Showing 136 open source projects for "secure linux"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    PacketFence - Enterprise NAC that actual
    A network access control (NAC) system featuring a captive-portal for registration and remediation, wired and wireless management, 802.1X support, isolation of devices, integration with IDS; it can be used to secure networks from small to large. Source code is hosted here: https://github.com/inverse-inc/packetfence Issue tracker is hosted here: https://github.com/inverse-inc/packetfence/issues
    Downloads: 17 This Week
    Last Update:
    See Project
  • 2
    Endian Firewall Community
    Endian Firewall Community (EFW) is a "turn-key" linux security distribution that makes your system a full featured security appliance with Unified Threat Management (UTM) functionalities. The software has been designed for the best usability: very easy to install, use and manage and still greatly flexible. The feature suite includes stateful packet inspection firewall, application-level proxies for various protocols (HTTP, FTP, POP3, SMTP) with antivirus support, virus and spam-filtering...
    Leader badge
    Downloads: 412 This Week
    Last Update:
    See Project
  • 3
    MaraDNS is a fully open-sourced DNS server that strives to be secure. It is written in C (no C++) and is suitable for embedded systems.
    Downloads: 64 This Week
    Last Update:
    See Project
  • 4
    surge

    surge

    Surge is a p2p filesharing app designed to utilize blockchain

    Surge is a peer-to-peer file-sharing application that leverages blockchain technologies to facilitate anonymous and secure file transfers. It employs end-to-end encryption and a decentralized network to ensure user privacy and data integrity. Surge's design focuses on simplicity and anonymity, making it a suitable choice for users seeking private file-sharing solutions.​
    Downloads: 2 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 5
    Tendermint

    Tendermint

    Tendermint Core (BFT Consensus) in Go

    Tendermint Core is a Byzantine Fault Tolerant (BFT) middleware that takes a state transition machine, written in any programming language, and securely replicates it on many machines. Building the most powerful tools for distributed networks. We are Tendermint, a core contributor to the Cosmos Network. Powerful & secure software for the decentralized future. Tendermint has been in the production of private and public environments, most notably the blockchains of the Cosmos Network. we...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A client implementation of Secure Socket Tunneling Protocol (SSTP) for Linux / Mac OS-X that allows remote access via SSTP VPN to Microsoft Windows 2008 Server. This project has been moved to https://gitlab.com/eivnaes/sstp-client
    Leader badge
    Downloads: 297 This Week
    Last Update:
    See Project
  • 7
    NDW - Network Data Wiping Hard Disks HDD

    NDW - Network Data Wiping Hard Disks HDD

    Wipe erase data from hdds on the network, unlimited hard disks

    Automated network based hard disk drives / storage devices erasure is server based software which installs on a central server. Server is connected to network switches and several PXE boot enabled workstations are attached to the network. As soon as the workstation is powered on, it boots off the network via the server and begins wiping all the attached hard disk drives. Once all the hard drives are wiped, data related to each hard disk is stored in the central server’s database. Read...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8
    qTox

    qTox

    qTox is a chat, voice, video, and file transfer IM client

    qTox is a cross-platform, secure messaging and video calling client for the Tox peer-to-peer protocol. It offers end-to-end encryption, zero metadata leakage, and no central servers, making it a privacy-focused alternative to mainstream messaging apps. qTox includes rich features like file transfers, screen sharing, and group chats, all built with a user-friendly interface powered by Qt. As a decentralized app, qTox ensures that user communication is secure, private, and independent of...
    Downloads: 32 This Week
    Last Update:
    See Project
  • 9
    Mastering the Lightning Network

    Mastering the Lightning Network

    Mastering the Lightning Network (LN)

    Mastering the Lightning Network is an O'Reilly Media book, by authors Andreas M. Antonopoulos (@aantonop), Olaoluwa Osuntokun (@roasbeef), Rene Pickhardt (@renepickhardt). It was published on Dec 21, 2021, in paperback and e-book, by O'Reilly Media. It is available everywhere that books are sold. This repository contains the manuscript of the book as published by O'Reilly Media, tagged as firstedition_firstprint. The book describes the Lightning Network (LN), a Peer-to-Peer protocol running...
    Downloads: 1 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 10
    Snare Lite (SIEM & Logging Software)

    Snare Lite (SIEM & Logging Software)

    Snare Enterprise: bit.ly/Snare-Trial

    ATTENTION: Snare Lite is unsupported legacy software. While it will remain a part of the SourceForge community, it is no longer secure and compliant. For up to date Snare software check out Snare Enterprise. https://www.snaresolutions.com/try-snare-for-free/ Snare Enterprise was created to keep up with the fast paced security software market. It started with the desire to create premium logging and SIEM tools that were agnostic by nature so they could be used to boost any SIEM...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Devil-Linux
    Devil-Linux is a special Linux distribution, which is used for Firewalls / Routers. The goal of Devil-Linux is to have a small, customizable and secure (what is secure in the internet?) Linux.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    GSnova

    GSnova

    Private proxy solution & network troubleshooting tool

    GSnova is a high-performance proxy tool for bypassing internet censorship and securing network traffic through a range of supported transport protocols. It acts as a multi-protocol client/server proxy that can tunnel traffic over TLS, WebSocket, KCP, QUIC, and SSH. GSnova is optimized for resilience and speed under restrictive network conditions and supports multiple fronting strategies and obfuscation techniques. It's particularly suited for users in highly censored environments and...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 13
    Scrollout F1

    Scrollout F1

    An easy-to-use anti-spam email gateway

    • Designed for Linux and Windows email system administrators, Scrollout F1 is an easy to use, already adjusted email firewall (gateway) offering free anti-spam and anti-virus protection aiming to secure existing email servers, old or new, such as Microsoft Exchange, Lotus Domino, Postfix, Exim, Sendmail, Qmail and others. • Built-in multilayer security levels make configuration effort equal to a car radio
    Leader badge
    Downloads: 100,441 This Week
    Last Update:
    See Project
  • 14
    Karma Load Balancer

    Karma Load Balancer

    Community reproduction of Zen Load Balancer CE

    Karma Load Balancer CE software package, a Community Edition derived from the Zen Load Balancer refocused to be more agile, performant and secure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    PHP - Net_RouterOS

    A client for the MikroTik RouterOS API protocol, written in PHP.

    A client for the MikroTik RouterOS API protocol, written in PHP. Easy, tested and documented. All feedback welcomed.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 16
    IPRARU

    IPRARU

    Computer security tool for the information gathering stage

    Computer security tool for the information gathering stage, obtaining the IP address through redirection and social engineering.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ASProxyWing
    ASProxyWing is a handy, easy to use client / server desktop distributed proxy, which works as a HTTP-tunnel for clients. Provides high secure, easy to integrate proxy servers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    CONNECTINY Hotspot

    CONNECTINY Hotspot

    Share your connection (Ethernet,3G, 4G ..etc) with other devices .

    ################################### WHAT IS CONNECTINY ? ################################### With Connectiny Hotspot, you can transform your PC into a real WiFi hotspot, and share your computer’s Internet connection as Wi-Fi with any other PC or mobile device. ########################################### HOW DOES CONNECTINY HOTSPOT WORK ? ########################################### Connectiny Hotspot turns your computer into a real WiFi router. Thanks to the “Virtual WiFi”...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    DotNetOpenServer SDK

    DotNetOpenServer SDK

    Lightweight fully extendable client/server application framework

    DotNetOpenServer SDK is an open source lightweight fully extendable TCP socket client/server application framework enabling developers to create highly efficient, fast, secure and robust cloud based smart mobile device and desktop applications. Why? Unlike most application server frameworks, which are implemented over slow inefficient stateless protocols such as HTTP, REST and SOAP that use bulky ASCII data formats such as JSON and XML, DotNetOpenServer has been built from the ground up with...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    ArpON

    ArpON

    ARP handler inspection

    ArpON (ARP handler inspection) is a Host-based solution that make the ARP standardized protocol secure in order to avoid the Man In The Middle (MITM) attack through the ARP spoofing, ARP cache poisoning or ARP poison routing attack.
    Leader badge
    Downloads: 167 This Week
    Last Update:
    See Project
  • 21
    Zebedee is a simple program to establish an encrypted, compressed "tunnel" for TCP/IP or UDP data transfer between two systems.
    Leader badge
    Downloads: 7 This Week
    Last Update:
    See Project
  • 22
    SSH System Administration Tool

    SSH System Administration Tool

    SSH Java client GUI for Unix, Linux administration and monitoring

    ...Access your servers; this release is integrated with the following 3rd party tools: Remote Desktop (RDP), PuTTY(included) , WinSCP (included) and Wireshark (separate download). Bandwidth and system monitoring. Secure login csv fields encryption MS Windows XP/Vista/7 Linux Red Hat, SUSE, Ubuntu (Debian) [Raanan Zion]
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23

    Nagios Proxy

    Proxies the Nagios command fifo.

    Nagios Proxy is a client server system intended to be used in a secure environment. The client will appear to external software as a Nagios service. It accepts any data on the Nagios command fifo and forwards it to the server. When HUPped it collects the config files and forward those to the server. The server will pass commands and config files on to the real Nagios process.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    xen-shell2

    simple XEN guests / cloud management console shell

    XEN guests / cloud management shell which provides secure, simple and easy (remote, multi-user, multi-level) console based access to XEN DomU management - with simple bandwidth monitoring.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The BRST - Border Router Security Tool is a web based utility for generating secure configuration files for Cisco routers in a border configuration. The administrator fills out a web form, clicks submit, and receives a router config file.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB