OSI-Approved Open Source (267)
- Affero GNU Public License (1)
- Apache License V2.0 (5)
- Apache Software License (3)
- BSD License (9)
- Boost Software License (1)
- Common Development and Distribution License (2)
- Educational Community License, Version 2.0 (1)
- European Union Public License (1)
- Fair License (1)
- GNU General Public License version 2.0 (22)
- GNU Library or Lesser General Public License version 2.0 (1)
- GNU Library or Lesser General Public License version 3.0 (8)
- MIT License (5)
- Mozilla Public License 2.0 (1)
- Non-Profit Open Software License 3.0 (1)
- Creative Commons Attribution License (9)
- Other License (6)
- Public Domain (5)
- Linux (243)
- Modern (157)
Grouping and Descriptive Categories (139)
- 32-bit MS Windows (95/98) (1)
- 32-bit MS Windows (NT/2000/XP) (5)
- 64-bit MS Windows (14)
- All 32-bit MS Windows (15)
- All BSD Platforms (11)
- All POSIX (98)
- OS Independent (23)
- OS Portable (11)
- Project is OS Distribution-Specific (12)
- Project is an Operating System Distribution (10)
- Project is an Operating System Kernel (1)
- BSD (103)
- Windows (69)
- Mac (56)
- Emulation and API Compatibility (17)
- Other Operating Systems (13)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
ARaC (Almost Random Cipher) is (or will become) a 512bit cipher. The ARaC suite is a C program which can encrypt/decrypt files and streams. The cipher itself cannot be download on SF due to US export laws, check http://arac-suite.sourceforge.net !
Abstergo is a graphical web-based multiplatform application for the control of local networks.
Affisix is a program for automatic recognition of prefixes. It takes large amount of words and according to the user setting it tries to determine which segments of these words are prefixes.
The Netwrix Auditor Effective Permissions Reporting Tool enables you to quickly track down who has access to what across both AD and file servers, see how that access was gained, and get ready-to-use reports in a few clicks. It is free of charge and will never expire, so you can be sure it’ll be there for you when you need it most.Are you an IT pro at a company with 150+ employees?Advertisement
Online game and portal engine.
A simple search tool for Linux users !
Assorted projects. General-purpose libraries for Python, C++, Scala, bash, and others. Meta-programming tools. System utilities. UI components. Web APIs. Configuration files. Benchmarks. Programming competition entries. And much more.
AttackTreeMonkey is an XSLT script that calculates values in an attack tree (using Libxslt or Saxon) and outputs XHTML. Attack trees are a way of modelling security systems and how they fail (see Bruce Schneier in Dr Dobbs Journal; 1999).
Cloudbased voice solutions are common in enterprise networks and frustrating for operations teams to manage. Simplify VoIP monitoring by having a proactive analysis of on-prem, hybrid and UCaaS voice services. Try the ThousandEyes VoIP monitoring solution today, free.Advertisement
Kickstart for Arch Linux
Simple Bash password manager using GPG and SQLite
For those at home who want to backup there precious data files but don't know nothing about backup. A white paper (Seperate download) explains creating backups and the script use. The script is readable, creates extensive logging and with restore script
BashCronBackup is a backup script written in bash that can create full database and file backups. Before the database is dumped it will be optimized and repaired. Further, it will delete old backups for you. Available formats: Zip, Tar, Gzip, Bzip2
point-of-sale system written completely in bash. Keeps track of how many items are being sold, customer traffic patterns, income, and more. Generates nice sales reports at end of session, has automatic recovery, and great with screen readers.
RAD StudioTM: Build cross-platform apps ridiculously FAST! Delivering fast and powerful native applications for Windows, Linux, macOS, iOS, Android, cloud and IoT. Rapidly design, build, and run applications optimized for native performance, from a single code base across all platforms. With RAD Studio 10.2 you can securely connect and embed any data, on any tier, in the Enterprise, or cloud.Advertisement
A free karaoke player for Linux and BSD
Store and verify MD5 checksums within file's extended attributes. Operational on individual files as well as entire directory trees of files. Using this routinely will detect if bit-rot or other unwanted modification of low level file content has occurred.
A Scalable Spam Filtering Architecture
CEHALET (Common Ethical Hacker's Toolkit) is a collection of open source tools used for ethical hacking or pen-test.
If you are like the rest of our user community, your IT team is busy. With pressure to deliver on-time projects, you don’t have a lot of time to spend making your management tools work. You need network monitoring tools that work for you. You want tools that makes it easy to find performance issues before your users do and resolve them before they impact the business. That’s why tens of thousands of customers around the world love WhatsUp Gold.Advertisement
Parse and store Infringement Notices with web interface and RT connect
A collection of CMake files, biased towards projects using Fortran
A tool to register and superpose CTF MEG SAM(g2) result and MRI image into one gray-level image.
Set of tools for managing a simple OpenSSL-based certificate authority
Chezzy is all you need for playing chess on Linux. Just select the engine you plan to use, and the interface, Chezzy will install all needed software automatically, and the game begins. Chezzy is build to run on Debian GNU/Linux, and derived like Ubuntu.
This script updates your Google Chromium installation (package chromium-browser from ubuntu lucid) from a builed chormium zip file (get it from http://www.lucman.com.ar/get/chromium-linux-last-zip.php )
Chronicle is a set of BASH shell scripts that use rsync to back up data to a remote host. Snapshots are created and rotated using hard links to minimize storage requirements.