9 projects for "security tools" with 2 filters applied:

  • Application Monitoring That Won't Slow Your App Down Icon
    Application Monitoring That Won't Slow Your App Down

    AppSignal's Rust-based agent is lightweight and stable. Already running in thousands of production apps.

    Full APM with errors, performance, logs, and uptime monitoring. 99.999% uptime SLA on the platform itself.
    Start Free
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 1
    PHP: The Right Way

    PHP: The Right Way

    An easy-to-read, quick reference for PHP best practices

    ...Maintained by developers and contributors worldwide, the project aims to help programmers follow established coding standards and avoid outdated or insecure PHP practices. The repository serves as the source for the website PHP: The Right Way, which compiles recommendations, tools, and resources for learning and improving PHP development techniques. It covers essential topics such as coding style, dependency management, error handling, security, and testing, emphasizing modern PHP features and ecosystem tools. The project encourages developers to adopt frameworks, libraries, and patterns that align with current community conventions. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    Self Hosting Guide

    Self Hosting Guide

    Learn all about locally hosting (on premises & private web servers)

    The Self Hosting Guide repository is a comprehensive, community-curated handbook for individuals and teams who want to deploy and manage their own self-hosted services — from applications and infrastructure to networking and security. It covers conceptual guidance on why self-hosting can be advantageous (e.g., privacy, control, cost savings) as well as detailed, actionable instructions on setting up popular services such as web servers, media servers, home automation stacks, VPNs, backups, and monitoring tools. Throughout the guide, best practices for hardening, maintenance, and uptime are emphasized, helping users avoid common pitfalls and adopt resilient architectures. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    OWASP Juice Shop

    OWASP Juice Shop

    Probably the most modern and sophisticated insecure web application

    OWASP Juice Shop is probably the most modern and sophisticated insecure web application! It can be used in security trainings, awareness demos, CTFs and as a guinea pig for security tools! Juice Shop encompasses vulnerabilities from the entire OWASP Top Ten along with many other security flaws found in real-world applications! Juice Shop is written in Node.js, Express and Angular. It was the first application written entirely in JavaScript listed in the OWASP VWA Directory. ...
    Leader badge
    Downloads: 269 This Week
    Last Update:
    See Project
  • 4
    Kubernetes The Hard Way

    Kubernetes The Hard Way

    Bootstrap Kubernetes the hard way

    Kubernetes The Hard Way is a hands-on guide to building a Kubernetes cluster from the ground up without using automation tools—no managed services, no scripts to hide the details. It walks you through every component: provisioning compute resources, generating TLS certificates, configuring etcd, bootstrapping the control plane, joining worker nodes, setting networking, and verifying everything works. The purpose is educational: by doing each step manually, you gain deep insight into how...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • 5
    ElateXam is a complete toolsuite for electronic exams. It includes several task types (multiple choice, cloze texts, free texts, mapping, drawing, autotool), correction tools, analysis and export features. It's used at the university of Leipzig.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    The kernel network stack may behave not as expected, especially in the case of receiving packets. With Ianus it is possible to bypass the kernel network stack and to develop your own network stack in user space or other tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    CryptoHelper is a Java program designed to aid in the decryption of classical ciphers, ie pre WWII ciphers. It brings together tools like frequency analysis, friedman tests, enciphering/deciphering for several clasical ciphers, and brute force algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    NAC is a collection of tools for cryptography. The goal is to provide simple-to-use crypto tools (like an OTP, String and number generator, public key algorithm...) you can use under Linux, Windows...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Single-honeypot is a powerfull tool, for security interest about the estudies of techniques of breaking systems. This is, a singular or little honeypot for test your networks for hostiles visitors. This made in perl script. Simulate different servi
    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB