Showing 36 open source projects for "security tools"

View related business solutions
  • Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 1
    Hacks

    Hacks

    A collection of hacks and one-off scripts

    ...Many of the tools in the repository are designed for efficiency and simplicity, enabling users to perform complex operations with minimal overhead. It is particularly popular among security researchers and developers who need quick, flexible solutions for niche problems.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    Windows 11 Guide

    Windows 11 Guide

    Windows Security tools, Encryption, Nextcloud, Graphics, Gaming

    Windows 11 Guide is a comprehensive, single-repository handbook for setting up and tuning a Windows 11 (and often Windows 10) desktop for real day-to-day use, covering everything from basic configuration to advanced development and gaming scenarios. It walks users through installing essential applications, configuring Windows security tools, setting up encryption and backups, and integrating productivity services like Nextcloud. The guide also dives into graphics and gaming optimizations, making it useful for both casual users and power users who want better performance and stability. For developers and technical users, it includes sections on virtualization, containers, and Windows Subsystem for Linux (WSL2), showing how to build a capable dev environment on top of Windows. ...
    Downloads: 35 This Week
    Last Update:
    See Project
  • 3

    Impacket

    A collection of Python classes for working with network protocols

    Impacket is a collection of Python classes designed for working with network protocols. It was primarily created in the hopes of alleviating some of the hindrances associated with the implementation of networking protocols and stacks, and aims to speed up research and educational activities. It provides low-level programmatic access to packets, and the protocol implementation itself for some of the protocols, like SMB1-3 and MSRPC. It features several protocols, including Ethernet, IP, TCP,...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    age

    age

    A simple, modern and secure encryption tool (and Go library)

    ...The project is well-suited for personal data encryption, backup use-cases, scripting encryption workflows, and embedding encryption in tools. Because of its design philosophy, it avoids the bloat of many older encryption utilities while maintaining strong cryptographic hygiene. It’s especially useful for developers or system administrators who want to adopt encryption without learning a multitude of options.
    Downloads: 9 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5
    Awesome Privacy

    Awesome Privacy

    A curated list of privacy & security-focused software and services

    Awesome Privacy is a curated directory of privacy-respecting alternatives to mainstream apps and services, organized across many categories like browsers, search, email, messaging, cloud storage, and operating systems. It aims to help you choose tools that reduce tracking, fingerprinting, and data collection without sacrificing usability. Each entry highlights the project’s core properties—such as open source status, end-to-end encryption, and platform availability—so you can evaluate...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Retire.js

    Retire.js

    Scanner detecting the use of JavaScript libraries

    ...Scans visited sites for references to insecure libraries and puts warnings in the developer console. An icon on the address bar displays will also indicate if vulnerable libraries were loaded. Retire.js has been adapted as a plugin for the penetration testing tools Burp and OWASP ZAP.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 7
    Professional Services

    Professional Services

    Common solutions and tools developed by Google Cloud

    Professional Services repository is a collection of real-world solutions, tools, and reference implementations developed by Google Cloud’s Professional Services team to address common enterprise challenges. Unlike simple sample repositories, it focuses on production-oriented use cases such as data pipelines, machine learning workflows, infrastructure automation, and security management. The repository contains a wide variety of projects, including tools for validating data migrations, generating large datasets for testing, building analytics dashboards, and automating policy enforcement in cloud environments. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    Infosec Reference

    Infosec Reference

    An Information Security Reference That Doesn't Suck

    Infosec Reference is a curated knowledge base and resource repository for information security practitioners. It aggregates cheat sheets, tooling guides, protocol deep dives, incident response playbooks, and threat actor profiles—all organized under accessible categories (network, web, host, cryptography, auditing). The repo is built as a living wiki of sorts: practitioners contribute updates, expand sections, or refine explanations as the threat landscape evolves. Because security spans...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    POCO

    POCO

    Cross-platform C++ libraries for building network applications

    The POCO C++ Libraries are powerful cross-platform C++ libraries for building network- and internet-based applications that run on desktop, server, mobile, IoT, and embedded systems. Whether building automation systems, industrial automation, IoT platforms, air traffic management systems, enterprise IT application and infrastructure management, security and network analytics, automotive infotainment and telematics, financial or healthcare, C++ developers have been trusting the POCO C++...
    Downloads: 7 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Best-of Crypto

    Best-of Crypto

    A ranked list of awesome open-source crypto projects

    This curated list contains 3.1K awesome open-source projects with a total of 1.2M stars grouped into 11 categories. All projects are ranked by a project-quality score, which is calculated based on various metrics automatically collected from GitHub and different package managers. A ranked list of open-source digital currency and blockchain projects. Updated weekly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Node.js Best Practices

    Node.js Best Practices

    The Node.js best practices list (July 2024)

    This repository is a living, community-curated guide to writing robust, maintainable Node.js applications at scale. It organizes advice into clear sections—project structure, error handling, security, testing, performance, reliability, and maintainability—so teams can adopt improvements incrementally. Each guideline is phrased as a practical recommendation with motivation and trade-offs, not just a rule, which makes it easier to reach team consensus. The content aims to be...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    EKS Best Practices

    EKS Best Practices

    A best practices guide for day 2 operations

    The Amazon EKS Best Practices Guide is a public repository containing comprehensive documentation and guidance for operating production-grade Kubernetes clusters on AWS’s managed service, Amazon EKS. Rather than a code library, it serves as a reference catalogue of patterns, anti-patterns, checklists and architectures across domains such as security, reliability, scalability, networking, cost optimization and hybrid cloud deployments. The repository is maintained by AWS but open to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Tailslayer

