Showing 957 open source projects for "security"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 1
    Shennina

    Shennina

    Automating Host Exploitation with AI

    Shennina is an automated host exploitation framework. The mission of the project is to fully automate the scanning, vulnerability scanning/analysis, and exploitation using Artificial Intelligence. Shennina is integrated with Metasploit and Nmap for performing the attacks, as well as being integrated with an in-house Command-and-Control Server for exfiltrating data from compromised machines automatically. Shennina scans a set of input targets for available network services, uses its AI engine...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Name-That-Hash

    Name-That-Hash

    Identify MD5, SHA256 and 300+ other hashes

    Name-That-Hash is a modern hash identification system that tells you what type of hash you are looking at, supporting MD5, SHA-256, and more than 300 other hash types. It is designed as a successor and improvement to older tools like HashID and Hash-Identifier, focusing on up-to-date hash databases and better usability. One of its core ideas is popularity-aware ranking: when you feed in a hash, it prioritizes likely real-world types such as NTLM over obscure ones like Skype hashes, instead...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    HASS Configurator

    HASS Configurator

    Configuration UI for Home Assistant

    The HASS Configurator is a small web app (you access it via a web browser) that provides a filesystem browser and text-editor to modify files on the machine the configurator is running on. It has been created to allow easy configuration of Home Assistant. It is powered by Ace editor, which supports syntax highlighting for various code/markup languages. YAML files (the default language for Home Assistant configuration files) will be automatically checked for syntax errors while editing. The...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    dirsearch

    dirsearch

    Web path scanner

    An advanced command-line tool designed to brute force directories and files in webservers, AKA web path scanner. Wordlist is a text file, each line is a path. About extensions, unlike other tools, dirsearch only replaces the %EXT% keyword with extensions from -e flag. For wordlists without %EXT% (like SecLists), -f | --force-extensions switch is required to append extensions to every word in wordlist, as well as the /. To use multiple wordlists, you can separate your wordlists with commas....
    Downloads: 4 This Week
    Last Update:
    See Project
  • DeskTime is a cloud-based time tracking software Icon
    DeskTime is a cloud-based time tracking software

    DeskTime is best for medium to large companies, as well as freelancers who want to boost productivity without overworking.

    DeskTime is a high-performance, automated time tracking and workforce management solution for teams and freelancers. It runs silently in the background, logging computer activity from the moment of boot-up to ensure 100% accurate data without the need for manual timers.
    Learn More
  • 5
    FormaVid

    FormaVid

    Small Business Appliance

    ...All components are stable, open source and well supported. The appliance is built using scripts so no hidden "monkey business" and you can choose a "compatible base distro" based on your needs: familiarity; performance; security; usability; etc. Please see https://sourceforge.net/p/formavid/code/ci/master/tree/INSTALL.txt for details. The appliance is specially designed to run on the Google Cloud Platform "Free Tier" https://formavid.org/gce and has it's own custom install script https://sourceforge.net/projects/formavid/files/gcloud-gce-deployment/download with instructions https://sourceforge.net/projects/formavid/files/ provided.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    The_Deck_Linux

    Portable Penetration Testing Operating System

    It is an Portable Penetration Testing Operating System designed for Beagle Bone AI. It is an debian based operating system fully packed with all latest Hacking Tools. The Root file system used in this Deck Linux is Ubuntu 20.04 LTS. It can be installed in Beagle Board AI and can use as a replacement for Laptop, Desktop. It can be placed on a drone too. It has a pre-installed MeshDeck (written by Philip Polstra) so it can be runned in a ZigBee network. We can attacks from up to a mile away...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    crossplane

    crossplane

    Quick and reliable way to convert NGINX configurations into JSON

    Reliable and fast NGINX configuration file parser and builder. Since crossplane is usually used to create payloads that are sent to different servers, it's important to keep security in mind. For that reason, the --ignore option was added. It can be used to keep certain sensitive directives out of the payload output entirely.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Opta

    Opta

    The next generation of Infrastructure-as-Code

    Opta is an infrastructure-as-code framework. Rather than working with a low-level cloud configuration, Opta enables you to work with high-level constructs. Opta high-level constructs produce Terraform configuration files. This helps you avoid lock-in to Opta. You can write custom Terraform code or even take the Opta-generated Terraform and go your own way. Opta is a new kind of Infrastructure-as-Code (IaC) framework that lets engineers work with high-level constructs instead of getting lost...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9
    codecat

    codecat

    static code analysis, to find/track sinks and bugs

    CodeCat is a open source tool to help you in static code analysis, to find/track sinks and bugs, this points follow regex rules...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Scalable restaurant tech for stellar guest experiences Icon
    Scalable restaurant tech for stellar guest experiences

    For Pizza, Delivery, Takeout, Quick Serve, Fast casual, and Full Service Restaurants with as little as one store to 100 or more.

    HungerRush helps restaurants compete in the toughest business on earth. We offer a fully integrated restaurant management system that’s easy to use and can be configured to engage your guests better, streamline your operations, master your own marketing, or all of the above. Want to offer online ordering? It’s built in. Want to get the latest performance data on your operations and marketing? No problem. Want to make customers for life by creating personalized experiences you know they’ll love? Order up. And since our system is backed by a dedicated and US-based support team, you’ll always be ready for the rush.
    Learn More
  • 10
    rocket-bi

    rocket-bi

    An open-source web-based self-service BI for analytical databases

    Rocket.BI is a free, open-source, web-based business intelligence solution specifically designed for analytical databases. It enables data analysts and business users alike to easily integrate different data sources, perform advanced data analysis, ad hoc, and more. With an easy-to-use editor, you can create personalized reports, build interactive business dashboards and generate actionable business insights. Rocket.BI also allows collaboration as working together with other people in the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    DomE

    DomE

    Implements a reference architecture for creating information systems

    ...The architecture comprises elements that guarantee user access through automatically generated interfaces for various devices, integration with external information sources, data and operations security, automatic generation of analytical information, and automatic control of business processes. All these features are generated from the domain model, which is, in turn, continuously evolved from interactions with the user or autonomously by the system itself. Thus, an alternative to the traditional software production processes is proposed, which involves several stages and different actors, sometimes demanding a lot of time and money without obtaining the expected result. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    protepad

    Small GUI to encrypt/decrypt texts

    The tool is useful when you want to encrypt and decrypt texts with password. Encrypted text can be posted online, and can only be decrypted back when correct password is entered.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    SharPyShell

    SharPyShell

    Tiny and obfuscated ASP.NET webshell for C# web applications

    SharPyShell is a tiny and obfuscated ASP.NET web shell that executes commands received by an encrypted channel compiling them in memory at runtime. SharPyShell supports only C# web applications that run on .NET Framework >= 2.0. SharPyShell is a post-exploitation framework written in Python. The main aim of this framework is to provide the penetration tester with a series of tools to ease the post-exploitation phase once exploitation has been successful against an IIS webserver. This tool is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    CCTV Frame Timestamp Extractor

    CCTV Footage Timestamp Search Tool

    Python script to address the problem of manually locating required event timestamps from carved CCTV DVR footages. Full details can be found in the paper published in Eighteenth Annual IFIP WG 11.9 International Conference on Digital Forensics. Link to paper: https://link.springer.com/chapter/10.1007/978-3-031-10078-9_8 The project has been divided into four modules: Framextract.py- Extracts frames from video footages Reconstruct.py- Attempts to repair unplayable video by extracting...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    xsser

    xsser

    XSSer: Cross Site Scripter

    Cross Site "Scripter" is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. XSSer v1.8-3.tar.gz -> md5: 3058a17a1599b0ece5c722fd2e7ff455 XSSer v1.8-3.zip -> md5:840d94fe8d297ec3bbea70fb3bd57f0e
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    RedELK

    RedELK

    Red Team's SIEM - tool for Red Teams used for tracking and alarming

    RedELK is a tracking and monitoring tool for Red Teams, providing insights into engagements and supporting real-time situational awareness for offensive operations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    KaHaShEr

    KaHaShEr

    File checksum generator and verifier.

    KaHaShEr is an application to check the integrity of a file using MD5, SHA1, SHA256 and SHA512 checksum. Designed to be smart and easy to use, it includes a feature that can detect a hexadecimal value in the clipboard and automatically perform the verification while notifying you with a very expressive sound of the outcome of this verification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    UltraDDOS-v2

    UltraDDOS-v2

    DDOS tool

    One of the most overpowered DDOS weapon on the internet. This software is mainly for pen testing websites or servers.
    Downloads: 50 This Week
    Last Update:
    See Project
  • 19
    DracOS GNU/Linux Remastered
    ...DracOS GNU/Linux Remastered ( https://github.com/dracos-linux ) is the Linux operating system from Indonesia , open source is built based on Debian live project under the protection of the GNU General Public License v3.0. This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering. Use a GUI-based tools-tools the software using the CLI (command line interface) and GUI (graphical user interface) to perform its operations. Now Dracos currently already up to version 3.1.5 with the code name "KUNTILANAK WITH REMASTERED".
    Downloads: 68 This Week
    Last Update:
    See Project
  • 20

    Passlock-Windows

    AES-Encrypted Password manager

    ...The password is encrypted and decrypted using a user-defined key and will get updated in each use. Extending the length of the private key will steadily improve the overall security. PassLock also generates a 40-bit long password consisting of lowercase, uppercase letters, numbers, and symbols Passlock's 220bit AES encryption and infinitely long password generator make your passwords nearly impossible to break and Its Console Based User Interface will definitely help to enhance your experience.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    KeyRandomizer is a simple yet customizable random key generator that can either generate a single key or multiple keys at once. KeyRandomizer also allow you to customize the generation parameters such as how long the key should be and what characters to generate (you can even put your own characters).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Face Mask Detection

    Face Mask Detection

    Face Mask Detection system based on computer vision and deep learning

    Face Mask Detection system based on computer vision and deep learning using OpenCV and Tensorflow/Keras. Face Mask Detection System built with OpenCV, Keras/TensorFlow using Deep Learning and Computer Vision concepts in order to detect face masks in static images as well as in real-time video streams. Amid the ongoing COVID-19 pandemic, there are no efficient face mask detection applications which are now in high demand for transportation means, densely populated areas, residential...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    pyWhat

    pyWhat

    Identify emails, IP addresses, and more

    pyWhat is a Python-based identification tool designed to figure out “what” a piece of text or file content represents, especially in security and OSINT workflows. Given inputs such as hex strings, URLs, email addresses, IP addresses, credit card numbers, cryptocurrency wallets, or entire .pcap capture files, it scans for structured patterns and tells you what it finds. The tool is recursive: it can traverse files and directories to extract meaningful entities, which is useful when analyzing malware samples, network captures, or code repositories at scale. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 24

    Flawfinder

    Finds vulnerabilities in C/C++ source code

    Flawfinder is a program that examines C source code and reports possible security weaknesses (``flaws'') sorted by risk level. It's very useful for quickly finding and removing some security problems before a program is widely released.
    Leader badge
    Downloads: 105 This Week
    Last Update:
    See Project
  • 25

    GUI File Encrypter

    Just A Few Clicks To Encrypt Your File

    Simple GUI File Encrypter 128-bit AES in CBC mode and PKCS7 padding, with HMAC using SHA256 for authentication. Requirements: - Python 3.9 - Dependencies are required to be installed, Read the README.txt file for instructions. How To Run The Program: - Windows: Just run GUI File Encrypter.py - Mac / Linux: Open Terminal, navigate to folder with the program files & type "python3 GUI\ File\ Encrypter.py" without the quotes If you need to rename the file you can just make...
    Downloads: 0 This Week
    Last Update:
    See Project