Search Results for "security linux" - Page 19

Showing 1444 open source projects for "security linux"

View related business solutions
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1

    MyZone Social Network

    peer to peer social network

    MyZone is a peer to peer social network that supports almost all features common in Facebook and Google+. In addition you can share unlimited mp3s and mp4s with your friends. MyZone does not downgrade the resolution of your photos and all established connections are encrypted using state of the art encryption techniques. MyZone is designed to be resilient towards cyber attacks especially DDoS attacks and government imposed censorships. MyZone should be an interesting social networking...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    F-Talk P2P Encrypted Secure Voip

    F-Talk P2P Encrypted Secure Voip

    F-Talk cross-platform p2p encrypted secure voip software

    This project connect to two peers directly ( using without any central server, stun server ) together with 128bit encrypted secure voip communication. http://ftalk.armanasci.com/guide Spefications * Peer to peer direct connection without using any central dedicated server. ( First basic part of the security ) * 128bit AES Symmetric end-to-end encryption PCM datas. ( Second basic part of the security ) * 64bit Base64 Encoding transferred server side info. * Ipv4 and Ipv6 Supoort. * Full-Dublex Communication. * Full Supports Windows,Linux,Mac and Android platforms. * Complately open source project. http://ftalk.armanasci.com/ http://blog.armanasci.com/ http://blog.armanasci.com/contact-me/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Maroniecoder

    Maroniecoder

    Encrypt a text through a list of encryption methods

    I came to the conclusion that this program is not worth the time for further development. Use different Encryption methods with parameters to en- or decrypted a text through the list With downloadable source-code since 1.3 You need to have Java installed http://www.oracle.com/technetwork/java/javase/downloads/index.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    LIMS-A

    Laboratory Information Management System with Complete Lab. Automation

    Laboratory Information Management System with Complete Laboratory Automation. This Project is created by Fatih University Computer Engineering Students .. Hasan SARMAN Hamadou Doudoun Niangadou Feugang Kemegni Fabrice it helps to automate complete lab system. its originally created to use on a R&D lab. if you wish you can use it on every kind of labs. it comes with Client Server based Access control Mechanism which cordinate access control with registered projects.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Application Monitoring That Won't Slow Your App Down Icon
    Application Monitoring That Won't Slow Your App Down

    AppSignal's Rust-based agent is lightweight and stable. Already running in thousands of production apps.

    Full APM with errors, performance, logs, and uptime monitoring. 99.999% uptime SLA on the platform itself.
    Start Free
  • 5

    Reactor Breeder

    A Genetic Algorithm for Reactors in StarMade

    This software uses a genetic algorithm to "evolve" reactor designs for Schema's space-simulation game, Star-Made (http://star-made.org/). One of the more unique aspects of the game is that ship power management is not as simple as filling a cube with power generation blocks. This mechanism leads to difficulties in getting maximal power generation out of such reactors. This program rectifies this issue by using a self-organizing variant of brute force search. Much of the search space is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    DOSTool

    DOS Attack Tool

    A simple DOS attack tool based on the public resources response time.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    The system is designed to upload phishing emails to a database where they are automatically analyzed and customized reports can be generated. UnMask was developed by ECIT Labs, Dept of Computer Science, FSU. The director of the Lab is Dr. Sudhir Aggarwal. UnMask has substantial on-line help features and should mainly be self-explanatory.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8

    Open Library Mangement System

    Open Library Mangement System

    The Open Library Mangement System is a project to create a web based system to help mange library's everywhere.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Security Officers Management and Analysis Project (SOMAP) is all about defining security management work methods and supplying Security Officers with tools to do their job more efficient and following standards easily.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 10

    Homemotion

    Homemotion is a Java based control center for home automatation.

    Homemotion is a Java based application for home automation. It uses of an internal notification bus that is connecting different components. The usage of generic attributes and adapters allows to add (and mix) different hardware backends. The default UI interface is build using newest JavaFX technology and also includes a small JavaFX UI framework. It should be easy to implement/provide additional or custom hardware backends or UI functionality by implementing corresponding plugins. The...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Access Road

    Access Road

    Simulator of access controls

    The Access Road software is a universal simulator of access controls that is intended to improve design and auditing of IT security. Access Road offers the out-of-the-box simulations of GNU/Linux Ubuntu® (components and rights on the file system), MySQL Server®, and a generic Role-Based-Access-Control application to adapt to your needs. It is designed for database, system, and application administrators, IT architects and developers, auditors. Access Road provides a full simulation of MySQL Server. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A Java library for executing, parsing and persisting NMap output.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Charon Application Environment

    The application environment used by the Charon applications

    This is an open source application environment that is supports many features that a client application can make use of. At present it is being developed at the same time as “Charon Housing” (see elsewhere on this site), but there is no reason why it could not be used for any other application that someone wished to develop. The “Charon Application Environment” contains things like: a middleware layer based on web services, update of users, user permissions, security and access levels, menu...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    JSSLTrace - a SSL/TLS Interceptor

    A java-based interceptor for SSL/TLS protocol

    Jssltrace is a java-based tool, which enables it's user to intercept ssl based communication between two programs. Jssltrace works essentiallly in the same manner as tcptrace (http://www.pocketsoap.com/tcptrace), which is the main inspiration for it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    SPIZD stands for Stress Probing Invasive Zap Destructor; it's a command-line stress test tool used to determine how many simultaneous (concurrent) connections servers can handle. Protocols: http, pop3, pop3s, imap, imaps, smtp, smtps, ssh, radius.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    A pure java library to operate on OpenPGP cards directly using javax.smartcard apis with no need of external dlls/frameworks (such as pkcs11 or opensc-java). Includes sample OpenPGP card edit application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Anonymous File Transfer Network (AFTN)

    Send files securely and anonymously

    AFTN is a Peer to Peer network designed to allow its users to securely and anonymously transfer files to other members of the network by utilizing encryption and onion routing techniques. It is important to recognize that this is not a "File Sharing" network, nor is not intended as a means of distributing copyrighted or otherwise protected content illegally. Rather it is designed to provide anonymity, confidentiality and plausible deniability to those with a reasonable and legal need to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Adzok Open

    Adzok Open

    Administrador Remoto

    Herramienta de Administración Remota opensource escrito en Java. Nota: El creador de este herramienta no se hace responsable del mal uso que le puedan dar a esta herramienta.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    DENRIT

    DENRIT

    Perform anonymous and non-anonymous pentesting.

    DENRIT allows remote administration of anonymous networks (TOR, I2P and FreeNet). Also, contains a pentesting module to execute commands using a selected anonymous network, pentesting with TOR or TCP Follows a client/server model with well-defined communication interfaces. SSH is used to allow remote clients to access the machine and manage any anonymous network that is installed there, plus allows penetration testing anonymously (or non-anonymously) using tools such as Metasploit...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Constellio Enterprise Search engine

    Constellio Enterprise Search engine

    Open source Search Engine and Enterprise Search

    Constellio is an enterprise search engine that allows companies to search all their organization's information through a single interface (Web, CRM, ERP, ECM, Mail etc.). Constellio is Based on Apache Solr and Google Search Appliance's connector. Constellio has a powerful web crawler.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    jEncrypt

    jEncrypt is a command line file encryption archiver

    jEncrypt is a command line file encryption archiver designed to help you encrypt files and directories into a single file archive.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Hide my message

    Hide my message

    Hide your secret message into any type of files

    Secrets is a Java application allow you to hide you message into any type of files either audio, video, text, dll or any type of files. It use a simple Cryptography algorithm to save the message in an secret way, so it can`t be read by any HexaReader. You can retrieve your message also in a very simple way by choosing the original file and click on Decode button. It was built using Java and Swing technology. It was published for educational use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Proxychain

    Proxychain

    Surf anonymously: Hide and change your IP with proxychain.

    With proxychain you can easily redirect your webtrafic via multiple SOCKS5 servers and hide your real IP address. Works fine with TOR as first proxy. If you define a second, third, or fourth proxy, nobody will see that you're using TOR.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 25

    FileEncoderDecoder

    File Encoder And Decoder

    Encoder.jar utility enrypts any file (containing text like .txt, .rtf, .html, .htm, .msg, .xml, etc.) and generates an encoded file. This encoded file may then be transferred via email or other medium from the source machine and can be decoded back to original on the target machine. The target machine should have Decoder.jar in order to reproduce it back to the original form. Decoder.jar decrypts an encoded file and regenerates the original file. Use : java -jar Encoder.jar java -jar...
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB