Showing 220 open source projects for "security"

View related business solutions
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Streamline Azure Security with Palo Alto Networks VM-Series Icon
    Streamline Azure Security with Palo Alto Networks VM-Series

    Centrally manage physical and virtualized firewalls with Panorama

    Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
    Learn more
  • 1
    Logcheck is software package that is designed to automatically run and check system log files for security violations and unusual activity. Logcheck utilizes a program called logtail that remembers the last position it read from in a log file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    A stable and fast Linux/Unix toolset to aid in the security and ease of use of *Nix.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Status Module is a daemon which forwards vital system information (memory usage, active processes, etc.) into the kernel logs by using a kernel module. This is very useful for logging or security purposes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    trafanal monitors your complete network offering realtime statistics who sends/recvs how much packets/bytes from whom its a really good placed on a router, showing you who takes which bandwidth, and who made how much traffic
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 5
    Alist is a program that collects hardware and software information about systems and stores it in a database for users to browse and search via a Web interface. The program consists of three parts: a client portion that collects the information, a daemon
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Port of the sysklogd daemon that logs to a MySQL database. Useful for configuring a centralized logging server, or a secure syslog environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A suite of tools (a sniffer, a TCP hijacker, an ARP poisoner and a TCP tunnel through ICMP/IGMP packets) created for testing TCP/IP weakness and using them in a non-conventional way. [Up to now I've done only the sniffer-related part]
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    TCP-Beholder is a client/server traffic sniffer with a userfriendly gui.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Protowatch is a userspace extension to Linux\'s 2.4 iptables firewalling code. Userspace will dynamically start a server to accept the packet, and log whatever the client sends. Useful for discovering what protocols are in use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 10
    A replacement to traditional syslog daemons. Including cryptographic log protection, mysql, postgresql. Supported on Linux, BSD, Irix, Solaris and AIX.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Syslog-sec, provides an open secure syslogd implementation based on (RFC) standards, including rfc3164 ("syslog") and the upcoming "syslog-sign" . Other extensions, will/can be added. More tools will be added, too
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    UNIX billing system, for network servers, voip, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The Secure Remote Log Monitor (SRLM) project provides client and server utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    my-swatch pretends to be an implementation of msyslog and swatch together. What it pretends to accomplish is put all together, to log events to a remote database (like msyslog) and to awake triggers (like swatch).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    startx is the project name for an interface build in php which takes the output of some products like MRTG or awstats or ACID... and put them together in the same Web interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Automated Computer Auditing Daemon - Keep a track of what's going on with your systems: suid, sgid, world writable, hidden and unowned files monitoring as well as important file's md5sums management audits sent to your mailbox on a regular basis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    KISS is a kernel-side host-oriented security tool, which may bring you file integrity checking, file and process hiding and actions handling on special internal events (using a tiny scripting language).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A linux kernel module and supporting user space environment which allow interception and modifying system calls that match user defined criteria. Think of it as strace on steroids.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A set of simple shell scripts to query (via SNMP) any router in an enterprise network for a list of active ARP cache entries. These entries are then merged into a host table with timestamp of last seen entry.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Wonder who deleted that important file on your Linux box? Did your database files "mysteriously" disappear from that super-secure Linux database server and you don't know how? Now your system logs will tell who, what, when, and how with Auditunlink
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This very simple perl script parses you iptables log files and produces a report in text format with a summary based on the prefix of the log ( --log-prefix option of iptables ). Prefix description is allowed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Rule MANagaer for Snort A PHP addon for snort to manage the rulesets on multiple sensors from a central Snort MySQL db. Main Features: Ruleset merging by group from snort CVS. Automatic sensor update from central DB
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Statistical Casting Daemon

    SCASTD (Statistical Casting Daemon)

    SCASTD (Statistical Casting Daemon) is a lightweight, high-performance statistics collection and analytics engine we designed specifically for streaming media infrastructure. Unlike traditional streaming servers, we built SCASTD to be the definitive monitoring solution that bridges legacy and modern streaming protocols, providing unified analytics across your entire streaming ecosystem
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    ProSum is a terminal based program that protects your files, sys_call_table and IDT like tripwire way (All in user space, without kernel modules) In addition, database with files etc. could be encrypted with Blowfish algorythm and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Multi Purpose scanner written in C; fast, flexible, useful to check the banner sent by a specific service.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB