Showing 220 open source projects for "security"

View related business solutions
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 1

    pipedump

    Proxies data from stdin/stdout/stderr and logs it in pcap files.

    The pipedump forks a process and then executes the specified command, acting as a proxy for STDIN, STDOUT, and STDERR. Debug data and data sent to STDIN are recorded as a IPv6 UDP packets traversing from ::1 to ::. Data received from STDOUT and STDERR are recorded as a IPv6 UDP packets traversing from :: to ::1. STDIN is recorded as port 19840, STDOUT as port 19841, STDERR as port 19842 and debug information as port 65535. The captured data is recorded in a file which can be...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    NeoLogger

    NeoLogger

    Full Featured Windows Command Line Syslog Logger

    NeoLogger is Windows Syslog Client similar to the logger command known from UNIX/LINUX systems used to send SYSLOG messages. It adds some usefull features to filter and replace content, reads from standard input, files or the windows eventlog. It is also able to watch a file or an eventlog for changes and transmits only the new entries. Logit is an additional tool, that logs process or batch output to a log file or windows Eventlog using predefined prefixes and timestamps. (see the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Logsurfer is a program for monitoring system logs in real-time, and reporting on the occurrence of events. It is capable of grouping information together to enhance loganalysis and create automatic reports.
    Leader badge
    Downloads: 22 This Week
    Last Update:
    See Project
  • 4
    LOGalyze CLI

    LOGalyze CLI

    Command line client interface for LOGalyze 4

    Command line LOGalyze client. logalyze-cli is a powerful command line client for managing LOGalyze engine. With LOGalyze application log analyzer, you can collect your log data from any device, analyze, normalize and parse them.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5

    TCP/UDP footprint analysis

    TCP/UDP endpoint analysis and mapping utility.

    Providing users the ability to with accuracy map all inbound and outbound TCP/UDP connections to a Process ID and process owner. The application will also map a port to various performance metrics like processor and memory utilization.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    syslog proxy daemon

    syslog proxy daemon

    creates an extra socket for syslog (e.g. in a chroot jail)

    Developed for systems that have an older version of syslogd which does not support multiple sockets (e.g. via the '-a' flag). Performs extensive message validation according to RFC 3164
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    LUARM

    LUARM

    A detailed user action logging engine

    The Logging of User Actions in Relational Mode (LUARM) is a logging/audit engine designed to record in detail user actions in a Relational Database Management System (RDBMS). You can then have an organized 'who is doing what' view in your system, being able to easily correlate program execution, file access and network endpoint activity to user entities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    TDSpy

    Family Keylogger

    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Pyama

    Open Source System and Network Monitoring for Linux Desktop

    Open Source system and network monitoring application for desktop Linux user. It gives end-user broader view of what happening on their system. The basic idea is give linux user application that can monitor system like many commercial antivirus HIDS.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Streamline Azure Security with Palo Alto Networks VM-Series Icon
    Streamline Azure Security with Palo Alto Networks VM-Series

    Centrally manage physical and virtualized firewalls with Panorama

    Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
    Learn more
  • 10

    pproxyd

    Passive Proxy Daemon sniffs packets and creates squid proxy logs

    Passive Proxy Daemon (pproxyd) has moved to GitHub (https://github.com/rondilley/pproxyd ) This tool reads pcap format files or reads packets directly from the network, assembles web based traffic and generates squid proxy style logs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    VeloApport

    Log and track user/computer info in MS Windows environments

    A system to log and track user logons, logoffs, computer information, and statistics in a Microsoft Windows environment. It includes a client side application (veloapport.exe - intended to be run as a logon and logoff script) and an analyzer (veloapportdetective.py) reporting hardware changes and populates a computer inventory table. The client (veloapport.exe) sends user and machine information to a MySQL database server and VeloApport Detective populates a computer inventory table while...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    This page is about my port of the atop tool to FreeBSD platform. Atop is an ASCII full-screen performance monitor that is capable of reporting the activity of all processes (even if processes have finished during the interval), daily logging of sys
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A syslogd supporting on-demand disk buffering, TCP, writing to databases, configurable output formats, high-precision timestamps, filtering on any syslog message part, on-the-wire message compression, and the ability to convert text files to syslog.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    eEvidence Analyzer is an open source digital forensic analysis toolkit.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Insidias is a next-generation intrusion detection engine, with a focus on speed, efficiency, advanced pattern matching, parallel-processing, modularity, and expandability.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A C library with support for logging, configuration, networking, message specification, semaphores, message queues, SSL, timing, epoll and email functionality.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Basic Key Logger
    Non-stealth keylogger for Windows. Records mouse and keyboard (precision~10-15ms), log of events (disk size~2.5k/s) + log of operations (~ 0.2k/s). Standalone, with local copy of Python: unzip to install, delete to uninstall.NEW: hidden/visible icon
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Enchanted Keyfinder
    NOTE PROJECT MIGRATED TO GITHUB - https://github.com/samrocketman/ekeyfinder is a Magical Jelly Bean Keyfinder fork. It is a utility that retrieves the product key used to install Windows from your registry or from an unbootable Windows installation. It works on Windows 9X, ME, NT/2K/XP, and Vista/Win7 and for other software.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 19
    Network Keylogger
    Network Keylogger is a program that sends every key pressed in a computer to another computer, via TCP/IP.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 20
    This keylogger will say on the window that it is scanning files but it is actually logging keys (only characters and space, more willl come soon!!! Please enjoy Thylakoid! (supports ALL windows 32-bit versions
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Slogger is a session keystroke logging utility. The goal of the design is to provide the same features available in many commercial products, but under the GNU license.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Php-Loging-System is a front-end for viewing syslog-ng messages and snort alerts logged to MySQL in real-time, with Apache, Bash, and Squid detailed searching and analysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    DAD is a Windows event log and syslog management tool that allows you to aggregate logs from hundreds to thousands of systems in real time. DAD requires no agents on the servers or workstations. Correlation and analysis is driven through a web front end.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    watches for Regristry-changes of keys like HKLMSoftwareMicrosoftWindowsCurrentVersionRun etc. and pops up if something has changed, logs it, can ask google for the key found. Protects against Trojans and Viruses.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    A hardware supported hypervisor originally built for malware analysis. Features: Linux VM introspection, minimal detectability, small (~150KB), simple, and well documented. Can be used for other purposes. Support for Intel-VT & Windows coming soon.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB