Showing 960 open source projects for "security"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    PyLibrary

    PyLibrary

    Libraries for Python developers.

    Development in Python (be it website or an App development or implementation of an automation framework) always involves certain operations like handling db queries, operations on web, development of data structures, windows operations (handing services, registries), logging and many more... What, if you have these libraries handy with you all the time? Just import and start using them.. In comes PyLibrary.. PyLibrary is a collection of infrastructure libraries that aid faster...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    SPyMap Portscanner

    A python based portscanner, using scapy

    A portscanner written in python, using the scapy libraries. Originally intended to be a clone of Nmap, it is growing into its own creation, intended to be a part of a much larger project later on.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Auto File Selection

    Detect all the "important" files from your computer.

    The main aim of this project is to design and develop a mechanism that can find all the “important” files inside a computer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    This is a swig-based python wrapper for the OpenPACE library.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Inventors: Validate Your Idea, Protect It and Gain Market Advantages Icon
    Inventors: Validate Your Idea, Protect It and Gain Market Advantages

    SenseIP is ideal for individual inventors, startups, and businesses

    senseIP is an AI innovation platform for inventors, automating any aspect of IP from the moment you have an idea. You can have it researched for uniqueness and protected; quickly and effortlessly, without expensive attorneys. Built for business success while securing your competitive edge.
    Learn More
  • 5
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    RSAmake

    RSAmake

    An Cryptography software with RSA algorithm

    An Cryptography software with RSA algorithm RSAmake using Python and WxPython written
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Parano is a GNOME frontend for creating/editing/checking MD5, SHA-1 and SFV files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    srvRX live

    A simple project for creating hosting server-a-like live distribution

    The idea is creating a simple and easy to install debian based secure system distibuted in LAMP stack as well and LNMP (nginx), with support for 32-64 bit cpus and small-large ram. Initial Stage: Creating stable live systems Second Stage: mod_mono and php coexistance, RoR, manage users/groups/packages scripts and system monitoring system, custom graphics Third Stage BUilding entire CnCP system (CnCp's not cPanel in old UNIX fashion), a web interface to create/manage and deploy...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    FactHash

    Factorial Hashing Function

    ...It produces variable length hash from a message block of the size you want. The resulting hash will be ~2x the message block in size, and should provide for at least as many bits of security as the block itself. I updated this, with a different hash than original, since I found a potential collision on some blocks, not but specific to that challenge. To further correct this, I modified the padding when it's less than the block size. I hold no guarantee of the security of this algorithm, USE AT YOUR OWN RISK. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 10
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Programa escrito en python y que permitira analizar las antenas y tarjetas inalambricas para compararlas asi como calibrar la calidad de la conexion. Este es mi primer programa en python por lo que os ruego comprension.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    CommunityBackup

    ...a work in progress.

    Setup files are quite old.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    SAT (Simple scAnning Tool) is a simple and fast network scanner written in Python progamming language. It is used to identify network devices/services: the identification is based on recieved data (for example banners).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    TorApplet is a simple GNOME applet for managing and monitoring the basic activities of the Tor daemon. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    Pass Phrase Generator

    Strong pass phrase generator using python on ubuntu

    Strong pass phrase generator using python on ubuntu. The code takes 2 random words and a random number, concatenates them together and puts one of the words into upper case. This provides a long easy to remember pass phrase which satisfies "must include numbers, letters, upper and lower case" password guidelines. The code is called Pass Phrase Generator because it lets me use the acronym PPG which is the energy weapons used in Babylon 5.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    KillDisk

    KillDisk

    Disk Wiping Software

    KillDisk is a program written in python for Unix based systems for wiping a hard drive. It can wipe a hard drive using all zeroes or random data, and as many times as you want to specify. If you'd like to donate there's several ways to do so: PayPal: https://paypal.me/gerowen Bitcoin (BTC): bc1q86c5j7wvf6cw78tf8x3szxy5gnxg4gj8mw4sy2 Monero (XMR): 42ho3m9tJsobZwQDsFTk92ENdWAYk2zL8Qp42m7pKmfWE7jzei7Fwrs87MMXUTCVifjZZiStt3E7c5tmYa9qNxAf3MbY7rD LiberaPay: https://liberapay.com/gerowen
    Downloads: 11 This Week
    Last Update:
    See Project
  • 17

    PyEvcs

    Extended Visual Cryptography Schemes in Python

    Visual Cryptography is a graphical form of information concealing. In a 2-out-of-2 Visual Cryptography Scheme a dealer will "split" a secret image into two shares, print the shares onto separate transparencies and hand them to the participants to the scheme. If the two participants come together, they'll be able to reveal the secret image without a computer, perfectly superimposing the transparencies they own. Analyzing a single share, no one will be able to obtain any information...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    SuStorID is an advanced Intrusion Detection System (IDS) for web services, based on machine learning. Its name comes from the term “Su Stori”, which in Sardinian language means “The Falcon”. It’s version is experimental, but demonstrates a number of interesting features, that can be readily exploited to detect and act against web attacks. SuStorID can be coupled with modsecurity, the well known web application firewall, to gather training data and provide for real-time counteractions. So,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Python module for the libpcap packet capture library, based on the original python libpcap module by Aaron Rhodes.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Pombo

    Pombo

    Pombo can help you recover your computer in the event it's stolen.

    Pombo works silentely in the background, hidden, and sends tracking information to a webserver of your choice. If your computer is stolen, just log into your webserver to get the lastest file uploaded by Pombo, decrypt and hand it to the police. They will have all they need to catch the thief: IP address, date/time, nearby routers, screenshot, and even a photo of his/her face if you have a webcam ! Pombo protects your privacy: Tracking information is encrypted with rock-solid GnuPG and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    tickets

    pythonic kerberosish ticket system: easy to use, easy to subclass

    A SecureTicket, or Ticket, consists of salt, hash, valid_until, public_flags, flags, data and "invisible" hashed entropy. Tickets are symmetrically signed using SHA256-HMAC. Fields 'valid_until', 'flags' and 'data' may be optionally encrypted using AES128-CBC or TripleAES128-CBC. Values 'data' and 'entropy' may consist of arbitrary objects which are transparently pickled(serialized), optionally gzipped and of course securely signed. Specific implementations are included: FormTicket:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    connect_3g

    Linux utility that connects you to the 3g networks in Bulgaria

    ...Currently tested on recent Ubuntu, Debian, Fedora and openSUSE distributions and following devices: HUAWEI E173 (Vivacom), Alcatel X220L (Vivacom), ZTE MF190 (Globul), ZTE K3565-Z (M-tel). connect_3g now supports PIN code security, though using it is not recommended.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Effacor

    Protect sensitive data that has been deleted from recovery.

    When a file is deleted from a device the space for that file is merely de-allocated. In short: The DATA contained in that file still remains, and can be recovered. This can quickly become a security concern. There are various areas of business where this scenario is unacceptable: HIPAA Protected Medical Information, and Financial Data amongst them. Client Data must be protected from recovery in the event of theft. Blue-Pencil was created to fulfill that. "Blue-Pencil" protects sensitive data by "sanitizing" it - writing over it using special patterns designed to make data unrecoverable by traditional means before deletion thus keeping the data safe from prying eyes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    VeloApport

    Log and track user/computer info in MS Windows environments

    A system to log and track user logons, logoffs, computer information, and statistics in a Microsoft Windows environment. It includes a client side application (veloapport.exe - intended to be run as a logon and logoff script) and an analyzer (veloapportdetective.py) reporting hardware changes and populates a computer inventory table. The client (veloapport.exe) sends user and machine information to a MySQL database server and VeloApport Detective populates a computer inventory table while...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    ...It will tell you all the information and even show the content of the shares. It will also show you shares that are not accessible.Also provide a username and password to it. To know more about SecPoint IT security solutions visit us at www.secpoint.com
    Downloads: 0 This Week
    Last Update:
    See Project