Browse

OS OS

    • More...
    • More...
  • More...
    • More...

Category Category

    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

    • More...
  • More...

Database Environment Database Environment

    • More...

Freshness Freshness

Top Apps

  • Ranked ‘Best App’ Password Manager by Apple and Google Icon
    Ranked ‘Best App’ Password Manager by Apple and Google Icon

    Still writing down passwords? Or rotating between a handful that you can remember? Not safe! Get Dashlane, It’s FREE!

    With all the accounts you have, remembering every single password is impossible. Dashlane protects your passwords and creates an easy, secure way to access all of your accounts on any device you own.
  • Join us at Talend Connect! Icon
    Join us at Talend Connect! Icon

    Get your tickets to the best data-driven event of the year!

    May 7 – May 9. Use discount code TCCommunity2018 for $200 off.
  • Robolinux Icon

    Robolinux

    Announcing two new faster Robolinux 9.2 versions which run Windows

    Robolinux is very pleased to announce its newly upgraded Cinnamon & Mate 3D 9.2 LTE 2021 versions release. The main focus on this massive upgrade was to improve speed, security and stability. Both of our 9.2 Versions come with FREE expert Tech Support. They have newer kernels, the newest VirtualBox and a significant number of important upstream security updates. The Robolinux 9.2 versions include many more automated driver installers, Free Stealth VM, Free C Drive to VM & Free Apps installers, and much much more. The Robolinux 9.2 versions focus on Privacy delivering exactly what our Users want which is a blazing fast Linux OS that runs Windows XP, 7 & 10 natively inside it. Please see the Readme.txt file for complete Robolinux V9.2 details For all downloads click on the "Files" button above. Thank you John Martinson Founder Robolinux.org

  • YetiForce CRM Icon

    YetiForce CRM

    The best open system for Your business

    Open source is for everyone and so is YetiForce. You can use it for free in every type of organizations and companies of all sizes. Organize your whole business by managing it within one system, not a thousand others. Customize it in the way that suits you and your business best. Try YetiForce CRM and let that love for open source never do you apart again. Downloaded over 250 000 times all over the world. Where else can you find us? https://github.com/YetiForceCompany/YetiForceCRM/releases http://www.softaculous.com/apps/erp/YetiForce https://www.linkedin.com/company/10867904 https://github.com/YetiForceCompany/YetiForcePortal Testing versions: GitStable: https://gitstable.yetiforce.com GitDeveloper: https://gitdeveloper.yetiforce.com YetiPortal: https://gitdeveloper.yetiforce.com/portal

  • Visual Syslog Server for Windows Icon

    Visual Syslog Server for Windows

    Free Syslog Server for Windows with a graphical user interface

    Visual Syslog Server for Windows is a free open source program to receive and view syslog messages. Useful when setting up routers and systems based on Unix/Linux. Visual Syslog Server for Windows has a live messages view: switches to a new received message. Helpful color highlighting. Useful message filtering. Customizable notification and actions. Sources hosted on the GitHub: https://github.com/MaxBelkov/visualsyslog

  • Polarity Browser Icon

    Polarity Browser

    A fast, secure, stable web browser powered by Chromium and Trident.

    Polarity is a dual engine browser powered by both Chromium and Trident that focuses on system efficiency by bringing low RAM and low CPU usage. This browser was also programmed to be optimized for Windows with an Android version available. Browse the web with an uncomplicated UI that is highly customizable with themes, apps, and extensions from the Polarity Store, GreasyFork, OpenUserJS, and UserStyles. Polarity also comes with a built in password manager which safely encrypts all data to prevent theft. Polarity also comes with a built in adblocker and privacy tools such as proxy/VPN support and header masking to prevent further tracking online. If you appreciate all the hard work that we put into creating and developing Polarity, please consider giving a small donation at: http://polarityweb.weebly.com/donate.html

  • CRC RevEng Icon

    CRC RevEng

    Arbitrary-precision CRC calculator and algorithm finder

    CRC RevEng is a portable, arbitrary-precision CRC calculator and algorithm finder. It calculates CRCs using any of the 102 preset algorithms, or a user-specified algorithm to any width. It calculates reversed CRCs to give the bit pattern that produces a desired forward CRC. CRC RevEng also reverse-engineers any CRC algorithm from sufficient correctly formatted message-CRC pairs and optional known parameters. It comprises powerful input interpretation options. Compliant with Ross Williams' Rocksoft(tm) model of parametrised CRC algorithms.

  • 2018 Network Intelligence Planning Guide Icon
    2018 Network Intelligence Planning Guide Icon

    Get insights on net neutrality, cloud readiness, security and WAN transformation.

    Networking is becoming cloudier, hybrid and more Internet-centric. IT managers now own user experience, whether they own the networks or not. Get our latest ebook to learn how network intelligence will help you adapt to a quickly changing Internet-centric environment.
    Are you involved with your company's network performance/operations team?
    Get Ebook
  • netool toolkit 4.6 Icon

    netool toolkit 4.6

    MitM pentesting opensource toolkit

    Operative Systems Suported are: Linux-ubuntu, kali-linux, backtack-linux (un-continued), freeBSD, Mac osx (un-continued) Netool its a toolkit written using 'bash, python, ruby' that allows you to automate frameworks like Nmap, Driftnet, Sslstrip, Metasploit and Ettercap MitM attacks. this toolkit makes it easy tasks such as SNIFFING tcp/udp traffic, Man-In-The-Middle attacks, SSL-sniff, DNS-spoofing, D0S attacks in wan/lan networks, TCP/UDP packet manipulation using etter-filters, and gives you the ability to capture pictures of target webbrowser surfing (driftnet), also uses macchanger to decoy scans changing the mac address. Rootsector module allows you to automate some attacks over DNS_SPOOF + MitM (phishing - social engineering) using metasploit, apache2 and ettercap frameworks. Like the generation of payloads, shellcode, backdoors delivered using dns_spoof and MitM method to redirect a target to your phishing webpage. recent as introducted the scanner inurlbr (by cleiton)

  • Mail Alert Simple Mailer Icon

    Mail Alert Simple Mailer

    Mail Alert Simple Mailer

    Mail Alert Simple Mailer is a simple command-line utility designed for IT administrators for sending e-mail from Microsoft Windows OS. It can be executed from command line, Windows batch file or PowerShell scripts. My main reason for writing this software was to handle events generated by Dell OpenManage Server Administrator (OMSA), APC PowerChute and Windows Events to send hardware status and alerts like temperature alerts, UPS battery status, powerline status and RAID controller alerts from monitoring software. It can be used with any other software where you can configure external application to be executed when specific event occurs. Mail Alert Simple Mailer supports SSL and STARTTLS protocols, so it is compatible with many free e-mail providers like GMail, Hotmail, etc. Unlike other simple command line tools it supports ISO-8859-1, ISO-8859-2 and UTF-8 code pages for national characters. Mail Alert Simple Mailer encrypts SMTP password in configuration file.

  • Airfox Icon

    Airfox

    Airfox is a free and fast web browser. It uses the Gecko Engine.

    Airfox is a fast, consistent, reliable, secure, private and independent web browser. Developed in the Microsoft .NET Runtime Environment, Airfox uses the Gecko Engine also seen in some well-known browsers such as Firefox, Waterfox, Pale Moon. Some advanced features such as Reliable Download Manager are not available due to restrictions from the GeckoFX runtime, but as seen from the results of the futuremark, acid 3 & acid 2 tests, Airfox’s scores/rankings are merit. We are just asking to support us by downloading Airfox and giving it a try. We promise that V2 will be just as good as the other famous browsers. We just want you to follow us on this journey. We want you to follow us on this quest. The quest for true browsing speed. The quest for an uncluttered web. The quest of YOUR ideal web . Download it at http://www.airfox.sourceforge.net

  • Tech Support Scammer Fake Command Prompt Icon

    Tech Support Scammer Fake Command Prompt

    Fake command prompt to fool tech support scammers

    For instructions on how to use, see this file: https://sourceforge.net/projects/techsupportcmd/files/How%20To%20Use.pdf/download This fake command prompt can be used instead of the real windows command prompt in order to waste the tech support scammers time. It is based upon the windows 7 command prompt, but is not noticeably different from the command prompt in most other windows versions. Many commands commonly used by scammers, such as tree, netstat and powercfg are emulated in this, but they provide results that the scammer would not be expecting, for example, the tree command draws an ASCII tree, while the powercfg command comes back with no errors, no warnings and no informational - every time, without fail. Commands not included all come back with the usual error as displayed for invalid commands in the real command prompt, however other commands can be added.

    Downloads: 43 This Week Last Update: See Project
  • TraceMAC - Traceroute for MAC addresses Icon

    TraceMAC - Traceroute for MAC addresses

    TraceMAC is a command-line Layer 2 traceroute for Cisco switches

    TraceMAC is a Windows/Linux command-line tool that allows you to trace a specific MAC address thru Cisco switches. It works by connecting to a switch using SSH, SNMP, Telnet, HTTP or HTTPS and do some "show commands" and later process the output, this will happen recursively until it finds the switch where that MAC address (PC/Printer/Etc) is directly connected. Note: It works with Cisco switches only and you must have CDP enabled at least on trunks/links between switches! Tested with Cisco SW: 2960, 3560, 3750, 4948, 6509, Express 500

  • Identify and respond to threats before damage is done Icon
    Identify and respond to threats before damage is done Icon

    A SIEM that makes it easy to use logs for security, compliance, and troubleshooting.

    SolarWinds® Log & Event Manager (LEM) delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-use, and quick-to-deploy virtual appliance. LEM provides the visibility, security, and control that IT professionals need to alert on and respond to security threats, and assist in meeting the regulatory compliance guidelines of HIPAA, PCI DSS, SOX, and more. Try it FREE for 30 days!
  • Tyrant SQL Icon

    Tyrant SQL

    Tyrant SQL is a Havij based cross-platform. It's Sqlmap's gui version.

    It's a poweful Sql Injection Tool. It's a GUI version of SqlMap, saving time and getting better results. Was designed basing on Havij.

    Downloads: 35 This Week Last Update: See Project
  • nxlog Icon

    nxlog

    A multi-platform universal log collector and forwarder

    NXLog is a modular, multi-threaded, high-performance log management solution with multi-platform support. In concept it is similar to syslog-ng or rsyslog but is not limited to unix/syslog only. It can collect logs from files in various formats, receive logs from the network remotely over UDP, TCP or TLS/SSL . It supports platform specific sources such as the Windows Eventlog, Linux kernel logs, Android logs, local syslog etc. Writing and reading logs to/from databases is also supported. The collected logs can be stored into files, databases or forwarded to a remote log server using various protocols. The old BSD Syslog and the newer IETF syslog standard is fully supported by NXLog in addition to Snare, XML, JSON, GELF, KVP, CSV and custom formats. A key concept in NXLog is to be able to handle and preserve structured logs. No need to convert everything to syslog and parse these logs again at the other side. It has powerful message filtering, log rewrite and conversion capabilities.

  • Wireless Attack Toolkit (WAT) Icon

    Wireless Attack Toolkit (WAT)

    A push-button wireless hacking and Man-in-the-Middle attack toolkit

    This project is designed to run on Embedded ARM platforms (specifically v6 and RaspberryPi but I'm working on more). It provides users with automated wireless attack tools that air paired with man-in-the-middle tools to effectively and silently attack wireless clients. Some of the tools included in the kit are: Custom regex-based DNS Server DHCP Aircrack-ng suite Browser Exploitation Framework (Preconfigured for metasploit) Metasploit Python-based Transparent Injection Proxy Pushbutton configuration "Limpet Mine" mode for attacking existing networks You basically answer three questions in the start script, wait a bit, then log into the BEEF console to start attacking clients

  • mysql-auth_ldap

    Add LDAP user authentication in MySQL

    mysql auth_ldap is an authentication plugin for the MySQL server. It allows you to create SQL users that are going to be authenticated using a LDAP server. This allows to minimize administrative duties, since your users will be able to reuse their existing account to access the database. The plugin requires MySQL 5.5.7 and up. It is compiled as an add on and does not require you to alter MySQL source code, or recompile the entire server. The plugin add support for LDAP using the openLDAP library.

  • ClamSAP

    ClamSAP exists of two 'C' shared libraries which link between ClamAV and the Virus Scan Interface (VSI) of SAP (offical name: NW-VSI). A SAP application can use the ClamAV engine to scan for malicious uploads in HTTP uploads for example.

    Downloads: 8 This Week Last Update: See Project
  • Listsp Icon

    Listsp

    List Processes, Services & Drivers

    View & Manage Windows Processes, Services & Drivers

    Downloads: 6 This Week Last Update: See Project
  • The Polybius Square Encipher/Decipher  Icon

    The Polybius Square Encipher/Decipher

    The Polybius Square Encipher/Decipher Square 5x5, Removed Letter: 'W'

    Python package that allow you to encipher a plaintext, decipher a ciphertext, using The Polybius Square cryptography.

    Downloads: 6 This Week Last Update: See Project
  • AES256 Password Manager Icon

    AES256 Password Manager

    Portable, secure and open source AES256 password manager

    AES256 Password Manager is a secure, portable and open source password store that uses AES256 encryption. AES256 is a fork of a project originally started by Leprechaun https://github.com/Leproide/CryptStore It's written in .NET but it can be easly be run under OSX or Linux OS using Wine. License: GNU GPL V3

    Downloads: 3 This Week Last Update: See Project
  • netTransformer Icon

    netTransformer

    Network Transformation Manager for IP network evolution

    netTransformer is a conceptual software prototype of a network transformation manager able to: - Discover current network infrastructure - Capture its state - Build a graph data model out of it - Provide ability to review and reason about L2, L3, OSPF, ISIS and BGP topology - Automate device configuration process through simplified template interface! - Track the network evolution process - Transform a network from one state to the other

  • ECommands Icon

    ECommands

    Commands made Easy and practical for Unix/Linux

    This software is made with the purpose of making easy the Unix/Linux Server management. Is made completly in Python, making this project as a OS independent. Was tested over Linux and Windows. For documentation go to http://www.life-microsystems.com/index.php/ecommands-documentation

  • PasswordBox Icon

    PasswordBox

    A console-mode program that will keep all your passwords safe

    PasswordBox is a console-mode program that will keep all your passwords safe, in an encrypted database protected by a master password. PasswordBox can also be used to generate secure (random) passwords. This program is written by Mateusz Viste, and uses the AES implementation of Chris Brown to handle all encryption/decryption processes. PasswordBox is available for the following operating systems: DOS, Windows, Linux. Remember, that if you forget your master password, you will have no way to recover the database content. Usage: pbox [--help] [--dump] --help displays a help screen (any unsupported parameter will display it, too) --dump lists all the data of your encrypted database onscreen

    Downloads: 2 This Week Last Update: See Project
  • REBEL Cleaner and Optimizer Icon

    REBEL Cleaner and Optimizer

    Windows Cleanup and Optimization Tool

    Simple and powerful, REBEL is a free and open source application designed to clean and optimize your Windows computer. REBEL does this by clearing system caches, deleting temporary files, and performing system health checks using data collected in real-time from the Web.

    Downloads: 1 This Week Last Update: See Project
  • Secure Hex Message Encoder/Decoder Icon

    Secure Hex Message Encoder/Decoder

    Secure dem messages!

    ATTENTION!!!!!! If you downloaded this before 12:12 PM Central Time on April 26, 2015, PLEASE RE-DOWNLOAD!!! A virus had slipped in undetected, and I have DISINFECTED the new copy that has been posted! PLEASE RE-DOWNLOAD IMMEDIATELY!!! That is all. This python program uses a universal key to encrypt and decrypt messages. You can use this program to decode messages made using any other iteration! Output for encoding is called "encrypted_message.axfile" Output for decoding is "decrypted_message.txt"

    Downloads: 1 This Week Last Update: See Project
  • bgpPeeringMap Icon

    bgpPeeringMap

    Internet BGP Peering Topology Map

    bgpPeeringMap is a product able to discover and visualize BGP Peering topology by SNMP polling of BGP enabled routers. Once the polling process finish the network engineers are able to reason about the BGP peering topology, to obtain additional information about certain AS (Autonomous System) from RIPE or ARIN to draw shortest paths between two ASes and to locate an IP address on the map. Youtube channel http://www.youtube.com/channel/UCVrXTSM9Hj6d3OFbIdF4Z2w

    Downloads: 1 This Week Last Update: See Project
  • jEncrypt

    jEncrypt is a command line file encryption archiver

    jEncrypt is a command line file encryption archiver designed to help you encrypt files and directories into a single file archive.

    Downloads: 1 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you