Browse

OS OS

  • More...

Category Category

    • More...

License License

Translations Translations

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

  • More...

Database Environment Database Environment

Freshness Freshness

Top Apps

  • 2018 Thomson Reuters Top 100 Global Tech Leaders 2018 Thomson Reuters Top 100 Global Tech Leaders Icon
    2018 Thomson Reuters Top 100 Global Tech Leaders Icon

    See how tech-sector leadership is being redefined in today’s complex business environment.

    21st century technology-sector leadership requires not only optimal financial performance but also attention to many other factors, including management and investor confidence, risk and resilience, legal compliance, innovation, environmental impact, social responsibility, and reputation. Successfully managing these areas may determine which tech companies have the fortitude to succeed in the future. Here’s to those that made the list.
    Who are today’s top global tech leaders?
    Read the report
  • VeraCrypt Icon

    VeraCrypt

    Open source disk encryption with strong security for the Paranoid

    VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data. All released files are PGP signed with key ID=0x54DDD393, available on key servers and downloadable at https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc VeraCrypt can mount TrueCrypt volumes. It also can convert them to VeraCrypt format. Documentation: https://www.veracrypt.fr/en/Documentation.html FAQ : https://www.veracrypt.fr/en/FAQ.html

  • dex2jar

    Tools to work with android .dex and java .class files

    Mirrors: * https://bitbucket.org/pxb1988/dex2jar * https://github.com/pxb1988/dex2jar dex2jar contains following compment * dex-reader is designed to read the Dalvik Executable (.dex/.odex) format. It has a light weight API similar with ASM. * dex-translator is designed to do the convert job. It reads the dex instruction to dex-ir format, after some optimize, convert to ASM format. * dex-ir used by dex-translator, is designed to represent the dex instruction dex-tools tools to work with .class files. * d2j-smali disassemble dex to smali files and assemble dex from smali files. different implementation to smali/baksmali, same syntax, but we support escape in type desc "Lcom/dex2jar\t\u1234;" * dex-writer write dex same way as dex-reader.

  • OPTOSS NG-NetMS Icon

    OPTOSS NG-NetMS

    OPTOSS Next Gen Network Management System (NG-NetMS)

    Why to pay tens of thousands $$$ for your network management software? Get visibility into your networks and complex processes inside with NG-NetMS now! NG-NetMS is a new end-to-end network management platform for your Linux servers, Cisco, Juniper, HP and Extreme routers, switches and firewalls. NG-NetMS is precise, quick and efficient. It collects most complete information about the network inventory, topology, map of IPv4 addresses quickly and with minimum hassle. Most important you will be able to collect, process and analyse Syslog events and SNMP alarms both in near-real-time and from the historical archives in a new way. We successfully used NG-NetMS for delivery of network assessment services for our customers worldwide for many years. And now we want to share this unique and fully functional tool with community. It is not capped in terms of performance or number of nodes. The only limit is the hardware you deploy it on. http://www.opt-net.eu/products

  • OtrosLogViewer

    OtrosLogViewer download page

    OtrosLogViewer is hosted on https://github.com/otros-systems/otroslogviewer. On sf.net you can download distribution pacakges.

  • WinLockPro Icon

    WinLockPro

    Windows 8 Screen Lock and Powerful Security Solution for Windows 7

    What does WinlockPro do? Brings the entire Windows 10 metro theme across all versions of windows(XP and above) Proprietary password encryption technology Flash Drive Unlock! View login attempts that have occurred Sends you an email if many failed attempts occur Shuts down the computer if multiple failed attempts occur Desktop widget which can be used to easily control all aspects of the software Ability to leave notes on the Lock Screen interface Extremely simple to use Almost every small aspect of the software can be customized Fonts, colors, styles, positions, wallpapers, avatars, EVERYTHING can be changed to your liking Now has a minimalist mode, to make it even easier to use Dual monitor support G-mail integration - Ability to control WinlockPro with simple email commands. A whole lot more to be discovered Future I am currently building a cross platform app that will allow users to control WinlockPro from their mobile phones.

  • HTTP Test Tool Icon

    HTTP Test Tool

    httest is a script based tool for testing and benchmarking web applications, web servers, proxy servers and web browsers. httest can emulate clients and servers in the same test script, very useful for testing proxys.

  • CacheGuard Web Gateway Appliance Icon

    CacheGuard Web Gateway Appliance

    Web Security Gateway (URL filtering, waf, firewall, antivirus...)

    CacheGuard is an Enterprise Grade Web Security Gateway providing firewall, web antivirus, caching, web compression, URL filtering, forward/reverse proxy, web load balancing, WAF, antivirus, bandwidth shaping and more. The High Availability function is the the heart of CacheGuard using RAID, link bounding, VRRP, cache sharing. An SNMP agent is integrated into the appliance and the appliance can send traps if something goes wrong. CacheGuard is available as an OS appliance to install on a hardware or virtual machine of your choice. You can implement it transparently in any existing architecture as your main central point where all the Web traffic passes through. CacheGuard is based on a hardened Linux system built from scratch (with LFS) and integrates netfilter and iproute2, squid, squidGuard, apache, modSecurity, clamAV and multiple other open source products interfaced together as a whole to allow an easy and straightforward configuration using the CLI or the Web GUI.

  • encrypt Icon

    encrypt

    cross-platform, encryption application

    encrypt is a multi-platform, file encryption application. Binary packages are currently provided for Arch, Debian, Fedora, MS Windows, Android and OS X. For further details, including the latest source code, visit https://albinoloverats.net/projects/encrypt

  • Apache HTTPD Server Portable Icon

    Apache HTTPD Server Portable

    Apache HTTPD Server is an open source web server packaged as a portable app, so you can run a full web server on your iPod, USB flash drive, portable hard drive, etc. It has all the same features as Apache HTTPD, plus, it leaves no personal information behind on the machine you run it on, so you can take it with you wherever you go.

    Downloads: 31 This Week Last Update: See Project
  • Gryptonite (formerly GPassword Manager) Icon

    Gryptonite (formerly GPassword Manager)

    Simple but Powerful, Cross-Platform Password Management Utility

    A simple but powerful cross-platform utility for managing and accessing your most secret data. It stores passwords and whole files, so it can literally store any information you want to keep secret. Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. Although the interface is simple and intuitive, the security is top-notch. It uses AES with CCM to secure and authenticate the data.

  • Pharos Icon

    Pharos

    RTOS for Secure Systems

    Pharos is a Real-Time Operating System designed for Secure Systems with the following characteristics: -Security: With space partitions and enhanced time partitioning. Each partition protected with hardware Memory Management Unit and operating in user mode. -Quality: Considering requirements from the most strict standards, Cyclomatic Number, Nesting Levels, Comments and MISRA rules. -Mixed Criticality: Provides independence and the isolation of each partition and provides native support for sporadic, periodic and aperiodic threads under a fixed-priority preemptive scheduler, including WCET protection. -Determinism: Hard real-time determinism, calls are time limited and are, in a few cases, maximized to O(Log(N)) of the number of objects in the system. We are a group of enthusiastic software developers that also implements client custom software. Contact: rtos.pharos@outlook.com

    Downloads: 17 This Week Last Update: See Project
  • NEO Folder Lock Icon

    NEO Folder Lock

    Lock your files and folders .

    Simply lock and unlock your files and folders.

    Downloads: 15 This Week Last Update: See Project
  • Sagacity Icon

    Sagacity

    Security Assessment Data Management and Analysis Tool

    Sagacity is a vulnerability assessment and STIG compliance data management tool designed to make security testing more efficient, effective and complete. Security assessments, especially those done for DoD and Federal organizations, produce tremendous amounts of scan and compliance data that security engineers must sort through and deconflict, identify untested requirements, and somehow analyze to communicate risk to their employers. Sagacity, originally written to support a government customer, was designed to fill that need. What if an organization could turn massive amounts of irreconcilable vulnerability scan data into true knowledge and insight about their networks? They would be able to make wise decisions resulting in cost-effective actions to improve their security with the best return on investment. Keen insight. Sound judgment. Wise decisions. Sagacity.

    Downloads: 12 This Week Last Update: See Project
  • MASTIFF

    MASTIFF is a static analysis automation framework.

    This repository is no longer updated. Please to go https://git.korelogic.com/mastiff.git/ for the latest version! MASTIFF is a static analysis framework that automates the process of extracting key characteristics from a number of different file formats. To ensure the framework remains flexible and extensible, a community-driven set of plug-ins is used to perform file analysis and data extraction. While originally designed to support malware, intrusion, and forensic analysis, the framework is well-suited to support a broader range of analytic needs. In a nutshell, MASTIFF allows analysts to focus on analysis rather than figuring out how to parse files. The official ChangeLog for the project is located at http://mastiff.sourceforge.net/Files/Changelog.txt.

  • OWASP Zed Attack Proxy Icon

    OWASP Zed Attack Proxy

    Find web application vulnerabilities the easy way!

    The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. Note that this project is no longer used for hosting the ZAP downloads. You should download ZAP via https://github.com/zaproxy/zaproxy/wiki/Downloads Please see the homepage for more information about OWASP ZAP

    Downloads: 4 This Week Last Update: See Project
  • Text Encryption and Decryption Icon

    Text Encryption and Decryption

    Anoncrypt-Text Encryption and Decryption Website in Java(Struts2)

    Anoncrypt by HTCoders is a web based Text Encryption and Decryption Project using Java Technology following Struts2 Framwork . It Consist of two modules > Password based Encryption (Symmetric Encryption) > Self-Destructible Message Service (Once the message is read , it is destroyed and cant be decrypted again .)

    Downloads: 2 This Week Last Update: See Project
  • fastest

    Automate your software testing, the fastest way!

    Fastest stands for 'Fast Automated Software test'. * This is a compilation of various open source tools complemented with a set of useful programs that help a Software Test Engineer perform the test automation with ease. * It can be envisioned as a toolkit that every test engineer would need! * Currently implemented in Java * Test Automation is not just about writing test cases in a particular programming language. There are a lot more activities that need to be accomplished in order to make the test automation really become automatic. * Fastest helps automate all the necessary, but difficult test automation tasks like 'Mapping the test case execution with test plan document, updating centralized test management database, reporting, setup of automated nightly regressions in Continuous Integration (CI) environments, Running code / commands on remote hosts, Interacting with Web services, browser based automation using Selenium, SSH access, Sending Email notifications

    Downloads: 2 This Week Last Update: See Project
  • mod_gnutls Icon

    mod_gnutls

    mod_gnutls apache module

    mod_gnutls uses the GnuTLS library to provide SSL 3.0, TLS 1.0, TLS 1.1 and 1.2 encryption for Apache HTTPD. It is similar to mod_ssl in purpose, but does not use OpenSSL.

    Downloads: 2 This Week Last Update: See Project
  • Is My Download Broken? Icon

    Is My Download Broken?

    a powerful multipurpose checksum utility

    It's a cross platform utility designed for performing various checksumming activities. It supports verity of standards including ADLER-32, CRC-32, MD2, MD5, MURMUR-32, MURMUR-128, SHA-1, SHA-256, SHA-384, SHA-512 and SIPHASH24. Also generated results can be validated within the application. Results can be saved to a text file format. It can batch process folders as well. This tool requires Java Run-time Environment 7 or higher to use.

  • Pkcs11Interop Icon

    Pkcs11Interop

    Managed .NET wrapper for unmanaged PKCS#11 libraries

    This project provides stable releases of Pkcs11Interop project hosted on github. Please visit project website - www.pkcs11interop.net - for more information.

  • NeoLogger Icon

    NeoLogger

    Full Featured Windows Command Line Syslog Logger

    NeoLogger is Windows Syslog Client similar to the logger command known from UNIX/LINUX systems used to send SYSLOG messages. It adds some usefull features to filter and replace content, reads from standard input, files or the windows eventlog. It is also able to watch a file or an eventlog for changes and transmits only the new entries. Logit is an additional tool, that logs process or batch output to a log file or windows Eventlog using predefined prefixes and timestamps. (see the screenshots for an Overview) Please donate some (micro-)bitcoins to my address if you saved time and money by using this free project: 1FvGzQvT3tcN47fxdaNjDeSFU6pAUsqMbn

  • ProGrade Icon

    ProGrade

    Java Security Manager made easy

    The pro-grade library provides implementation of custom Java Security Managers and Security Policies. The main components are the Java Security Policy implementation with deny rules and Policy File generator.

    Downloads: 1 This Week Last Update: See Project
  • exd Icon

    exd

    A command line tool to manage bytes in hex dumps or packet captures

    Command-line tool to examine or edit bytes in hex, octal, binary, or in packet capture (pcap) dumps. Exd is intended to be used in conjunction with hex dump tools such as xxd, od, hexdump, or hd, and with packet capture dump tools such as tshark and text2pcap. --- metadata tags byte hex octal binary pcap packet packet dump hexdump

    Downloads: 1 This Week Last Update: See Project
  • pkcs11-logger

    PKCS#11 logging proxy module

    This project provides stable releases of pkcs11-logger project hosted on github. Please visit project website - https://github.com/Pkcs11Interop/pkcs11-logger - for more information.

    Downloads: 1 This Week Last Update: See Project
  • ANNFiD

    A forensic file identification tool using neural networks

    Just carved a bunch of bytes and have no idea what they could be? Maybe ANNFiD can help. ANNFiD uses neural network to identify byte patterns. It can be trained and has a GUI to help in the process. The tool is still on a very early stage, but could improve exponentially with the help of the developer community

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you