Browse

OS OS

    • More...
  • More...
    • More...
    • More...

Category Category

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...

User Interface User Interface

    • More...
  • More...

Database Environment Database Environment

Freshness Freshness

Top Apps

  • Pyramid - The Complete Self-Service Analytics Platform Pyramid - The Complete Self-Service Analytics Platform Icon
    Pyramid - The Complete Self-Service Analytics Platform Icon

    Easily combine data from multiple sources to build dashboards and reports with our scalable solution built for mid-size to enterprise companies.

    Pyramid combines analytic tools often found in separate applications. It features a graphically based ETL to model data and incorporate machine learning algorithms, intuitive data discovery tools that produce simple and advanced visualizations, a presentation builder for creating analytic applications and presentations, and an enterprise-grade report builder—all in a single, integrated platform that can be accessed from any browser or device.
  • Microsoft Office 365 monitoring simplified Microsoft Office 365 monitoring simplified Icon
    Microsoft Office 365 monitoring simplified Icon

    Monitor your Office 365® (O365) Exchange™ mailboxes and system applications with the SolarWinds® Server & Application Monitor unified platform.

    SolarWinds Server & Application Monitor allows you to monitor your hybrid IT applications and systems. Monitor Microsoft® Office 365 Exchange side by side on your on-premises Exchange server and other applications. Check, track, and report on O365 user/shared mailbox growth, users over quota, archived mailboxes, inactive mailboxes, mobile device, mailbox groups, and more. You can also monitor Microsoft portal access to help ensure you’re meeting your SLAs.
  • VeraCrypt Icon

    VeraCrypt

    Open source disk encryption with strong security for the Paranoid

    VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data. All released files are PGP signed with key ID=0x54DDD393, available on key servers and downloadable at https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc VeraCrypt can mount TrueCrypt volumes. It also can convert them to VeraCrypt format. Documentation: https://www.veracrypt.fr/en/Documentation.html FAQ : https://www.veracrypt.fr/en/FAQ.html

  • dex2jar

    Tools to work with android .dex and java .class files

    Mirrors: * https://bitbucket.org/pxb1988/dex2jar * https://github.com/pxb1988/dex2jar dex2jar contains following compment * dex-reader is designed to read the Dalvik Executable (.dex/.odex) format. It has a light weight API similar with ASM. * dex-translator is designed to do the convert job. It reads the dex instruction to dex-ir format, after some optimize, convert to ASM format. * dex-ir used by dex-translator, is designed to represent the dex instruction dex-tools tools to work with .class files. * d2j-smali disassemble dex to smali files and assemble dex from smali files. different implementation to smali/baksmali, same syntax, but we support escape in type desc "Lcom/dex2jar\t\u1234;" * dex-writer write dex same way as dex-reader.

  • Autopsy

    Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.

  • OPTOSS NG-NetMS Icon

    OPTOSS NG-NetMS

    OPTOSS Next Gen Network Management System (NG-NetMS)

    Why to pay tens of thousands $$$ for your network management software? Get visibility into your networks and complex processes inside with NG-NetMS now! NG-NetMS is a new end-to-end network management platform for your Linux servers, Cisco, Juniper, HP and Extreme routers, switches and firewalls. NG-NetMS is precise, quick and efficient. It collects most complete information about the network inventory, topology, map of IPv4 addresses quickly and with minimum hassle. Most important you will be able to collect, process and analyse Syslog events and SNMP alarms both in near-real-time and from the historical archives in a new way. We successfully used NG-NetMS for delivery of network assessment services for our customers worldwide for many years. And now we want to share this unique and fully functional tool with community. It is not capped in terms of performance or number of nodes. The only limit is the hardware you deploy it on. http://www.opt-net.eu/products

  • CacheGuard Web Gateway Appliance Icon

    CacheGuard Web Gateway Appliance

    Web Security Gateway (URL filtering, waf, firewall, antivirus...)

    CacheGuard is an Enterprise Grade Web Security Gateway providing firewall, web antivirus, caching, web compression, URL filtering, forward/reverse proxy, web load balancing, WAF, antivirus, bandwidth shaping and more. The High Availability function is the the heart of CacheGuard using RAID, link bounding, VRRP, cache sharing. An SNMP agent is integrated into the appliance and the appliance can send traps if something goes wrong. CacheGuard is available as an OS appliance to install on a hardware or virtual machine of your choice. You can implement it transparently in any existing architecture as your main central point where all the Web traffic passes through. CacheGuard is based on a hardened Linux system built from scratch (with LFS) and integrates netfilter and iproute2, squid, squidGuard, apache, modSecurity, clamAV and multiple other open source products interfaced together as a whole to allow an easy and straightforward configuration using the CLI or the Web GUI.

  • Take Advantage of O365 + Online Backup Bundles Take Advantage of O365 + Online Backup Bundles Icon
    Take Advantage of O365 + Online Backup Bundles Icon

    The Perfect Small Business Offer That Packages Productivity, Disaster Recovery & Security Under One Price Tag. Join SherWeb to Start Reselling.

    Add more value to your Office 365 offers with Online Backup. The program will back up servers, desktops, virtual machines and smart devices, plus popular applications and Office 365 data. Online Backup comes with the Active Protection feature embedded, making it possible to stop any ransomware attack and restore encrypted files in a blink. It also provides a web-based intuitive console that eases backup and disaster recovery management.
    Are you an IT professional looking to profit from reselling Office 365?
    Sign up NOW, it’s FREE
  • encrypt Icon

    encrypt

    cross-platform, encryption application

    encrypt is a multi-platform, file encryption application. Binary packages are currently provided for Arch, Debian, Fedora, MS Windows, Android and OS X. For further details, including the latest source code, visit https://albinoloverats.net/projects/encrypt

  • Apple FMI Checker (iCloud Lock) Icon

    Apple FMI Checker (iCloud Lock)

    iCloud activation lock checker (fmi) by IMEI or Serial Number

    To use it just go to https://www.alidoom.host This tool help people to check apple device fmi lock status (icloud activation lock) before buying it, just type device serial number or IMEI and you are done, enjoy it.

    Downloads: 80 This Week Last Update: See Project
  • NEO Folder Lock Icon

    NEO Folder Lock

    Lock your files and folders .

    Simply lock and unlock your files and folders.

    Downloads: 21 This Week Last Update: See Project
  • Gryptonite (formerly GPassword Manager) Icon

    Gryptonite (formerly GPassword Manager)

    Simple but Powerful, Cross-Platform Password Management Utility

    A simple but powerful cross-platform utility for managing and accessing your most secret data. It stores passwords and whole files, so it can literally store any information you want to keep secret. Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. Although the interface is simple and intuitive, the security is top-notch. It uses AES with CCM to secure and authenticate the data.

  • Sagacity Icon

    Sagacity

    Security Assessment Data Management and Analysis Tool

    Sagacity is a vulnerability assessment and STIG compliance data management tool designed to make security testing more efficient, effective and complete. Security assessments, especially those done for DoD and Federal organizations, produce tremendous amounts of scan and compliance data that security engineers must sort through and deconflict, identify untested requirements, and somehow analyze to communicate risk to their employers. Sagacity, originally written to support a government customer, was designed to fill that need. What if an organization could turn massive amounts of irreconcilable vulnerability scan data into true knowledge and insight about their networks? They would be able to make wise decisions resulting in cost-effective actions to improve their security with the best return on investment. Keen insight. Sound judgment. Wise decisions. Sagacity.

    Downloads: 11 This Week Last Update: See Project
  • Identify and respond to threats before damage is done Identify and respond to threats before damage is done Icon
    Identify and respond to threats before damage is done Icon

    A SIEM that makes it easy to use logs for security, compliance, and troubleshooting.

    SolarWinds® Log & Event Manager (LEM) delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-use, and quick-to-deploy virtual appliance. LEM provides the visibility, security, and control that IT professionals need to alert on and respond to security threats, and assist in meeting the regulatory compliance guidelines of HIPAA, PCI DSS, SOX, and more. Try it free for 30 days!
  • ANNFiD

    A forensic file identification tool using neural networks

    Just carved a bunch of bytes and have no idea what they could be? Maybe ANNFiD can help. ANNFiD uses neural network to identify byte patterns. It can be trained and has a GUI to help in the process. The tool is still on a very early stage, but could improve exponentially with the help of the developer community

    Downloads: 8 This Week Last Update: See Project
  • Pkcs11Interop Icon

    Pkcs11Interop

    Managed .NET wrapper for unmanaged PKCS#11 libraries

    This project provides stable releases of Pkcs11Interop project hosted on github. Please visit project website - www.pkcs11interop.net - for more information.

  • TLSBench

    A tool for benchmarking the TLS performance of Cloud database systems.

    TLSBench is a tool for benchmarking the performance of Transport Layer Security (TLS) in cloud storage systems / cloud database systems like Apache Cassandra, Apache HBase, and Amazon's DynamoDB. This tool is built for research purposes. A paper which describes the general benchmarking approach and some experiments is available here: http://www.aifb.kit.edu/images/5/58/IC2E2014-Performance_Overhead_TLS.pdf.

    Downloads: 3 This Week Last Update: See Project
  • FlowBuffer Icon

    FlowBuffer

    Buffers, forwards, and splits flow data including NetFlow and IPFIX

    FlowBuffer is a flow/netflow buffer and splitter: configure your switch to push flow data into FlowBuffer, and FlowBuffer forwards it to unlimited destinations. Offloads processing from the switch to another machine. Centralized management. Runs on Windows.

    Downloads: 2 This Week Last Update: See Project
  • Web Blocker Icon

    Web Blocker

    Block Web Site

    Block Web site that you want to.

    Downloads: 2 This Week Last Update: See Project
  • Gryptonite Icon

    Gryptonite

    Cross-platform encrypted password and file database

    A user-friendly, cross-platform utility for managing and accessing your most secret data. It stores passwords and whole files, so it can literally store any information you want to keep secret. Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. It's not just easy to use, it's also highly secure. Security experts will be happy to know that it uses AES with CCM and has a solid security concept.

  • Is My Download Broken? Icon

    Is My Download Broken?

    a powerful multipurpose checksum utility

    It's a cross platform utility designed for performing various checksumming activities. It supports verity of standards including ADLER-32, CRC-32, MD2, MD5, MURMUR-32, MURMUR-128, SHA-1, SHA-256, SHA-384, SHA-512 and SIPHASH24. Also generated results can be validated within the application. Results can be saved to a text file format. It can batch process folders as well. This tool requires Java Run-time Environment 7 or higher to use.

  • PCSecrets Icon

    PCSecrets

    Encrypt and manage secret text data

    PCSecrets is a PC application that holds secret text data - protected by a master password and strong encryption. Use it as a password manager or just somewhere to hold any text data securely in one place. It can hold a second, hidden set of secrets that is undetectable and plausibly deniable. The program is also a PC counterpart of the Secrets for Android app. It uses the same data structure and provides synchronization that allows easy transfer of secrets between the two. For those who find the personal computer environment more comfortable for data entry and editing (i.e. a real keyboard), PCSecrets provides an alternative way to manage your secrets. Sync is also effectively a form of backup. To enable the sync feature with Secrets for Android, you need to install the PCSecrets sync app PCSSync, downloadable from SourceForge or Google Play. PCSecrets import plus PCSSync provides a route to importing secret data into Secrets for Android that would not otherwise be possible.

  • NeoLogger Icon

    NeoLogger

    Full Featured Windows Command Line Syslog Logger

    NeoLogger is Windows Syslog Client similar to the logger command known from UNIX/LINUX systems used to send SYSLOG messages. It adds some usefull features to filter and replace content, reads from standard input, files or the windows eventlog. It is also able to watch a file or an eventlog for changes and transmits only the new entries. Logit is an additional tool, that logs process or batch output to a log file or windows Eventlog using predefined prefixes and timestamps. (see the screenshots for an Overview) Please donate some (micro-)bitcoins to my address if you saved time and money by using this free project: 1FvGzQvT3tcN47fxdaNjDeSFU6pAUsqMbn

  • OWASP Zed Attack Proxy Icon

    OWASP Zed Attack Proxy

    Find web application vulnerabilities the easy way!

    The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. Note that this project is no longer used for hosting the ZAP downloads. You should download ZAP via https://github.com/zaproxy/zaproxy/wiki/Downloads Please see the homepage for more information about OWASP ZAP

    Downloads: 1 This Week Last Update: See Project
  • Downloads: 1 This Week Last Update: See Project
  • https://www.sis.gov.uk/open

    shell, ssn, path disclosured, bugs

    w3af discovery shell, ssn, path disclosured, bugs in https://https-www-sis-gov-uk-

    Downloads: 1 This Week Last Update: See Project
  • APDU for Java

    Utilities for generating and parsing APDU commands

    This package provides utilities for generating and parsing APDU commands and responses as specified in ISO/IEC 7816. These utilities may be useful for implementers of smart card readers, smart card tracers and debuggers, or smart card emulation (such as Android's Host Card Emulation, or HCE).

    Downloads: 0 This Week Last Update: See Project
  • Cifradocesar Icon

    Cifradocesar

    Para proteger la información sensible de miradas ajenas, no basta con ocultarla en una carpeta anónima o ponerla en un archivo comprimido; lo suyo es cifrar los datos para que nadie pueda leerlos

    Downloads: 0 This Week Last Update: See Project
  • Driver locker Icon

    Driver locker

    Lock Driver es una Herramienta que puede bloquear cualquier unidad de Disco duro en cuestión de segundos . Sin la contraseña , nadie puede acceder a los archivos en la unidad de bloqueo. Todos sus datos serán protegidos

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you