Showing 21 open source projects for "security"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 1
    Elasticsearch

    Elasticsearch

    A Distributed RESTful Search Engine

    Elasticsearch is a distributed, RESTful search and analytics engine that lets you store, search and analyze with ease at scale. It lets you perform and combine many types of searches; it scales seamlessly, and offers answers incredibly fast with search results you can rank based on a variety of factors. Elasticsearch can be used for a wide variety of use cases, from maps and metrics to site search and workplace search, and with all data types.
    Downloads: 17 This Week
    Last Update:
    See Project
  • 2
    FlowBuffer

    FlowBuffer

    Buffers, forwards, and splits flow data including NetFlow and IPFIX

    FlowBuffer is a flow/netflow buffer and splitter: configure your switch to push flow data into FlowBuffer, and FlowBuffer forwards it to unlimited destinations. Offloads processing from the switch to another machine. Centralized management. Runs on Windows.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    Untangle
    Untangle is a Linux-based network gateway with pluggable modules for network applications like spam blocking, web filtering, anti-virus, anti-spyware, intrusion prevention, bandwidth control, captive portal, VPN, firewall, and more. Visit http://untangle.com
    Downloads: 31 This Week
    Last Update:
    See Project
  • 4

    LogDruid

    Generate charts and reports using data gathered in log files

    An application to gather, aggregate, chart and report information originating from any log files. It uses regular expressions that are constructed graphically and can be tested in the application against samples. Once configured for a specific type of log file set, the gathering and display of the chart for a new files set can be done in just one click. Contains a sample template to handle few log types: Java GC log, OpenDS access log, Apache access log
    Downloads: 0 This Week
    Last Update:
    See Project
  • CompanyCam is a photo-based solution created for contractors, by contractors. Icon
    CompanyCam is a photo-based solution created for contractors, by contractors.

    Take photos, track progress, and collaborate on tasks with job site management tools and AI shortcuts for every phase of any project.

    Take unlimited photos—which are location and time-stamped, sent to the cloud, and stored securely. Every photo is organized by project and instantly available to your team, allowing you to see what’s going on anytime, anywhere. Annotate photos with drawings, arrows, comments, tags, and voice notes, and create project timelines, photo galleries, reports, and transformation photos through the app. Sharing photos with customers and insurance adjusters has never been easier, and keeping your entire process organized has never been simpler.
    Learn More
  • 5

    CorReactive

    Event correlation engine with reactive facilities

    Correlation engine based on Esper library which can be used together with Logstash. Please read FAQ http://sourceforge.net/p/correactive/wiki/FAQ/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Cyberoam iView - Open Source SIEM
    Cyberoam iView; the Intelligent Logging & Reporting solution provides organizations network visibility across multiple devices to achieve higher levels of security, data confidentiality while meeting the requirements of regulatory compliance. To know more about Cyberoam and it’s security solutions visit us at www.cyberoam.com.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    Is My Download Broken?

    Is My Download Broken?

    a powerful multipurpose checksum utility

    It's a cross platform utility designed for performing various checksumming activities. It supports verity of standards including ADLER-32, CRC-32, MD2, MD5, MURMUR-32, MURMUR-128, SHA-1, SHA-256, SHA-384, SHA-512 and SIPHASH24. Also generated results can be validated within the application. Results can be saved to a text file format. It can batch process folders as well. This tool requires Java Run-time Environment 7 or higher to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    MBMLog

    Log collector for FortiGate units (v4 MR3)

    MBM-Log allows to look deeply in collected logs (not only Top 10). All charts are generated on demand. You can easily filter data. MBM-Log can help you with FortiGate diagnostics via SSH (built in commands) Java GUI application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • ACI Learning: Internal Audit, Cybersecurity, and IT Training Icon
    ACI Learning: Internal Audit, Cybersecurity, and IT Training

    Proven skill building for every aspect of your support or IT team.

    Traditional training doesn't equip employees with the practical skills they need to drive business success. ACI Learning provides hands-on IT and cybersecurity training designed to build real-world, on-the-job skills. Our outcome-based programs empower employees with certification prep, industry-recognized credentials, and flexible learning options. With expert-led video training, labs, and scalable solutions, we help businesses, individuals, governments, and academic institutions develop a skilled workforce, align with business goals, and stay ahead in a rapidly evolving digital world.
    Learn More
  • 10
    DAD is a Windows event log and syslog management tool that allows you to aggregate logs from hundreds to thousands of systems in real time. DAD requires no agents on the servers or workstations. Correlation and analysis is driven through a web front end.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A tool to monitor internet hosts` bandwidth usage in a Linux-NAT network. A daemon collects data and clients display them (currently a Java applet with a graph). It automatically detects new hosts and has a nice summary statistic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The High Interaction Honeypot Analysis Toolkit (HIHAT) allows to transform arbitrary PHP applications into a web-based Honeypot. A semi-automatic user interface supports the analysis process, scans for attacks etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    SAWS is a Secure Audit Service that cryptographically protects all log messages. It can run as either a standalone web service called SAWS (Secure Audit Web Service) or as a Java Secure Audit Trail Service (JSATS) that is called via a Java API.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Cherubim takes a snapshot of the computer screen and stores the image in a log file. The log file can then be played back like a movie.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Uberviewer is a java/swt log processor for Uberlogger (a kernel-based observatory). It allows real-time analysis of a remote OS, including process and I/O monitoring. This tool is intended to be helpful for security researchers and malware analysts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A stable and fast Linux/Unix toolset to aid in the security and ease of use of *Nix.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    TCP-Beholder is a client/server traffic sniffer with a userfriendly gui.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The Secure Remote Log Monitor (SRLM) project provides client and server utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    startx is the project name for an interface build in php which takes the output of some products like MRTG or awstats or ACID... and put them together in the same Web interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    A client/server application designed to let the user monitor a directory tree on a remote machine by creating snapshots of current file status in order to later detect file modification, addition and/or removal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Remote Web Logger is a remote web transaction logging daemon. It operates by passive monitoring of web server traffic to translate web session data to transaction log entries that are written to standard log services such as syslog.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next