Showing 49 open source projects for "java security for linux"

View related business solutions
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    Netflow

    Netflow

    free netflow analyzer

    This is a set of perl and php scripts that are used to collect, process, store and display netflow data.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 2
    Sync & Viz Of aRbitrary Streams (Savors)
    Savors is a visualization framework that supports the ingestion of data streams created by arbitrary command pipelines. Any number of data streams can be shown synchronized by time in the same or different views, which can be arranged in any layout. These capabilities combined with a powerful parallelization mechanism and interaction models already familiar to administrators allows Savors to display complex visualizations of data streamed from many different systems with minimal effort.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    OPTOSS NG-NetMS

    OPTOSS NG-NetMS

    OPTOSS Next Gen Network Management System (NG-NetMS)

    Why to pay tens of thousands $$$ for your network management software? Get visibility into your networks and complex processes inside with NG-NetMS now! NG-NetMS is a new end-to-end network management platform for your Linux servers, Cisco, Juniper, HP and Extreme routers, switches and firewalls. NG-NetMS is precise, quick and efficient. It collects most complete information about the network inventory, topology, map of IPv4 addresses quickly and with minimum hassle. Most...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    360-FAAR  Firewall Analysis Audit Repair

    360-FAAR Firewall Analysis Audit Repair

    360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs

    360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, firewall policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA or ScreenOS commands, and its one file! Read Policy and Logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), Cisco ASA (show run / syslog format), 360-FAAR compares firewall policies and uses...
    Downloads: 6 This Week
    Last Update:
    See Project
  • Turn traffic into pipeline and prospects into customers Icon
    Turn traffic into pipeline and prospects into customers

    For account executives and sales engineers looking for a solution to manage their insights and sales data

    Docket is an AI-powered sales enablement platform designed to unify go-to-market (GTM) data through its proprietary Sales Knowledge Lake™ and activate it with intelligent AI agents. The platform helps marketing teams increase pipeline generation by 15% by engaging website visitors in human-like conversations and qualifying leads. For sales teams, Docket improves seller efficiency by 33% by providing instant product knowledge, retrieving collateral, and creating personalized documents. Built for GTM teams, Docket integrates with over 100 tools across the revenue tech stack and offers enterprise-grade security with SOC 2 Type II, GDPR, and ISO 27001 compliance. Customers report improved win rates, shorter sales cycles, and dramatically reduced response times. Docket’s scalable, accurate, and fast AI agents deliver reliable answers with confidence scores, empowering teams to close deals faster.
    Learn More
  • 5
    Octopussy: Log Management Solution

    Octopussy: Log Management Solution

    Log Management Solution

    Logs Analyzer, Alerter & Reporter with a Web Interface
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Tarantoga

    Tarantoga

    Lightweight Event Management System (for Monitoring-Events and more)

    Tarantoga is an open source lightweight event management system for events from monitoring and more, with similar functionality to IBM Tivoli TEC, Master Cell, or BMC BEM. It supports your ITIL/ITSM event management process. It relies on MongoDB to store the events and Perl as rule programming language. GUI and backend are seperate tools that communicate only via the MongoDB. Tarantoga understands EIF, so you can send events with "postemsg", "msend -e", and the tarantoga tool tsend. Via EIF,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Log parser and event generator
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    must: A More Useful Syslog Test tool

    A syslog message generator that replicates real syslog messages

    Using templated message formats with customisable placeholders, run in configurable sequences that can selectively reuse data between steps, must allows more intelligent testing of syslog receivers with realistic data, as well as longer soak testing and stress testing. must was created to fill a gap found when trying to stress test Splunk as real, indexable and meaningful data was needed. must will (eventually) be provided as a standalone tool that uses XML configs (for quick use and...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 9
    RPi-Monitor

    RPi-Monitor

    Real time monitoring : RPi-Monitor always keep an eye on your computer

    RPi-Monitor is a monitoring tool which keep an eye on your computer and can give you the current status and the history of resources usages in a nice looking and interactive web interface. RPi-Monitor is design to be light and powerful and doesn't relies on other software to run. It has been deigned to run on embedded device and consume very few system resources.
    Downloads: 1 This Week
    Last Update:
    See Project
  • FusionAuth: Authentication and User Management Software Icon
    FusionAuth: Authentication and User Management Software

    Offer your users flexible authentication options, including passwords, passwordless, single sign-on (SSO), and multi-factor authentication (MFA).

    FusionAuth adds login, registration, SSO, MFA, and a bazillion other features to your app in days - not months.
    Learn More
  • 10
    SonicLog Cruncher
    Perl logfile analyzer for DELL Sonicwall Firewall logfiles. This Perl program (Windows /Linux / Mac), creates an HTML file containing: hits per protocol, mean, median and variance on hourly and weekday basis, RBL statistics, IPS stats, VPN stats, virus stats, surfing statistics, CFS blocked sites stats.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Este é um projeto, onde estou criando um interface php para controle do servidor Radius, estou utilizando o freeradius. Ele ira contar com base de dados PostgresSql. Php e muitas funções rodando sobre o linux(Ubuntu server).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Plinko was originally an experiment with Prefix Trees and log parsing. The general concept is to have a single end point you can send any data to, in a "fire and forget" fashion. Plinko should identify and parse the data completely without the sending system caring what it sent. The latest version supports named fields in the STL files for tagging data parsed in the Prefix Tree and anonymous functions for parsing dynamic message payloads. We now output JSON objects and I'm working on HBase...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Honeyd2MySQL

    Honeyd2MySQL

    Utility to move honeyd.log entries to a MySQL database.

    This is yet another simple piece of software that extracts all the basic stats from honeyd’s text-based log files and inserts them in a MySQL database. Then you can run some queries and of course visualize the data if you want to. Many things are hardcoded or dead simple, but it does the job. The file is a modified version of “honeyd_importer” perl script originally writen by Joshua Gimer and shared through “honeypots” mailing list.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    LOGalyze CLI

    LOGalyze CLI

    Command line client interface for LOGalyze 4

    Command line LOGalyze client. logalyze-cli is a powerful command line client for managing LOGalyze engine. With LOGalyze application log analyzer, you can collect your log data from any device, analyze, normalize and parse them.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    LUARM

    LUARM

    A detailed user action logging engine

    The Logging of User Actions in Relational Mode (LUARM) is a logging/audit engine designed to record in detail user actions in a Relational Database Management System (RDBMS). You can then have an organized 'who is doing what' view in your system, being able to easily correlate program execution, file access and network endpoint activity to user entities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    DAD is a Windows event log and syslog management tool that allows you to aggregate logs from hundreds to thousands of systems in real time. DAD requires no agents on the servers or workstations. Correlation and analysis is driven through a web front end.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 18
    Kojoney is an easy of use, secure, robust and powerfull Honeypot for the SSH Service written in Python. With the kojoney daemon are distributeds other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log fi
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    PFL can either operate as a stand-alone firewall log parser or set up to run and configure ipfw. The major focus is parsing, compressing, and filtering *NIX (to include Mac OSX) firewall logs generated by IPFW for quick and easy admin review.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Labrador is a Host-based Intrusion Detection System (HIDS) and Integrity Checker written entirely in Perl. It aims to be a complete, free, multiplatform, and open-source solution for detecting modifications and tamperings in files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    augrok is a Linux audit log analysis tool written in Perl that provides searches based on real and effective user/group ids along with login id, executable name, terminal, within a time range, regular expression matching, and so much more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Changetrack logs modifications of a set of files, and allows recovery of the tracked files from any stage of development. The changes are presented in a powerful web-based form, a text file, or an email message. A handful of options allow situation-specif
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    devialog is a behavior/anomaly-based syslog intrusion detection system which detects unknown attacks via anomalies in syslog. It can generate signatures for ease of management, act upon anomalies in a predefined fashion or perform as a standard log parser
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A framework for information security management. It has the centralized server for managing the IDS sensors, log consolidation and correlation, report generation etc. Also it has customized IDS sensor based on snort.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Scour: a Perl script able to find lines in log files matching a given Perl regular expression. It counts matches within given time periods, and reports on whether the number of matches exceeds a given count, shows matching lines, or executes a command.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next