Showing 17 open source projects for "security"

View related business solutions
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • 1
    Arduino IDE

    Arduino IDE

    Arduino IDE library

    ...This new IDE was developed with the goal of preserving the same interface and user experience of the previous major version in order to provide a frictionless upgrade. If you need assistance, see the Help Center and browse the forum. If you think you found a vulnerability or other security-related bug in this project, please read our security policy and report the bug to our Security Team. The builds are generated every day at 03:00 GMT from the main branch and should be considered unstable.
    Downloads: 554 This Week
    Last Update:
    See Project
  • 2
    HttpKernel Component

    HttpKernel Component

    A structured process for converting a Request into a Response

    ...Your job as a developer is to create PHP code that reads the request information (e.g. the URL) and creates and returns a response (e.g. an HTML page or JSON string). Typically, some sort of framework or system is built to handle all the repetitive tasks (e.g. routing, security, etc) so that a developer can build each page of the application. Exactly how these systems are built varies greatly. The HttpKernel component provides an interface that formalizes the process of starting with a request and creating the appropriate response. The component is meant to be the heart of any application or framework, no matter how varied the architecture of that system.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3

    eNFC

    embedded NFC

    A small and simple Java API to read and write NFC cards. It supports mifare cards and PN 532 chips. This library works with RS232. More details: http://blog.sibvisions.com/2012/12/23/new-project-embedded-nfc/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    USB Gadget Tool

    USB Gadget Tool

    Convert your Android phone to any USB device you like

    ...Connected USB hosts (e.g. a normal computer) will then identify your Android device only under that role. It can also be used to deactivate the standard USB Gadget (including mtp, adb, etc.), e.g. for security reasons.
    Downloads: 34 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 5

    Spectrator

    Utility for manipulate predictor and L1 policy MSR

    Simple utility for control CPU IA32_SPEC_CTRL /IA32_PRED_CMD/IA32_FLUSH_CMD When active Windows Spectre Protection write in MSR IA32_SPEC_CTRL incorect!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    jKPU

    Cryptoprocessor design and documentation

    A cryptoprocessor is a processor that does not do or use any encryption or decryption (thus escapes US export controls), but which works natively on encrypted data and code. Almost any encryption is possible, including "none at all". The trick is that a computer famously and happily takes garbage in and puts garbage out, just as happily as it does "2+2=4", so all we have to do is change our OWN idea of what is garbage and what is sense and the computer will remain happy but we then have a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    USB Rubber Ducky

    USB Rubber Ducky

    A human interface device programmable

    The USB Rubber Ducky is a Human Interface Device programmable with a simple scripting language allowing penetration testers to quickly and easily craft and deploy security auditing payloads that mimic human keyboard input. The source is written in C and requires the AVR Studio 5 IDE from atmel.com/avrstudio. Hardware is commercially available. Imagine plugging in a seemingly innocent USB drive into a computer and installing backdoors, exfiltrating documents, or capturing credentials. With a few well crafted keystrokes anything is possible. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 8
    Automate the management of Cisco switches out-of-band (OOB) for extra security and reliability. Uses serial ports; version 2 is thread-safe and supports multiple switches.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    fprint aims to plug a gap in the open source desktop, by providing support for consumer fingerprint scanners as standard.
    Downloads: 3 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 10
    Strokey is a small hardware keyboard logger saving all keystrokes into an EEPROM memory for later investigation. The device may get attached to any PS/2-keyboard by intercepting the cable, or get placed directly inside for maximum invisibility.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    This is a library for easy accessing chip cards /smart cards via a chipcard reader. It currently works under Linux, FreeBSD and Windows. It is tested with Towitoko and Kobil readers.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    BlowfishVHDL - free fully synthesizable Blowfish encryption algorithm hardware implementation.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The first true nanokernel for x86 that gives a unix prompt on a real bourne shell in respect of all security rules!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Common Hardware Recovery Solutions by Ukrainian-Russian network
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Access Point Utilites for Unix - it's a set of utilites to configure and monitor Wireless Access Points under Unix using SNMP protocol. Utilites knownly compiles and run under Linux, FreeBSD, NetBSD, OpenBSD, MacOS-X, AIX, QNX.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Free Crypto Token will be a free, operating system independent and standard driven interface to smartcards, key files and other hard- and software crypto tokens. In fact FCT will be a framework for PKCS#11 modules that will also include some implementati
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB