• More...
  • More...

Category Category

    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

    • More...
  • More...

Database Environment Database Environment

Freshness Freshness

Top Apps

  • 2018 Network Intelligence Planning Guide 2018 Network Intelligence Planning Guide Icon
    2018 Network Intelligence Planning Guide Icon

    Get insights on net neutrality, cloud readiness, security and WAN transformation.

    Networking is becoming cloudier, hybrid and more Internet-centric. IT managers now own user experience, whether they own the networks or not. Get our latest ebook to learn how network intelligence will help you adapt to a quickly changing Internet-centric environment.
    Are you involved with your company's network performance/operations team?
    Get Ebook
  • Trial SolarWinds Backup and you could receive a free Amazon Echo Dot Trial SolarWinds Backup and you could receive a free Amazon Echo Dot Icon
    SolarWinds Backup provides lightning-quick recovery that can restore business continuity after a disaster. For a limited time only, when you try SolarWinds Backup and store at least 100GB of selected data, you have the chance to receive a free Amazon Echo Dot.
  • EncFSMP Icon


    Mount EncFS folders - multiplatform style.

    EncFSMP can create, mount and edit EncFS (encrypted file system) folders on Windows and Mac OS X.

  • Easy Python Decompiler Icon

    Easy Python Decompiler

    Python 1.0 - 3.4 bytecode decompiler

    Easy Python Decompiler is python bytecode decompiler, decompiles pyc & pyo files. Python version 1.0 to 3.4 are supported. This project is based two excellent decompiler "Uncompyle2" & "Decompyle++" No python installation is necessary for decompiling! You can decompile a single file or a whole directory. Unicode filenames are supported..

  • b64 -- Base64 Encode/Decode Utility

    base64 RFC1113 Vanilla ANSI-C Code for a portable stand-alone file encode/decode utility. In 2001, I asked people to 'Help me break it!' Since then, 10+years later, the code remains unbroken and is in wide production use world-wide. It has been ported to all major architectures and been used as a template for ports to different computer and human languages. This is very mature and stable code. Although this comes from a project that was constrained by export controls and is used in secure systems, it is not security code per-se. I have therefore altered the 'Export Controls' category.

  • encrypt Icon


    cross-platform, encryption application

    encrypt is a multi-platform, file encryption application. Binary packages are currently provided for Arch, Debian, Fedora, MS Windows, Android and OS X. For further details, including the latest source code, visit

  • Mail Alert Simple Mailer Icon

    Mail Alert Simple Mailer

    Mail Alert Simple Mailer

    Mail Alert Simple Mailer is a simple command-line utility designed for IT administrators for sending e-mail from Microsoft Windows OS. It can be executed from command line, Windows batch file or PowerShell scripts. My main reason for writing this software was to handle events generated by Dell OpenManage Server Administrator (OMSA), APC PowerChute and Windows Events to send hardware status and alerts like temperature alerts, UPS battery status, powerline status and RAID controller alerts from monitoring software. It can be used with any other software where you can configure external application to be executed when specific event occurs. Mail Alert Simple Mailer supports SSL and STARTTLS protocols, so it is compatible with many free e-mail providers like GMail, Hotmail, etc. Unlike other simple command line tools it supports ISO-8859-1, ISO-8859-2 and UTF-8 code pages for national characters. Mail Alert Simple Mailer encrypts SMTP password in configuration file.

  • Locate Sensitive Data across Networks and Workstations Locate Sensitive Data across Networks and Workstations Icon
    Locate Sensitive Data across Networks and Workstations Icon

    Build the Business Case for Effective Security Investments

    Your customers recognize the importance of security, but often don’t realize the urgency until they see something tangible. SolarWinds Risk Intelligence assigns value to your data vulnerability, helping you build a strong business case for data protection and triage the most important problems to tackle. Some powerful features include data risk communicated as financial impact, at-risk data discovery and PCI DSS, PAN & PII scans.

    A header-only C++ library for accessing files in ELF binary format

    ELFIO is a header-only C++ library intended for reading and generating files in the ELF binary format

  • Pyinstaller Exe Rebuilder Icon

    Pyinstaller Exe Rebuilder

    Recompiles pyinstaller exe files

    Pyinstaller exe rebuilder is a tool to recompile/reverse engineer pyinstaller generated executables without having access to the source code. Python version 2.5, 2.6 and 2.7 are supported. (Note : pyinstaller itself supports python 2.4 to 2.7) Within the software you will find detailed help including a video about how to use the tool.

  • Py2Exe Dumper

    Extracts py2exe generated executable

    This has been superseded by a better tool Py2Exe Binary Editor available at: Py2ExeDumper is a tool to extract a py2exe generated executable file. This tool is helpful when the exe is made in "onefile" mode. It extracts the embedded python script and the

    Downloads: 46 This Week Last Update: See Project
  • PC/SC Tracker Icon

    PC/SC Tracker

    Smart card events and smart cards information tracker

    A multi-platform tool for tracking PC/SC events and smart cards states and information. Under Windows, it uses Winscard for PC/SC along with CryptoAPI for retrieving smart card information. Under Linux/MacOSX, it uses pcsc-lite for tracking PC/SC events and it retrieves smart card information by using the file smartcard_list.txt bundled inside the tool and that is provided by the pcsc-tools project.

    Downloads: 25 This Week Last Update: See Project
  • Py2Exe Binary Editor Icon

    Py2Exe Binary Editor

    Reverse engineer py2exe executables

    Py2Exe Binary Editor is a tool to reverse engineer py2exe generated executables. It can dump as well as modify the embedded python dll, PYTHONSCRIPT and

    Downloads: 19 This Week Last Update: See Project
  • One Backup & Disaster Recovery Solution for Any Need One Backup & Disaster Recovery Solution for Any Need Icon
    One Backup & Disaster Recovery Solution for Any Need Icon

    SherWeb Online Backup Is Your Easy Solution for Cloud & Local Backups. The App Is Free, Pay Only for the Cloud Data Storage.

    With the diversity of IT solutions used, managing backup and disaster recovery can turn very complex for a business. SherWeb Online Backup simplifies everything. You back up servers, desktops, virtual machines and smart devices, plus popular applications and Office 365 data – all from a single web-based console. Active Protection, the embedded anti-ransomware feature, adds a security layer while the Cloud-to-Cloud feature saves network bandwidth.
    Are you an IT professional looking for a great security solution to resell?
    Try it FREE for 30 days!
  • Trike

    Trike is a platform-independent tool for systematic, computer-assisted threat modeling, from requirements through deployment.

    Downloads: 16 This Week Last Update: See Project
  • FuTTY Icon


    FireEgl's PuTTY -- FuTTY!

    FuTTY is a fork of PuTTY and PuTTYTray.

    Downloads: 13 This Week Last Update: See Project
  • OWASP Juice Shop Icon

    OWASP Juice Shop

    An intentionally insecure Javascript Web Application

    OWASP Juice Shop is an intentionally insecure web application written entirely in Javascript which encompasses the entire range of OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. It was the first application written entirely in JavaScript listed in the OWASP VWA Directory. The application contains a vast number of hacking challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. The hacking progress is tracked on a score board. Finding this score board is actually one of the (easy) challenges! Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a "guinea pig"-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.

    Downloads: 11 This Week Last Update: See Project
  • Mercenary Linux Icon

    Mercenary Linux

    Linux Distro Built specifically for Cyber Hunt Team Operators

    The MERCENARY Linux Distro is Built specifically for Cyber Hunt Team Operators. This is the first iteration of this distro, with several tools, including Mercenary Hunt Framework being added with the next release (Early 2017). This Distro contains the most well known and respected forensic tools all conveniently installed on one system. Tools included are: mercenary hunt framework(**soon), Powershell, OMI, SIFT, wmic, winexe, radare2, viper, pescanner, jsdetox, volatility, maltrieve, rekall, mastiff, v8, crits, bro, netsniff-ng, wireshark, chopshop & Much More. Many of these run within prebuilt dockerized containers. This distro is a premium toolkit for any network, system, or malware analysis expert! The project & full Documentation is available as an .iso from & MD5 c1e74d342e9dc290e26450aba806ed18

  • TrojanCockroach Icon


    A Stealthy Trojan Spyware

    This program is a Trojan Virus that steals data (ID, password; every key stroke) from PC (Windows XP or later) and emails it back to the host. It spreads among PCs through USB drives. It is almost undetectable to any antivirus software.

    Downloads: 8 This Week Last Update: See Project
  • python-port-scanner

    A fast and multithreaded port scanner with GUI that is developed using

    A fast and multi-threaded port scanner built in python. It scans the hosts port and return the open ports within a mean time. The GUI is built with the python's tkinter module.

    Downloads: 8 This Week Last Update: See Project
  • rlink

    ssh-tunnel instead vpn in one exe

    Create ssh-tunnel, run another programm and store settings in self. It is easier than to create a vpn and write instructions for the users.

    Downloads: 8 This Week Last Update: See Project
  • ClamSAP

    ClamSAP exists of two 'C' shared libraries which link between ClamAV and the Virus Scan Interface (VSI) of SAP (offical name: NW-VSI). A SAP application can use the ClamAV engine to scan for malicious uploads in HTTP uploads for example.

    Downloads: 4 This Week Last Update: See Project
  • SecurityManager

    Web application to configure RBAC of different applications

    This application can manage the different ACL's/Users for different applications and expose them through webservice or database views using WAMP/LAMP

    Downloads: 3 This Week Last Update: See Project
  • PentDroid

    Small tool for apk operations required during android app pentesting

    Tools consist of mini modules which automates and reduces tester efforts for setting up the basic environment and typing long tool queries . For Installation guide refer :

    Downloads: 2 This Week Last Update: See Project
  • APIthet

    An Application to security test RESTful web APIs.

    APIthet is an application to security test RESTful web APIs. Assessing APIs help in detecting security vulnerabilities at an early stage of the SDLC. Compare this with assessing an Android application that uses APIs on a backend server. This kind of assessment happens at a much later phase of the SDLC. Even worse, it does not necessarily touch all the APIs. That's not all. You specify one of the JSON parameters as random. This helps set a unique value for a specific JSON parameter in an API. The application is available as a Windows exe file.. In progress and planned features: -More test cases to attack target API. -Add APIs and define sequence. -Read APIs from doc link. -Business Logic test. TODO: Build for Linux (and may be OS X).

    Downloads: 1 This Week Last Update: See Project
  • FloatingBridge Icon


    Simple messaging \ Workflow \ETL system on MySql and .NET

    FloatingBridge is a simple messaging\ workflow system based on MySql and .NET. MySql is used as the backend engine for the system. The front-end is designed in .NET WPF (Windows Presentation Foundation). The business logic is handled by .NET windows services. The system provides an API which can be used to publish messages and pull subscribed messages out of the system. Therefore, this can be used as a messaging Hub in an organisation. The system also has the ability to define workflows using a JSON format. The workflows can be synchronous or long running & asynchronous. The data format supported for all messages & workflows is JSON. However, the system has inbuilt data format converters that convert to and from other data formats like XML and user defined formats.

    Downloads: 1 This Week Last Update: See Project
  • PotHead


    PotHead What is it? Pothead: A simple lightweight packet for creating a minimal interaction honeypot How does it work? Magic, Well kinda you don’t need super dupper knowledge to use this! Oops the magic failed ;) a really nice will be written unfortunately it’s not yet available. 1) Download all the files 2) Check if you got everything 3) Upload and configure the Website and backend (includes/Config.php & the .SQL files) 4) Do not forget to change your APIKEY! 5) Run the python file! -pp 22 23 -site http://YOURSITE.COM/api/write.php -apikey YOURAPIKEY 6) Profit! Is this for anyone? Hmmmm, yes and no I would suggest you know a thing or two about PHP & Python. It’s a pre-release and still in the early alpha stage. Is it safe? It’s pretty safe ;) Does it work? Yeah check it live!

    Downloads: 1 This Week Last Update: See Project
  • VersionInfo Icon


    Generate file version information

    This command-line utility produces a report of file information including version information where available. The reports can be useful for release information, manifests, and integrity verification.

    Downloads: 1 This Week Last Update: See Project
  • CK 64 Kernel

    The CK 64-Bit Kernel Operating System

    This project is a implementation of layers. Use Virtual machines & virtual adapters alike an onion! Another operating solution instead of Microsoft Windows Server operating system. It is to be used via remote controlling. The special new "Cktool32" will make it easy to handle *Ck64Krnl*.

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you