Showing 25 open source projects for "server security system"

View related business solutions
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1
    PgHero

    PgHero

    A performance dashboard for Postgres

    PGHero (ankane/pghero) is an open-source tool for monitoring and analyzing PostgreSQL database performance, built to provide insights into query behavior, index usage, replication lag, and resource bottlenecks. It runs alongside your application (often as a Rails engine, but usable standalone) and collects metrics from PostgreSQL system views, logging slow queries, long-running transactions, and missing indexes. The web interface presents dashboards with charts and tables that help you...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Mina Deploy

    Mina Deploy

    Blazing fast deployer and server automation tool

    A fast deployment tool that generates Bash scripts to automate server deployment processes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Zero Install
    Zero Install is a decentralised cross-distribution software installation system. Create one package that works everywhere! With dependency handling and automatic updates, full support for shared libraries, and integration with native package managers
    Leader badge
    Downloads: 1,965 This Week
    Last Update:
    See Project
  • 4
    RC-EXPLOITER

    RC-EXPLOITER

    Brute-forcing WAN/LAN services

    The author does not hold any responsibility about the bad use of this script remember that attacking targets without prior consent is illegal and punish by law, this script as build to show how msf resource files can automated tasks. Scanning WAN networks In search of targets may take 10 to 15 minutes depending of your network connection, and will search In 1024 random hosts For the selected service/port, also the File 'brute.txt' may be edited to insert new entrys, or we can provide the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    netool toolkit 4.6

    netool toolkit 4.6

    MitM pentesting opensource toolkit

    Operative Systems Suported are: Linux-ubuntu, kali-linux, backtack-linux (un-continued), freeBSD, Mac osx (un-continued) Netool its a toolkit written using 'bash, python, ruby' that allows you to automate frameworks like Nmap, Driftnet, Sslstrip, Metasploit and Ettercap MitM attacks. this toolkit makes it easy tasks such as SNIFFING tcp/udp traffic, Man-In-The-Middle attacks, SSL-sniff, DNS-spoofing, D0S attacks in wan/lan networks, TCP/UDP packet manipulation using etter-filters, and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    organon

    This program focuses on automating the download, installation and compilation of pentest tools from source

    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    DNS rewriter

    simple local dns that either answer query or forward them

    Local DNS server, that act as a proxy and will rewrite request according to a config file and an "active" environement. Usefull to switch easily between diffent configuration without touch the host file. small web server embeded to display current configuration, control active environment and reload configuraiton.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    WiKID Two-Factor Authentication System

    WiKID Two-Factor Authentication System

    Two-factor authentication system

    The WiKID Strong Authentication System is a public-key based two-factor authentication system. It is a flexible, extensible, and secure alternative to tokens, certs and passwords. Application & API support exists for Java, ASP, PHP, Ruby, OpenVPN, TACACS+, etc. Read our eGuide on how to setup your network with two-factor authentication: http://www.wikidsystems.com/learn-more/two-factor-authentication-white-papers
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    netboot65 allows 6502 based computers to boot via a network. Currently only the C64 version is actively developed and tested. Also includes telnet and gopher clients, and a "web application server" for development of web sites in 6502 assembler.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Add Two Lines of Code. Get Full APM. Icon
    Add Two Lines of Code. Get Full APM.

    AppSignal installs in minutes and auto-configures dashboards, alerts, and error tracking.

    Works out of the box for Rails, Django, Express, Phoenix, and more. Monitoring exceptions and performance in no time.
    Start Free
  • 10
    Insidias is a next-generation intrusion detection engine, with a focus on speed, efficiency, advanced pattern matching, parallel-processing, modularity, and expandability.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Scotty TNG is a ping/snmp based realtime network monitoring software. This software implements a client/server approach to monitor a huge number of hosts with ICMP echo requests and SNMP queries. The client presents all gathered informations via a GUI.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    ENCAM is an asset management database and configuration backup tool for Cisco network devices. ENCAM pulls configuration data from devices, stores it, reports changes, analyzes configuration defects, generates asset lists and compliance reports.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    IRecoverThis is an application that will help you track and find your laptop if you lost it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Laika analyzes and reports on the interoperability capabilities of EHR systems. This includes the testing for certification of EHR software products and networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Wireless Hackers Exploitation and Audit Toolkit is a metasploit like framework for Bluetooth and Wifi environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    RogueScanner is a network security tool for automatically discovering rogue wireless access points by scanning a wired network. In addition to finding access points, it will classify all discovered network devices
    Downloads: 11 This Week
    Last Update:
    See Project
  • 17
    A Lightweight P2P Threat Analysis Bus
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    beast is a open source network security testing framework
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A Web based software written in with Ruby on Rails to manage and delegate ip ranges for small to large companies. It also generates BIND 9 config files for the BIND server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Lucie enables parallel network installation of large numbers of nodes from one single administration server. It is designed to be scalable and efficient, so a complete Linux cluster can be built from scratch in a short amount of time.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    Tattoo will provide a set of command-line scripts for analyzing raw tcpdump files or ASCII hexadecimal representations of network traffic to identify format, function, and communication model.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A software distribution based on Debian/Linux to provide network diagnostics, security monitoring and intrusion detection. The distribution can be easily installed by office personnell.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Security analysis tools produced by The Ohio State University Network Security Group.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Etch is a cross-platform, language- and transport-independent framework for building and consuming network services. With Etch, service development and consumption becomes no more difficult than library development and consumption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB