Search Results for "cloud security" - Page 11

Showing 323 open source projects for "cloud security"

View related business solutions
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    veinmind-tools
    - Supports detection of abnormal historical commands, malicious files, weak passwords, sensitive information, backdoors, etc. - Support image asset inventory, inventory image and image software assets. - Support local images scanning and repository images scanning, and integrate with mainstream image repositories such as Docker Hub. - Support mainstream CI/CD integration such as GitHub action and jenkins. - Run in parallel container mode, no need to compile separately, out-of-the-box. -...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Kubernetes External Secrets

    Kubernetes External Secrets

    Integrate external secret management systems with Kubernetes

    Kubernetes External Secrets allows you to use external secret management systems, like AWS Secrets Manager or HashiCorp Vault, to securely add secrets in Kubernetes. Read more about the design and motivation for Kubernetes External Secrets on the GoDaddy Engineering Blog. The community and maintainers of this project and related Kubernetes secret management projects use the #external-secrets channel on the Kubernetes slack for discussion and brainstorming. The project extends the Kubernetes...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Authing

    Authing

    IDaaS/IAM solution that can Auth to web and mobile applications

    Authing quickly implements authentication and user management for any Web, App, and enterprise software to provide the most complete login solution for your customers and employees. Authing serves as an identity infrastructure, or Identity As A Service (IDaaS) for cloud computing. Authing focuses on identity and building social infrastructure for identity sharing across all SaaS software and users to help companies build a secure modern IT infrastructure that not only protects their business...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    CloudMapper

    CloudMapper

    CloudMapper analyzes your Amazon Web Services (AWS) environments

    CloudMapper helps you analyze your Amazon Web Services (AWS) environments. The original purpose was to generate network diagrams and display them in your browser (functionality no longer maintained). It now contains much more functionality, including auditing for security issues. If you want to add your own private commands, you can create a private_commands directory and add them there. You must have AWS credentials configured that can be used by the CLI with reading permissions for the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    StreamAlert

    StreamAlert

    StreamAlert is a serverless, realtime data analysis framework

    StreamAlert is a serverless, real-time data analysis framework that empowers you to ingest, analyze, and alert on data from any environment, using data sources and alerting logic you define. Computer security teams use StreamAlert to scan terabytes of log data every day for incident detection and response. Incoming log data will be classified and processed by the rules engine. Alerts are then sent to one or more outputs. Rules are written in Python; they can utilize any Python libraries or...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Elastix

    Elastix

    Unified Communications Server

    Elastix is a software-based PBX powered by 3CX and based on Debian. An open-standards solution, Elastix is an easy to install and manage UC system compatible with popular IP phones, gateways and SIP trunks. Elastix is complete with unified communications features such as integrated WebRTC video conferencing, chat, presence and softphones and smartphone clients for Windows, Mac, iOS and Android.
    Leader badge
    Downloads: 129 This Week
    Last Update:
    See Project
  • 7
    Krustlet

    Krustlet

    Kubernetes Rust Kubelet

    ...It acts as an alternative node agent that integrates with Kubernetes while replacing the container runtime with a WebAssembly runtime, allowing applications to be deployed as Wasm modules. This approach provides improved startup times, stronger security isolation, and reduced resource consumption compared to containers, making it particularly appealing for edge and cloud-native environments. Krustlet supports WASI (WebAssembly System Interface), enabling Wasm modules to interact with system resources in a controlled and standardized way. It is designed to integrate seamlessly into existing Kubernetes clusters, allowing developers to schedule and manage Wasm workloads using familiar Kubernetes APIs and tooling.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Parrot Project

    Parrot Project

    Security, Development and Privacy Defense, all in one place.

    Parrot is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on Debian and developed by Frozenbox network.
    Leader badge
    Downloads: 152 This Week
    Last Update:
    See Project
  • 9
    SpringAll

    SpringAll

    Step by step, learn Spring Boot, Spring Boot & Shiro, Spring Batch

    SpringAll is a comprehensive learning project that gathers a wide range of Spring, Spring Boot, and Spring Cloud demos in one repository. It is designed for developers who want to deepen their understanding of the Spring ecosystem by exploring concrete, runnable code samples. Each module focuses on a specific technology or integration—covering web applications, ORM frameworks, microservices, caching, messaging, security, distributed systems, and monitoring.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    DropYet

    DropYet

    It's the simple cloud.

    With DropYet you can manage your personal files in the easiest way. And it's not that bad looking. :) Enjoy the security, simplicity and beauty of DropYet. Upload, rename and delete files. The simpliest manager of files and folders. Furthermore, there are more features like securely sharing files, password encryption and encrypted file detection. Setting it up is easier than ever before. Just try DropYet. Currently working on MORE features for you. Now with Dark...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    CloudBrute

    CloudBrute

    Awesome cloud enumerator

    A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, Linode). The outcome is useful for bug bounty hunters, red teamers, and penetration testers alike. While working on HunterSuite, and as part of the job, we are always thinking of something we can automate to make black-box security testing easier. We discussed this idea of creating a multiple platform cloud brute-force hunter.mainly to find open buckets, apps, and databases hosted on the clouds and possibly app behind proxy servers. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    sWAF

    sWAF

    A simple Web Application Firewall docker image

    ...It runs NGINX as a dedicated reverse proxy embedding powerful WAF engines: ModSecurity 3, using OWASP® ModSecurity Core Rule Set (CRS) rules, and NAXSI. It uses acme.sh for Let's Encrypt and other free CA support. A lot of people are self-hosting their own cloud infrastructure (using Nextcloud, Synology, QNAP, a cloud lease server or home-made solutions...), but we can never be too much paranoid about web security for a lot of good reasons. Too much time security is left on the background, or only by using some basic - but not sufficient - options and applications are front-faced to the big bad Internet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    TrumpetBox Contactless Kiosk  Admin

    TrumpetBox Contactless Kiosk Admin

    Guest WIFI and SMS Marketing Kiosk System

    The TrumpetBox Contactless Kiosk is a business guest WIFI and SMS marketing kiosk system that turns your clients mobile phone into an information kiosk. TrumpetBox kiosk is an access point that your clients connect to while at your business location and view your interactive kiosk interface to perform services or opt-in to receive marketing and outbreak notifications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Keep up-to-date with the latest news - Visit MeoPOS's main site https://meopos.com/about-meopos/meopos-news/ MeoPOS v4.5 is the latest release.MeoPOS v4.5 is the latest Point Sale Program. Get the latest MeoPOS v4.5 if you would like to make a contribution and support the project or need business support help. MeoPOS is a multi-lingual - 17 languages - commercial-grade POS (Point-Of-Sale) software. It is multi-location, multi-terminal and multi-user and runs on industry standard...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    motionEyeOS

    motionEyeOS

    A video surveillance OS for single-board computers

    motionEyeOS is a Linux distribution that turns a single-board computer into a video surveillance system. The OS is based on BuildRoot and uses motion as a backend and motionEye for the frontend. Compatible with most USB cameras as well as with the Raspberry PI camera module. Motion detection with email notifications and working schedule. JPEG files for still images, AVI files for videos. Connects to your local network using ethernet or wifi. File storage on SD card, USB drive or network SMB...
    Downloads: 27 This Week
    Last Update:
    See Project
  • 16
    iHome by ionware

    iHome by ionware

    iHome Smart Home System Platform

    iHome is a fully tested Smart Home Automation system using the Raspberry Pi Zero WiFi SBC and Linux OS and has all the functional features of NEST or ECOBEE smart thermostats with the added benefit of full privacy and security at less than half the price! It incorporates MBLogic with algorithms and Modbus coms for HVAC home control via the ionware modbus compatible ionC1 input/output controller board. The iHome software system comes fully configured as a SD Card image file for...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Unified Sessions Manager

    Unified Sessions Manager

    Pioneering Private and Public Cloud Management since 2008

    The UnifiedSessionsManager supports the integrated management of user sessions within Private-Clouds, comprising heterogeneous IT landscapes of various physical and virtual machines, hypervisor management, and virtual user sessions with remote desktops. Extracted documents see https://sourceforge.net/projects/ctys-doc.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    RocketMiX

    RocketMiX

    RocketMix API Platform

    Go to project's home page here (in french only) : https://rocketmix.github.io Go to source code and technical documentation here : https://github.com/rocketmix/rocketmix.source RocketMiX is an open source API platform build on "classic" Spring and Netflix components. It contains : * a routing server * a management server (which embeds a directory of your APIs and a monitoring UI) * a Spring Boot Starter module (hosted on Maven central) RocketMiX aims to be a simplified API...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    DNSGen

    DNSGen

    Intelligent DNS permutation tool for subdomain discovery

    DNSGen is an open source DNS name permutation tool designed primarily for security researchers and penetration testers who need to discover potential subdomains during reconnaissance and attack surface mapping. It analyzes existing domain names and generates numerous intelligent variations that may represent valid subdomains within an organization’s infrastructure. These generated permutations help identify hidden or unlisted services that may not appear in standard DNS queries or public records. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    horcrux

    horcrux

    Split your file into encrypted fragments

    ...It uses the Shamir Secret Sharing scheme to break an encryption key into multiple pieces, such that only a threshold of them can reconstruct the original file. You select the number of fragments to create and the minimum number required to recover the file, then scatter the fragments (e.g., on USBs or cloud locations). The tool provides a “split” command to create the fragments and a “bind” command to recombine them to the original file. It’s especially aimed at people who want strong security for sensitive large files and want to avoid remembering complex pass-codes, and also those who may distribute fragments across multiple locations. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    PacBot

    PacBot

    PacBot (Policy as Code Bot)

    Policy as Code Bot (PacBot) is a platform for continuous compliance monitoring, compliance reporting and security automation for the cloud. In PacBot, security and compliance policies are implemented as code. All resources discovered by PacBot are evaluated against these policies to gauge policy conformance. The PacBot auto-fix framework provides the ability to automatically respond to policy violations by taking predefined actions. PacBot packs in powerful visualization features, giving a simplified view of compliance and making it easy to analyze and remediate policy violations. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Google Drive Permission Manager

    Update Google drive permissions in bulk mode

    Driver permission changer is an open source application created to change permission of google drive files and folders in bulk mode . The files can be some safe points and it is hard to change it manually by going to each file one by one . You can also specify a list of users or configure the link sharing option just in One Click
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    Kamus

    Kamus

    An open source, git-ops, zero-trust secret encryption and decryption

    An open source, GitOps, zero-trust secrets encryption and decryption solution for Kubernetes applications. Kamus enables users to easily encrypt secrets that can be decrypted only by the application running on Kubernetes. The encryption is done using strong encryption providers (currently supported: Azure KeyVault, Google Cloud KMS, Amazon Web Services KMS, and AES).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    BLESS

    BLESS

    An SSH Certificate Authority that runs as an AWS Lambda function

    BLESS is an SSH Certificate Authority that runs as an AWS Lambda function and is used to sign SSH public keys. SSH Certificates are an excellent way to authorize users to access a particular SSH host, as they can be restricted for a single-use case, and can be short-lived. Instead of managing the authorized_keys of a host, or controlling who has access to SSH Private Keys, hosts just need to be configured to trust an SSH CA. BLESS should be run as an AWS Lambda in an isolated AWS account....
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    cloudfront-auth

    cloudfront-auth

    An AWS CloudFront Lambda@Edge function to authenticate requests

    Upon successful authentication, a cookie (named TOKEN) with the value of a signed JWT is set and the user redirected back to the originally requested path. Upon each request, Lambda@Edge checks the JWT for validity (signature, expiration date, audience and matching hosted domain) and will redirect the user to configured provider's login when their session has timed out. If your CloudFront distribution is pointed at a S3 bucket, configure origin access identity so S3 objects can be stored...
    Downloads: 1 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB