Showing 172 open source projects for "security linux"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    watches for Regristry-changes of keys like HKLMSoftwareMicrosoftWindowsCurrentVersionRun etc. and pops up if something has changed, logs it, can ask google for the key found. Protects against Trojans and Viruses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    A tool to monitor internet hosts` bandwidth usage in a Linux-NAT network. A daemon collects data and clients display them (currently a Java applet with a graph). It automatically detects new hosts and has a nice summary statistic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    TILT is a set of terminal logging and playback tools for auditing telnet and SSH connections made from a bastion host. It provides timestamped logs and real time playback of logs for incident reports, incident analysis or as a training aid
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Linux X.Org Record Extension C Keylogger.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    Labrador is a Host-based Intrusion Detection System (HIDS) and Integrity Checker written entirely in Perl. It aims to be a complete, free, multiplatform, and open-source solution for detecting modifications and tamperings in files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Strokey is a small hardware keyboard logger saving all keystrokes into an EEPROM memory for later investigation. The device may get attached to any PS/2-keyboard by intercepting the cable, or get placed directly inside for maximum invisibility.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Nuhe is a log monitoring system, which is capable of alarm generation and action when rules are matched against log(s) activity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    alerttail tails a file and triggers events based on regex matching. Notify (libnotify), sys command, filtering and geoip localization actions are provided. Highly configurable via config file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    hawKeye, the next generation cyber-surveillance system
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 10
    Nuhe Client is a project related to the Nuhe Action Capable Log Monitor. This GUI client simplifies the administration of sensors and node managers, making it easier to control and monitor the network. Comes with a rule editor as well as a log monitor.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    ccsrch is a tool that searches for and identifies unencrypted and contiguous credit card numbers (PAN) and track data on windows and UNIX operating systems. It will also identify the location of the PAN data in the files and record MAC times.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 12
    augrok is a Linux audit log analysis tool written in Perl that provides searches based on real and effective user/group ids along with login id, executable name, terminal, within a time range, regular expression matching, and so much more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Changetrack logs modifications of a set of files, and allows recovery of the tracked files from any stage of development. The changes are presented in a powerful web-based form, a text file, or an email message. A handful of options allow situation-specif
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    An ARP watch daemon for windows (portable to linux but it is already there...) which is able to be run as a service and logs to eventlog so one can collect the logs and react to events.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    The High Interaction Honeypot Analysis Toolkit (HIHAT) allows to transform arbitrary PHP applications into a web-based Honeypot. A semi-automatic user interface supports the analysis process, scans for attacks etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    devialog is a behavior/anomaly-based syslog intrusion detection system which detects unknown attacks via anomalies in syslog. It can generate signatures for ease of management, act upon anomalies in a predefined fashion or perform as a standard log parser
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ettercap-gg is a Gadu-Gadu IM ettercap dissector. It is a patch for ettercap sniffer that adds the ability to sniff Gadu-Gadu logins, passwords and messages. Gadu-Gadu (www.gadu-gadu.pl/) is the most widely used IM network in Poland with ~6mln users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A framework for information security management. It has the centralized server for managing the IDS sensors, log consolidation and correlation, report generation etc. Also it has customized IDS sensor based on snort.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Scour: a Perl script able to find lines in log files matching a given Perl regular expression. It counts matches within given time periods, and reports on whether the number of matches exceeds a given count, shows matching lines, or executes a command.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    SAWS is a Secure Audit Service that cryptographically protects all log messages. It can run as either a standalone web service called SAWS (Secure Audit Web Service) or as a Java Secure Audit Trail Service (JSATS) that is called via a Java API.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    "Google Hack" Honeypot Project. GHH is written in PHP and assists the development of web based honeypots designed to lure search engine hackers.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 22
    What are the packets rejected by your Netfilter based firewall today ? How often this suspicious host try to connect to your box ? What are the most rejected domains ? Who is this strange host which scan your ports ? The responses are in the iptables log
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    PIX Logging Architecture correlates Cisco PIX system logs into a MySQL database and provides a web-based frontend for displaying, searching, and managing Cisco PIX logged events, traffic, and IDS logs (More info at http://www.logging-architecture.net ).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Cherubim takes a snapshot of the computer screen and stores the image in a log file. The log file can then be played back like a movie.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    PyIDS is an intrusion detection system whose aim is to provide concise information to administrators about some parts of the system i.e filesystem checksums, unknown connections to the machine, access control lists of special files, log revision...
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB