22 projects for "security tools" with 2 filters applied:

  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • 1
    Hacks

    Hacks

    A collection of hacks and one-off scripts

    ...Many of the tools in the repository are designed for efficiency and simplicity, enabling users to perform complex operations with minimal overhead. It is particularly popular among security researchers and developers who need quick, flexible solutions for niche problems.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    Windows 11 Guide

    Windows 11 Guide

    Windows Security tools, Encryption, Nextcloud, Graphics, Gaming

    Windows 11 Guide is a comprehensive, single-repository handbook for setting up and tuning a Windows 11 (and often Windows 10) desktop for real day-to-day use, covering everything from basic configuration to advanced development and gaming scenarios. It walks users through installing essential applications, configuring Windows security tools, setting up encryption and backups, and integrating productivity services like Nextcloud. The guide also dives into graphics and gaming optimizations, making it useful for both casual users and power users who want better performance and stability. For developers and technical users, it includes sections on virtualization, containers, and Windows Subsystem for Linux (WSL2), showing how to build a capable dev environment on top of Windows. ...
    Downloads: 35 This Week
    Last Update:
    See Project
  • 3
    age

    age

    A simple, modern and secure encryption tool (and Go library)

    ...The project is well-suited for personal data encryption, backup use-cases, scripting encryption workflows, and embedding encryption in tools. Because of its design philosophy, it avoids the bloat of many older encryption utilities while maintaining strong cryptographic hygiene. It’s especially useful for developers or system administrators who want to adopt encryption without learning a multitude of options.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 4
    Awesome Privacy

    Awesome Privacy

    A curated list of privacy & security-focused software and services

    Awesome Privacy is a curated directory of privacy-respecting alternatives to mainstream apps and services, organized across many categories like browsers, search, email, messaging, cloud storage, and operating systems. It aims to help you choose tools that reduce tracking, fingerprinting, and data collection without sacrificing usability. Each entry highlights the project’s core properties—such as open source status, end-to-end encryption, and platform availability—so you can evaluate...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5
    Professional Services

    Professional Services

    Common solutions and tools developed by Google Cloud

    Professional Services repository is a collection of real-world solutions, tools, and reference implementations developed by Google Cloud’s Professional Services team to address common enterprise challenges. Unlike simple sample repositories, it focuses on production-oriented use cases such as data pipelines, machine learning workflows, infrastructure automation, and security management. The repository contains a wide variety of projects, including tools for validating data migrations, generating large datasets for testing, building analytics dashboards, and automating policy enforcement in cloud environments. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    Infosec Reference

    Infosec Reference

    An Information Security Reference That Doesn't Suck

    Infosec Reference is a curated knowledge base and resource repository for information security practitioners. It aggregates cheat sheets, tooling guides, protocol deep dives, incident response playbooks, and threat actor profiles—all organized under accessible categories (network, web, host, cryptography, auditing). The repo is built as a living wiki of sorts: practitioners contribute updates, expand sections, or refine explanations as the threat landscape evolves. Because security spans...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Best-of Crypto

    Best-of Crypto

    A ranked list of awesome open-source crypto projects

    This curated list contains 3.1K awesome open-source projects with a total of 1.2M stars grouped into 11 categories. All projects are ranked by a project-quality score, which is calculated based on various metrics automatically collected from GitHub and different package managers. A ranked list of open-source digital currency and blockchain projects. Updated weekly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Node.js Best Practices

    Node.js Best Practices

    The Node.js best practices list (July 2024)

    This repository is a living, community-curated guide to writing robust, maintainable Node.js applications at scale. It organizes advice into clear sections—project structure, error handling, security, testing, performance, reliability, and maintainability—so teams can adopt improvements incrementally. Each guideline is phrased as a practical recommendation with motivation and trade-offs, not just a rule, which makes it easier to reach team consensus. The content aims to be...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    EKS Best Practices

    EKS Best Practices

    A best practices guide for day 2 operations

    The Amazon EKS Best Practices Guide is a public repository containing comprehensive documentation and guidance for operating production-grade Kubernetes clusters on AWS’s managed service, Amazon EKS. Rather than a code library, it serves as a reference catalogue of patterns, anti-patterns, checklists and architectures across domains such as security, reliability, scalability, networking, cost optimization and hybrid cloud deployments. The repository is maintained by AWS but open to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 10
    Tailslayer

    Tailslayer

    Library for reducing tail latency in RAM reads

    Tailslayer is a cybersecurity and forensic analysis tool designed to extract and analyze artifacts from Tails OS environments. It focuses on uncovering traces of activity in systems that are designed to be privacy-preserving and ephemeral. The tool helps investigators identify residual data such as logs, configurations, or usage traces that may persist despite Tails’ security features. It is particularly relevant for digital forensics and research into privacy systems. Tailslayer emphasizes...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Best-websites-a-programmer-should-visit

    Best-websites-a-programmer-should-visit

    Some useful websites for programmers

    ...Rather than being a random bookmark dump, it organizes resources into practical categories such as algorithms, competitive programming, reading materials, podcasts, newsletters, interview prep, design, security, performance, and more. The list aims to reduce the “what should I learn next?” friction by pointing you to high-signal, time-tested tutorials, references, and tools. Because it spans beginner to advanced topics, you can use it as an on-ramp when starting out and as a roadmap for deeper specialization later. It also surfaces non-code essentials like productivity, writing, and career guidance, acknowledging that strong developers need more than syntax. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Unikraft

    Unikraft

    A next-generation cloud native kernel designed to unlock performance

    Unikraft powers the next generation of cloud-native, containerless applications by enabling you to radically customize and build custom OS/kernels; unlocking best-in-class performance, security primitives, and efficiency savings. Unikraft optimizes resource utilization, leading to smaller footprints (meaning higher server saturation) and improved efficiency in resource-constrained environments. Unikraft is an open-source project driven by a vibrant community of over 100 developers, fostering...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Penetration Testing Tools

    Penetration Testing Tools

    A collection of more than 170+ tools, scripts, cheatsheets

    Penetration-Testing-Tools is a curated collection of tools, scripts, cheatsheets and reference materials assembled to help security researchers, red-teamers, and students perform hands-on penetration testing across multiple domains. The repository groups resources by discipline — reconnaissance, web application testing, network exploitation, privilege escalation, post-exploitation and reporting — so users can quickly find relevant utilities and walkthroughs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes:...
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    Name-That-Hash

    Name-That-Hash

    Identify MD5, SHA256 and 300+ other hashes

    Name-That-Hash is a modern hash identification system that tells you what type of hash you are looking at, supporting MD5, SHA-256, and more than 300 other hash types. It is designed as a successor and improvement to older tools like HashID and Hash-Identifier, focusing on up-to-date hash databases and better usability. One of its core ideas is popularity-aware ranking: when you feed in a hash, it prioritizes likely real-world types such as NTLM over obscure ones like Skype hashes, instead...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    waybackurls

    waybackurls

    Fetch all the URLs that the Wayback Machine knows about for a domain

    ...The output can be combined with other tools for further analysis, such as filtering parameters or probing endpoints.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 17
    Open source DKIM library, MTA filter implementation and associated tools.
    Leader badge
    Downloads: 82 This Week
    Last Update:
    See Project
  • 18

    SilverTunnel-NG

    Java library for easy accessing Tor network.

    SilverTunnel-NG is a Java library that implements and encapsulates all the complex network protocol stuff needed for anonymous communication over the Tor anonymity network. SilverTunnel-NG Netlib can be easily integrated in almost every existing and new Java application. The library requires Java 1.6/Java SE 6 or a newer version. This is a fork of silvertunnel (https://silvertunnel.org) Version (0.0.4) is deployed to maven. Since Version 0.0.4 SilverTunnel-NG also runs on...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Flask-AppBuilder

    Rapid web application development (python + Flask)

    Simple and rapid Application builder, built on top of Flask. includes detailed security, auto form generation, google charts and much more. Demo on: http://flaskappbuilder.pythonanywhere.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    openSCADA

    openSCADA

    openSCADA® is an open source SCADA system written in JAVA

    openSCADA is an open source Supervisory Control And Data Acquisition System. It is platform independent and based on a modern system design that provides security and flexibility at the same time. openSCADA is flexible. It is not an out of the box solution, but a set of tools that can be combined in many different ways. It provides development libraries, interface applications, mass configuration tools, front-end and back-end applications. openSCADA is ready to rock. It is used 24/7 in several installations around this world. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 21

    pipedump

    Proxies data from stdin/stdout/stderr and logs it in pcap files.

    The pipedump forks a process and then executes the specified command, acting as a proxy for STDIN, STDOUT, and STDERR. Debug data and data sent to STDIN are recorded as a IPv6 UDP packets traversing from ::1 to ::. Data received from STDOUT and STDERR are recorded as a IPv6 UDP packets traversing from :: to ::1. STDIN is recorded as port 19840, STDOUT as port 19841, STDERR as port 19842 and debug information as port 65535. The captured data is recorded in a file which can be...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    BBSGen is an improved Blum-Blum-Shub pseudorandom number generator. It consists of a C library (libbbsgen) and command-line tool (bbsgen). BBSGen can be used in applications and command-line as secure, unpredictable and strong PRNG.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB