Showing 22 open source projects for "mac security software"

View related business solutions
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • Add Two Lines of Code. Get Full APM. Icon
    Add Two Lines of Code. Get Full APM.

    AppSignal installs in minutes and auto-configures dashboards, alerts, and error tracking.

    Works out of the box for Rails, Django, Express, Phoenix, and more. Monitoring exceptions and performance in no time.
    Start Free
  • 1
    PgHero

    PgHero

    A performance dashboard for Postgres

    PGHero (ankane/pghero) is an open-source tool for monitoring and analyzing PostgreSQL database performance, built to provide insights into query behavior, index usage, replication lag, and resource bottlenecks. It runs alongside your application (often as a Rails engine, but usable standalone) and collects metrics from PostgreSQL system views, logging slow queries, long-running transactions, and missing indexes. The web interface presents dashboards with charts and tables that help you...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Zero Install
    Zero Install is a decentralised cross-distribution software installation system. Create one package that works everywhere! With dependency handling and automatic updates, full support for shared libraries, and integration with native package managers
    Leader badge
    Downloads: 1,869 This Week
    Last Update:
    See Project
  • 3
    SIGAR (System Information Gatherer and Reporter) is a cross-platform, cross-language library and command-line tool for accessing operating system and hardware level information in Java, Perl and .NET.
    Downloads: 17 This Week
    Last Update:
    See Project
  • 4
    RC-EXPLOITER

    RC-EXPLOITER

    Brute-forcing WAN/LAN services

    The author does not hold any responsibility about the bad use of this script remember that attacking targets without prior consent is illegal and punish by law, this script as build to show how msf resource files can automated tasks. Scanning WAN networks In search of targets may take 10 to 15 minutes depending of your network connection, and will search In 1024 random hosts For the selected service/port, also the File 'brute.txt' may be edited to insert new entrys, or we can provide the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5
    Mesos Cluster

    Mesos Cluster

    Scripts to configure a Mesos cluster using Mesos and Mesosphere

    Scripts to configure a Mesos cluster using Mesos and Mesosphere services. Mesos master running the Marathon and Chronos frameworks. Mesos agent with Docker containerizer. Mesos DNS for core service discovery. Marathon load balancer using HAProxy for SSL and proxying to internal applications. To try it out locally use the Vagrant configuration. To use the scripts to build a custom Mesos cluster first install the roles in your project and configure Ansible to load roles from the roles...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    netool toolkit 4.6

    netool toolkit 4.6

    MitM pentesting opensource toolkit

    Operative Systems Suported are: Linux-ubuntu, kali-linux, backtack-linux (un-continued), freeBSD, Mac osx (un-continued) Netool its a toolkit written using 'bash, python, ruby' that allows you to automate frameworks like Nmap, Driftnet, Sslstrip, Metasploit and Ettercap MitM attacks. this toolkit makes it easy tasks such as SNIFFING tcp/udp traffic, Man-In-The-Middle attacks, SSL-sniff, DNS-spoofing, D0S attacks in wan/lan networks, TCP/UDP packet manipulation using etter-filters, and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    DNS rewriter

    simple local dns that either answer query or forward them

    Local DNS server, that act as a proxy and will rewrite request according to a config file and an "active" environement. Usefull to switch easily between diffent configuration without touch the host file. small web server embeded to display current configuration, control active environment and reload configuraiton.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    WiKID Two-Factor Authentication System

    WiKID Two-Factor Authentication System

    Two-factor authentication system

    The WiKID Strong Authentication System is a public-key based two-factor authentication system. It is a flexible, extensible, and secure alternative to tokens, certs and passwords. Application & API support exists for Java, ASP, PHP, Ruby, OpenVPN, TACACS+, etc. Read our eGuide on how to setup your network with two-factor authentication: http://www.wikidsystems.com/learn-more/two-factor-authentication-white-papers
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    The Fault Injection Toolkit is a sophisticated modern protocol fuzzing platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10
    Insidias is a next-generation intrusion detection engine, with a focus on speed, efficiency, advanced pattern matching, parallel-processing, modularity, and expandability.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    ENCAM is an asset management database and configuration backup tool for Cisco network devices. ENCAM pulls configuration data from devices, stores it, reports changes, analyzes configuration defects, generates asset lists and compliance reports.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Laika analyzes and reports on the interoperability capabilities of EHR systems. This includes the testing for certification of EHR software products and networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A Lightweight P2P Threat Analysis Bus
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    beast is a open source network security testing framework
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A Web based software written in with Ruby on Rails to manage and delegate ip ranges for small to large companies. It also generates BIND 9 config files for the BIND server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Tattoo will provide a set of command-line scripts for analyzing raw tcpdump files or ASCII hexadecimal representations of network traffic to identify format, function, and communication model.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Ruby text-based router search designed to query Cisco 72xx and 10k Routers for Cable modem and CPE information. It is designed to work both on UNIX and NT enviroments. Requirement is the Ruby language interpreter.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A software distribution based on Debian/Linux to provide network diagnostics, security monitoring and intrusion detection. The distribution can be easily installed by office personnell.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Security analysis tools produced by The Ohio State University Network Security Group.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Aaron is an application, service, and network availability monitoring and alert daemon. Notification of unavailable services, networks, etc., levels is sent to the appropriate roles. Aaron is highly customizable enterprise class monitoring software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Etch is a cross-platform, language- and transport-independent framework for building and consuming network services. With Etch, service development and consumption becomes no more difficult than library development and consumption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB