Showing 960 open source projects for "security"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    Fapro

    Fapro

    Fake Protocol Server

    Fapro is an open-source asset discovery and vulnerability scanning tool developed by Fofa Pro. It assists in identifying and managing network assets, detecting potential vulnerabilities, and enhancing overall security posture
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    pass import

    pass import

    A pass extension for importing data from most existing password

    A pass extension for importing data from most existing password managers. Password management should be simple and follow Unix philosophy. With pass, each password lives inside of a gpg encrypted file whose filename is the title of the website or resource that requires the password. These encrypted files may be organized into meaningful folder hierarchies, copied from computer to computer, and, in general, manipulated using standard command line file management utilities.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    proxy.py

    proxy.py

    Utilize all available CPU cores for accepting new client connections

    proxy.py is made with performance in mind. By default, proxy.py will try to utilize all available CPU cores to it for accepting new client connections. This is achieved by starting AcceptorPool which listens on configured server port. Then, AcceptorPool starts Acceptor processes (--num-acceptors) to accept incoming client connections. Alongside, if --threadless is enabled, ThreadlessPool is setup which starts Threadless processes (--num-workers) to handle the incoming client connections....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    malware-samples

    malware-samples

    A collection of malware samples and relevant dissection information

    This repo is a public collection of malware samples and related dissection/analysis information, maintained by InQuest. It gathers various kinds of malicious artifacts, executables, scripts, macros, obfuscated documents, etc., with metadata (e.g., VirusTotal reports), file carriers, and sample hashes. It’s intended for malware analysts/researchers to help study how malware works, how they are delivered, and how it evolves.
    Downloads: 8 This Week
    Last Update:
    See Project
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 5
    akello

    akello

    Healthcare infrastructure for absolutely everyone

    Akello is an open-source platform that simplifies healthcare service integration using microservices. It offers flexibility, scalability, and strong security for developers building healthcare infrastructures.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Universal Commerce Protocol (UCP)

    Universal Commerce Protocol (UCP)

    The common language for platforms, agents and businesses.

    ...Its modular, capability-based architecture allows businesses to expose only what they support while remaining flexible and extensible. By leveraging existing industry standards for payments, identity, and security, UCP avoids reinventing the wheel while ensuring reliability and trust. The result is a developer-friendly, future-ready protocol that simplifies commerce integration at global scale.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 7
    Maltrail

    Maltrail

    Malicious traffic detection system

    Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user-defined lists, where trail can be anything from domain name, URL, IP address (e.g. 185.130.5.231 for the known attacker) or HTTP User-Agent header value (e.g. sqlmap for automatic SQL injection and database takeover tool). Also, it uses (optional) advanced heuristic...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 8
    nbcelltests

    nbcelltests

    Cell-by-cell testing for production Jupyter notebooks in JupyterLab

    nbcelltests is designed for writing tests for linearly executed notebooks. Its primary use is for unit testing reports. Cell-by-cell testing for production Jupyter notebooks in JupyterLab. To use in JupyterLab, you will also need the lab and server extensions. Typically, these are automatically installed alongside nbcelltests, so you should not need to do anything special to use them. The lab extension will require a rebuild of JupyterLab, which you'll be prompted to do on starting...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    sqlmap

    sqlmap

    Automatic SQL injection and database takeover tool

    sqlmap is a powerful, feature-filled, open source penetration testing tool. It makes detecting and exploiting SQL injection flaws and taking over the database servers an automated process. sqlmap comes with a great range of features that along with its powerful detection engine make it the ultimate penetration tester. It offers full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, and many other database management systems. It also...
    Downloads: 18 This Week
    Last Update:
    See Project
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
    Learn More
  • 10
    OAuthLib

    OAuthLib

    A generic, spec-compliant, thorough implementation of the OAuth

    A generic, spec-compliant, thorough implementation of the OAuth request-signing logic for Python 3.8+. OAuthLib is a framework which implements the logic of OAuth1 or OAuth2 without assuming a specific HTTP request object or web framework. Use it to graft OAuth client support onto your favorite HTTP library, or provide support onto your favourite web framework. If you're a maintainer of such a library, write a thin veneer on top of OAuthLib and get OAuth support for very little effort.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Amazon DynamoDB Encryption Client Python

    Amazon DynamoDB Encryption Client Python

    Amazon DynamoDB Encryption Client for Python

    The Amazon DynamoDB Encryption Client for Python provides client-side encryption of Amazon DynamoDB items to help you to protect your table data before you send it to DynamoDB. It provides an implementation of the Amazon DynamoDB Encryption Client that is fully compatible with the Amazon DynamoDB Encryption Client for Java. The helper clients provide a familiar interface but the actual item encryption and decryption is handled by a low-level item encryptor. You usually will not need to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Home Assistant

    Home Assistant

    Open source home automation that puts local control and privacy first

    Home Assistant is a powerful open source home automation app that prioritizes local control and privacy. It offers great security and features while keeping your data securely out of the cloud. It can give you control of all your devices from a single, mobile-friendly interface and will track the state of all these devices so you don’t have to. Home Assistant is powered by a worldwide community and runs ideally on a Raspberry Pi or a local server. It can be set up to automatically control devices, so whether you want to be alerted when the lights turn on when you’re not at home, or want the lights to automatically dim when you start to watch a movie on Chromecast, Home Assistant can do it for you. ...
    Downloads: 44 This Week
    Last Update:
    See Project
  • 13
    Authlib

    Authlib

    The ultimate Python library in building OAuth, OpenID Connect

    ...Supporting a wide range of social network service connections, powered by Loginpass. Authlib is built from low level of specifications to high level of framework integrations. Security matters in Authlib. We have a section on security process at the very first begin. Authlib is created with sustainable maintainence in mind. Consider to buy a commercial plan.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Applio

    Applio

    A simple, high-quality voice conversion tool focused on ease of use

    ...The project is structured to be flexible through plugins and configurations so users can extend functionality without touching the core code. Applio is considered stable and mature; ongoing development is now centered on security patches, dependency maintenance, and occasional improvements, which makes it attractive for production or repeatable workflows. It also includes TensorBoard helper scripts so people training custom models can monitor metrics and experiment more systematically.
    Downloads: 38 This Week
    Last Update:
    See Project
  • 15
    LAMDA

    LAMDA

    Android reverse engineering & automation framework

    ...The most powerful Android capture/reverse/HOOK & cloud phone/remote desktop/automation framework in history, your work has never been so easy and fast. LAMDA is an auxiliary framework for reverse engineering and automation. It is designed to reduce the time and trivial problems of security analysts and application testers. It replaces a large number of manual operations with a programmed interface. It is not a single-function framework. To give you a general idea of ​​its usefulness: Do you install various agents, plug-ins, or point-and-click settings on your phone to complete your work? Do you want to operate a mobile phone thousands of miles away in a different place? ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 16
    GTFOBins

    GTFOBins

    GTFOBins is a curated list of Unix binaries

    GTFOBins is a curated catalog of Unix / POSIX system binaries and how they can be misused to bypass restrictions, escalate privileges, exfiltrate data, spawn shells, or otherwise act as “living off the land” tools in a compromised environment. It collects documented techniques for how everyday binaries (e.g. awk, bash, tar, scp) can be abused under constrained conditions. Indexed list of Unix binaries and documented misuse techniques. Examples of command invocations to exploit...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    ggshield

    ggshield

    Detect and validate 500+ types of hardcoded secrets

    GitGuardian’s ggshield is an open-source command-line interface (CLI) tool designed to help developers and security teams detect hardcoded secrets and sensitive credentials early in the development process, either locally or in CI/CD pipelines. It scans source code, configuration files, commit history, and other artifacts to automatically detect hundreds of different secret types — such as API keys, tokens, and passwords — helping prevent accidental leaks before they reach version control or production environments. ggshield can be used interactively on a developer’s machine, integrated as a pre-commit or pre-push git hook, and run as part of automated build or merge workflows to enforce security policies consistently across teams. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    JumpServer

    JumpServer

    Manage assets on different clouds at the same time

    The JumpServer bastion machine complies with the 4A specification of operation and maintenance security audit. Zero threshold, fast online acquisition and installation. Just a browser, the ultimate Web Terminal experience. Easily support massive concurrent access. One system manages assets on different clouds at the same time. Audit recordings are stored in the cloud and will never be lost. One system, is used by multiple subsidiaries and departments at the same time.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 19
    Django-CRM

    Django-CRM

    Open Source CRM based on Django

    Django CRM is opensource CRM developed on django framework. It has all the basic features of CRM to start with. We welcome code contributions and feature requests via github. Create and activate a virtual environment. Install the project's dependency after activating env.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 20
    objection

    objection

    Objection - runtime mobile exploration

    objection is a runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak. Perform memory-related tasks, such as dumping & patching. Explore and manipulate objects on the heap. Installation is simply a matter of pip3 install objection. This will give you the objection command. You can update an existing objection installation with pip3 install --upgrade objection.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 21
    Borgmatic

    Borgmatic

    Simple, configuration-driven backup software for servers

    ...It simplifies the creation, pruning, and verification of encrypted, deduplicated backups through a single YAML configuration file. Designed for both servers and desktops, borgmatic is ideal for users who want reliable, scriptable backup workflows with minimal setup and strong security.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 22
    Best-of Python Developer Tools

    Best-of Python Developer Tools

    A ranked list of awesome python developer tools and libraries

    A ranked list of awesome Python developer tools and libraries. Updated weekly. This curated list contains 270 awesome open-source projects with a total of 810K stars grouped into 16 categories. All projects are ranked by a project-quality score, which is calculated based on various metrics automatically collected from GitHub and different package managers. If you like to add or update projects, feel free to open an issue, submit a pull request, or directly edit the projects.yaml....
    Downloads: 7 This Week
    Last Update:
    See Project
  • 23
    Network Security Toolkit (NST)

    Network Security Toolkit (NST)

    A network security analysis and monitoring toolkit Linux distribution.

    Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 42 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools.
    Leader badge
    Downloads: 240 This Week
    Last Update:
    See Project
  • 24
    GRR

    GRR

    GRR Rapid Response, remote live forensics for incident response

    GRR Rapid Response is an incident response framework focused on remote live forensics. It consists of a python client (agent) that is installed on target systems, and python server infrastructure that can manage and talk to clients. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR client is deployed on systems that one might want to investigate. On every such system, once...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    OpenHands

    OpenHands

    Open-source autonomous AI software engineer

    ...Our agents can do anything a human developer can: they write code, run commands, and use the web. We're partnering with AI safety experts like Invariant Labs to balance innovation with security.
    Downloads: 12 This Week
    Last Update:
    See Project