    Tailslayer

    Library for reducing tail latency in RAM reads

    Tailslayer is a cybersecurity and forensic analysis tool designed to extract and analyze artifacts from Tails OS environments. It focuses on uncovering traces of activity in systems that are designed to be privacy-preserving and ephemeral. The tool helps investigators identify residual data such as logs, configurations, or usage traces that may persist despite Tails’ security features. It is particularly relevant for digital forensics and research into privacy systems. Tailslayer emphasizes...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Vanilla.PDF

    Vanilla.PDF

    Cross-platform SDK for creating and modifying PDF documents

    ...Vanilla.PDF supports advanced PDF features such as adding CMS (PKCS#7) digital signatures, modifying content streams and metadata, and working with encryption and permissions based on standard PDF security models. It includes tools for parsing PDF internals like cross-reference tables and objects, providing fine-grained document analysis capabilities. The project is unit-tested with continuous integration pipelines, supporting sanitizers for enhanced code quality and stability.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Best-websites-a-programmer-should-visit

    Best-websites-a-programmer-should-visit

    Some useful websites for programmers

    ...Rather than being a random bookmark dump, it organizes resources into practical categories such as algorithms, competitive programming, reading materials, podcasts, newsletters, interview prep, design, security, performance, and more. The list aims to reduce the “what should I learn next?” friction by pointing you to high-signal, time-tested tutorials, references, and tools. Because it spans beginner to advanced topics, you can use it as an on-ramp when starting out and as a roadmap for deeper specialization later. It also surfaces non-code essentials like productivity, writing, and career guidance, acknowledging that strong developers need more than syntax. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Unikraft

    Unikraft

    A next-generation cloud native kernel designed to unlock performance

    Unikraft powers the next generation of cloud-native, containerless applications by enabling you to radically customize and build custom OS/kernels; unlocking best-in-class performance, security primitives, and efficiency savings. Unikraft optimizes resource utilization, leading to smaller footprints (meaning higher server saturation) and improved efficiency in resource-constrained environments. Unikraft is an open-source project driven by a vibrant community of over 100 developers, fostering...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Penetration Testing Tools

    Penetration Testing Tools

    A collection of more than 170+ tools, scripts, cheatsheets

    Penetration-Testing-Tools is a curated collection of tools, scripts, cheatsheets and reference materials assembled to help security researchers, red-teamers, and students perform hands-on penetration testing across multiple domains. The repository groups resources by discipline — reconnaissance, web application testing, network exploitation, privilege escalation, post-exploitation and reporting — so users can quickly find relevant utilities and walkthroughs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes:...
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    Name-That-Hash

    Name-That-Hash

    Identify MD5, SHA256 and 300+ other hashes

    Name-That-Hash is a modern hash identification system that tells you what type of hash you are looking at, supporting MD5, SHA-256, and more than 300 other hash types. It is designed as a successor and improvement to older tools like HashID and Hash-Identifier, focusing on up-to-date hash databases and better usability. One of its core ideas is popularity-aware ranking: when you feed in a hash, it prioritizes likely real-world types such as NTLM over obscure ones like Skype hashes, instead...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Tink

    Tink

    A library that provides cryptographic APIs that are easy and secure

    ...Cryptography is difficult to get right. With Tink, you can encrypt or sign data with just a few lines of code, with built-in security guarantees to help you avoid pitfalls. Tink adds security protections on top of well known libraries like BoringSSL and Java Cryptography Architecture and shows them right in the interfaces, so auditors and tools can quickly find gaps.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    CityHash

    CityHash

    Automatically exported from Google code CityHash

    ...CityHash offers multiple hash sizes—32-bit, 64-bit, 128-bit, and 256-bit variants—with the CRC-based versions leveraging hardware acceleration on CPUs that support SSE4.2 CRC32 instructions. The library emphasizes hashing performance and uniformity rather than cryptographic security, making it ideal for use in data structures like hash tables and distributed systems requiring rapid key lookups. CityHash has been rigorously tested using tools like SMHasher to ensure high-quality mixing and collision resistance across a wide range of inputs. Its speed and portability have made it a popular choice for developers needing dependable, lightweight hash functions.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    waybackurls

    waybackurls

    Fetch all the URLs that the Wayback Machine knows about for a domain

    ...The output can be combined with other tools for further analysis, such as filtering parameters or probing endpoints.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23
    Prawn

    Prawn

    Fast, Nimble PDF Writer for Ruby

    Prawn is a pure Ruby PDF generation library that provides a lot of great functionality while trying to remain simple and reasonably performant. Extensive text rendering support, including flowing text and limited inline formatting options. Comprehensive internationalization features, including full support for UTF-8 based fonts, right-to-left text rendering, fallback font support, and extension points for customizable text wrapping. Support for PDF outlines for document navigation. Low level...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    .Net Runtime Library for Delphi

    .Net Runtime Library for Delphi

    This is the best library to work with the .Net framework from Delphi.

    The .Net Runtime Library for Delphi (CNClrLibrary) is the best library to work with .Net framework and .Net libraries from Delphi. It is designed to provide a way to interact with applications written in anyone of the .Net languages (such as C#, Visual Basic.Net, Delphi.Net, JScript.Net, etc) from Delphi. CNClrLibrary allows Delphi to use .Net libraries without the need for registry entries, COM registrations, or changes to the .NET libraries. Competitive Advantages: - No extra dll...
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 25

    Mars

    A cross-platform network component developed by WeChat

    Mars is an open source, cross-platform infrastructure component and official terminal basic component of WeChat. It consists of four main parts: Comm, which contains a basic library, including basic tools like sockets, threads, alarm, message queues, and coroutines; Xlog, which provides high-performance, high-availability, security, and fault-tolerant log functions; SDT which is the network diagnosis module; and STN or signaling transmission network module, the major component of Mars responsible for the small data signaling channel between the terminal and the server. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB