Showing 23 open source projects for "java security for linux"

View related business solutions
  • Level Up Your Cyber Defense with External Threat Management Icon
    Level Up Your Cyber Defense with External Threat Management

    See every risk before it hits. From exposed data to dark web chatter. All in one unified view.

    Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
    Try for Free
  • Business Automation Software for SMBs Icon
    Business Automation Software for SMBs

    Fed up with not having the time, money and resources to grow your business?

    The only software you need to increase cash flow, optimize resource utilization, and take control of your assets and inventory.
    Learn More
  • 1
    PgHero

    PgHero

    A performance dashboard for Postgres

    PGHero (ankane/pghero) is an open-source tool for monitoring and analyzing PostgreSQL database performance, built to provide insights into query behavior, index usage, replication lag, and resource bottlenecks. It runs alongside your application (often as a Rails engine, but usable standalone) and collects metrics from PostgreSQL system views, logging slow queries, long-running transactions, and missing indexes. The web interface presents dashboards with charts and tables that help you...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Zero Install
    Zero Install is a decentralised cross-distribution software installation system. Create one package that works everywhere! With dependency handling and automatic updates, full support for shared libraries, and integration with native package managers
    Leader badge
    Downloads: 3,609 This Week
    Last Update:
    See Project
  • 3
    SIGAR (System Information Gatherer and Reporter) is a cross-platform, cross-language library and command-line tool for accessing operating system and hardware level information in Java, Perl and .NET.
    Leader badge
    Downloads: 38 This Week
    Last Update:
    See Project
  • 4
    RC-EXPLOITER

    RC-EXPLOITER

    Brute-forcing WAN/LAN services

    The author does not hold any responsibility about the bad use of this script remember that attacking targets without prior consent is illegal and punish by law, this script as build to show how msf resource files can automated tasks. Scanning WAN networks In search of targets may take 10 to 15 minutes depending of your network connection, and will search In 1024 random hosts For the selected service/port, also the File 'brute.txt' may be edited to insert new entrys, or we can provide the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Smart Business Texting that Generates Pipeline Icon
    Smart Business Texting that Generates Pipeline

    Create and convert pipeline at scale through industry leading SMS campaigns, automation, and conversation management.

    TextUs is the leading text messaging service provider for businesses that want to engage in real-time conversations with customers, leads, employees and candidates. Text messaging is one of the most engaging ways to communicate with customers, candidates, employees and leads. 1:1, two-way messaging encourages response and engagement. Text messages help teams get 10x the response rate over phone and email. Business text messaging has become a more viable form of communication than traditional mediums. The TextUs user experience is intentionally designed to resemble the familiar SMS inbox, allowing users to easily manage contacts, conversations, and campaigns. Work right from your desktop with the TextUs web app or use the Chrome extension alongside your ATS or CRM. Leverage the mobile app for on-the-go sending and responding.
    Learn More
  • 5
    netool toolkit 4.6

    netool toolkit 4.6

    MitM pentesting opensource toolkit

    Operative Systems Suported are: Linux-ubuntu, kali-linux, backtack-linux (un-continued), freeBSD, Mac osx (un-continued) Netool its a toolkit written using 'bash, python, ruby' that allows you to automate frameworks like Nmap, Driftnet, Sslstrip, Metasploit and Ettercap MitM attacks. this toolkit makes it easy tasks such as SNIFFING tcp/udp traffic, Man-In-The-Middle attacks, SSL-sniff, DNS-spoofing, D0S attacks in wan/lan networks, TCP/UDP packet manipulation using etter-filters, and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    organon

    This program focuses on automating the download, installation and compilation of pentest tools from source

    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    WiKID Two-Factor Authentication System

    WiKID Two-Factor Authentication System

    Two-factor authentication system

    The WiKID Strong Authentication System is a public-key based two-factor authentication system. It is a flexible, extensible, and secure alternative to tokens, certs and passwords. Application & API support exists for Java, ASP, PHP, Ruby, OpenVPN, TACACS+, etc. Read our eGuide on how to setup your network with two-factor authentication: http://www.wikidsystems.com/learn-more/two-factor-authentication-white-papers
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    GRAIL Real Time Location Service (RTLS)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Insidias is a next-generation intrusion detection engine, with a focus on speed, efficiency, advanced pattern matching, parallel-processing, modularity, and expandability.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
    Learn More
  • 10
    ENCAM is an asset management database and configuration backup tool for Cisco network devices. ENCAM pulls configuration data from devices, stores it, reports changes, analyzes configuration defects, generates asset lists and compliance reports.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    IRecoverThis is an application that will help you track and find your laptop if you lost it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Laika analyzes and reports on the interoperability capabilities of EHR systems. This includes the testing for certification of EHR software products and networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Wireless Hackers Exploitation and Audit Toolkit is a metasploit like framework for Bluetooth and Wifi environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Multi Integrated Nodes Opensource Workflow System is software present on a serverless networked group of PCs that allows an intelligent self-contained object to roam freely to use resources to complete a pre-defined goal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    RogueScanner is a network security tool for automatically discovering rogue wireless access points by scanning a wired network. In addition to finding access points, it will classify all discovered network devices
    Downloads: 7 This Week
    Last Update:
    See Project
  • 16
    A Lightweight P2P Threat Analysis Bus
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    beast is a open source network security testing framework
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    jECTS is a JAVA project that focuses on some of the aspects of ECTS (= European Credit Transfer System). Mainly the translation of local grades into ECTS grades and the generation of a ToR (Transcript of Records).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Tattoo will provide a set of command-line scripts for analyzing raw tcpdump files or ASCII hexadecimal representations of network traffic to identify format, function, and communication model.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A software distribution based on Debian/Linux to provide network diagnostics, security monitoring and intrusion detection. The distribution can be easily installed by office personnell.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Security analysis tools produced by The Ohio State University Network Security Group.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Etch is a cross-platform, language- and transport-independent framework for building and consuming network services. With Etch, service development and consumption becomes no more difficult than library development and consumption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next