Anti-Virus Free Scanner through this fully free portable scanner. Designed for user convenience, this software requires no installation; simply download the file, extract it, and run it on any Windows PC to safeguard your system against potential threats. Included Scan Options Thunder Anti-Virus Free Scanner includes a comprehensive system scan. This option allows you to thoroughly scan your...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 12
    Knife Fishmonger
    KFishMonger O anonimato em primeiro lugar Build Status Enquanto a sociedade evolui, a liberdade se apaga, KFishMonger é uma solução para um cenário perverso, permite. Automação em montagem de ambientes anônimos Um projeto para se discutir e evoluir o anonimato ✨MNONIMATO✨ Recursos Automação em inicialização de VPN Montagem automática de serviços TOR Configuração de DNSCrypt Layout moderno para monitorar o ambiente De fácil...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    BypassHash

    BypassHash

    This tool downloads an executable and bypasses hash-based virus checks

    This tool downloads an executable, ELF (Linux) and PE (Windows), modify metadata to bypasses hash-based virus checks and protect against identification with metadata (like rich headers, timestamps, ...).
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14
    FileSentinel

    FileSentinel

    Simple Python file integrity checker for defensive security

    FileSentinel is an open-source Python tool that helps users monitor folders for unexpected file changes. It creates a baseline using SHA-256 hashes and later compares the folder against that baseline to detect added, modified, and deleted files. It is designed as a beginner-friendly defensive security utility for students, small offices, and anyone learning basic file integrity monitoring.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    Passive-Network-Scan-L2/3

    Passive network discovery tool focused on Layer 2 and Layer 3 packets

    Passive-Network-Scan-L2/3 is a lightweight, passive network discovery tool that listens on a network interface in promiscuous mode and collects Layer 2 and Layer 3 signalling (ARP, STP, DHCP, mDNS, SSDP). It aggregates discovered hosts by MAC address, attempts to measure passive RTTs for request/response protocols, maintains per-protocol RTT histories and simple service hints, and can emit structured events and a final table in JSON or CSV formats.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 16
    Full Stack Computer Scanner

    Full Stack Computer Scanner

    Scans the entire computer device stack (hardware, software, comms)

    The Full Stack Computer Scanner is a read-only Windows freeware security diagnostics app for computer platform awareness. No ads. No accounts. No data collection. Fully offline. Complements AVs by scanning for hardware, software, network integrity, and dangerous malware signatures. Only binaries from this official SourceForge project page are legitimate. Other hosting, web, cloud, virtualization, or “run online” instances are unauthorized. Trust your vendors but verify with the Full Stack...
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 17
    VerifyVault

    VerifyVault

    A private, secure, and open source 2 factor authenticator for Windows

    VerifyVault is a free and open source 2-Factor Authenticatior for Windows and Linux. The objective of this project is to provide users with a private and transparent 2FA application to secure their accounts. Although this application is in early development, the aim is to provide the most secure 2FA application for users on Windows and Linux.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    Stegcore

    Stegcore

    A cross-platform crypto-steganography toolkit

    Stegcore combines cryptography and steganography to hide encrypted data inside ordinary files. It encrypts your payload before embedding it, so the hidden content is unreadable even if someone extracts it, and invisible to anyone who doesn't know it's there. Unlike basic steganography tools that hide data without encrypting it, Stegcore ensures the payload is cryptographically protected at rest. Unlike pure encryption tools, the payload isn't even visible. Designed for journalists,...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19

    Network Enumeration Tool

    Network Enumeration Tool for Host Exploration and Recon

    N-ETHER (Network Enumeration Tool for Host Exploration and Reconnaissance) is a robust and highly automated Python script designed to streamline the critical initial phases of network security auditing and penetration testing. It’s core purpose is to perform fast, comprehensive, and consistent host and port discovery across single targets or large lists of IP addresses. N-ETHER functions as an intelligent, opinionated wrapper around the powerful nmap tool, bundling best-practice scanning...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 20

    AsyncPortScanner

    Cross-platform asynchronous port scanner written in Nim.

    Fast cross-platform asynchronous port scanner written in Nim.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Ultramarker

    Ultramarker

    Ultramarker assessment criteria, marking and report generation system

    Is a Windows (and Linux) based application that allows educators and assessors to design criteria based assessment rubrics. It specifically allows generic feedback to be defined based upon common errors and individualised feedback. Grading schema can be easily designed to define levels of achievment or compliance to standards . Multiple weighted criteria can be included in the assessment and the same criteria used for multiple sessions. Sessions may be used to assess typically laboratory...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 22
    Phish Alert  Button for Outlook

    Phish Alert Button for Outlook

    Free Outlook plugin to report phishing emails with one click

    The Phish Alert Button for Outlook is a free add-in that allows users to report suspected phishing emails directly from their inbox with a single click. Once installed, it adds a button to the Outlook ribbon, enabling employees to forward suspicious messages to a predefined mailbox such as your SOC or IT security team. This lightweight plugin helps organizations improve phishing detection by encouraging user participation in threat reporting. It integrates smoothly with Outlook 2013 and...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23

    Secure VPC Network Generator

    Secure VPC Network Generator

    Deploys a secure VPC on AWS with public/private subnets using Terraform. This tool provides a calculator and generator for AWS VPC Terraform configurations. It allows you to quickly scaffold a secure VPC with multiple subnets. Quick Start To use this tool, run the generator: bash # Generate a VPC with 3 subnets python lab_runner.py vpc-gen --cidr 10.10.0.0/16 --subnets 3 --output my_vpc.tf
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    HardenLinux

    Shell Script to Harden Default Values in Linux Distributions

    HardenLinux is a shell script designed to harden default values in Linux distributions and assist with malware removal. With root permissions, it can perform many tasks listed in a menu. As a script, HardenLinux is highly documented and easy to comprehend.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    cardionet

    cardionet

    A beautiful, modern Terminal User Interface (TUI) for nmap

    CardioNet simplifies network scanning by providing an intuitive graphical interface for nmap, making it accessible to both beginners and advanced users. Build complex scanning commands visually, execute them in real-time, and export results in multiple formats.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB