Showing 206 open source projects for "security"

View related business solutions
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 1
    Tranalyzer

    Tranalyzer

    Tranalyzer flow generator packet analyzer moved to: tranalyzer.com

    ...It is intended to serve as a tool for IT troubleshooting, encrypted traffic mining, AI preprocessing and forensic analysis. A packet based "tshark mode" for detailed header and content inspection is improved for troubleshooting and security purposes. Flow based and packet based content inspection and extraction, better reporting, geo and organisation labeling, forensics support and encapsulation support such as ethip, teredo, anything in anything, SCTP, etc are new features of the 0.8.14. Checkout the tutorials: https://www.tranalyzer.com/tutorials
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    CloudMapper

    CloudMapper

    CloudMapper analyzes your Amazon Web Services (AWS) environments

    ...The original purpose was to generate network diagrams and display them in your browser (functionality no longer maintained). It now contains much more functionality, including auditing for security issues. If you want to add your own private commands, you can create a private_commands directory and add them there. You must have AWS credentials configured that can be used by the CLI with reading permissions for the different metadata to collect. Cloudmapper needs to make IAM calls and cannot use session credentials for collection, so you cannot use the AWS-vault server if you want to collect data, and must pass role credentials indirectly or configure AWS credentials manually inside the container. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    StreamAlert

    StreamAlert

    StreamAlert is a serverless, realtime data analysis framework

    StreamAlert is a serverless, real-time data analysis framework that empowers you to ingest, analyze, and alert on data from any environment, using data sources and alerting logic you define. Computer security teams use StreamAlert to scan terabytes of log data every day for incident detection and response. Incoming log data will be classified and processed by the rules engine. Alerts are then sent to one or more outputs. Rules are written in Python; they can utilize any Python libraries or functions. Merge similar alerts and automatically promote new rules if they are not too noisy. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    openPOWERLINK

    openPOWERLINK

    An Open Source POWERLINK Stack

    ...The latter may be moved to a dedicated communication processor or into a kernel module to deliver enhanced performance while still keeping the API in user space. A full documentation of the stack is available on the web site: http://openpowerlink.sourceforge.net The following page can be used to report a security vulnerability: https://sourceforge.net/p/openpowerlink/discussion/
    Leader badge
    Downloads: 14 This Week
    Last Update:
    See Project
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 5

    ExRandom

    Sampling exactly from the normal and exponential distributions

    ExRandom is a small header-only C++11 library for exact sampling from the normal, exponential, and discrete normal distributions (provided that the underlying generator is perfect). This library provides an implementation of the algorithms described in C. F. F. Karney, Sampling exactly from the normal distribution, ACM Trans. Math. Software 42(1), 3:1-14 (Jan. 2016), https://doi.org/10.1145/2710016, https://arxiv.org/abs/1303.6257.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    iHome by ionware

    iHome by ionware

    iHome Smart Home System Platform

    iHome is a fully tested Smart Home Automation system using the Raspberry Pi Zero WiFi SBC and Linux OS and has all the functional features of NEST or ECOBEE smart thermostats with the added benefit of full privacy and security at less than half the price! It incorporates MBLogic with algorithms and Modbus coms for HVAC home control via the ionware modbus compatible ionC1 input/output controller board. The iHome software system comes fully configured as a SD Card image file for Raspberry Pi Zero wifi Plug and Play capability complete with MBLogic, Node-RED and MQTT already fully installed and ready to go. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Jacksum

    Jacksum

    a free cross platform checksum utility, supports 58+ hash algorithms

    Development of this project has been moved to https://github.com/jonelo/jacksum. This site has been left for historical purposes ONLY, you find older Jacksum versions here. Please visit the GitHub site for current development. Jacksum 1.7.0 is a platform independent checksum utility (written entirely in Java) for computing and verifying (integrity check) checksums, CRC and hashes (fingerprints). It supports 58 popular hash algorithms and a lot of unique features.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 8
    Jack LIRE (Linked Record)

    Jack LIRE (Linked Record)

    Quantum universal object system with referencing and genetics

    Jack LIRE (Linked Record) is a quantum database-backed life-long text record diary with referencing (linking) between records, and a data library for life-long keeping of files such as documents, photographs, music and more. The diary records are fully searchable. Files can be mentioned in diary records to preserve memories, document knowledge and ideas, and more. Massive numbers of diary records and files can be permanently kept. A database located on one computer can be accessed from...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    ParamIT

    a Toolset for Molecular Mechanical Force Field Parameterization

    ParamIT is a toolkit aiding the development of molecular mechanical force field parameterization of small, drag like, molecules within CHARMM general force field (CGenFF) protocol. The developed toolkit helps the researchers in following ways: 1) automating the creation of multiple input files for quantum and molecular mechanics programs, 2) automating the output analysis and 3) substitute the use of full MM programs with a faster specialized one. The developed tools include: 1) generator of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Turn more customers into advocates. Icon
    Turn more customers into advocates.

    Fight skyrocketing paid media costs by turning your customers into a primary vehicle for acquisition, awareness, and activation with Extole.

    The platform's advanced capabilities ensure companies get the most out of their referral programs. Leverage custom events, profiles, and attributes to enable dynamic, audience-specific referral experiences. Use first-party data to tailor customer segment messaging, rewards, and engagement strategies. Use our flexible APIs to build management capabilities and consumer experiences–headlessly or hybrid. We have all the tools you need to build scalable, secure, and high-performing referral programs.
    Learn More
  • 10
    Xplico

    Xplico

    Xplico is a Network Forensic Analysis Tool (NFAT)

    Xplico is a Network Forensic Analysis Tool (NFAT). The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP, MGCP, MEGACO, RTP), IRC, WhatsApp... Xplico is able to classify more than 140 (application) protocols. Xplico cam be used as sniffer-decoder if used in "live mode" or in conjunction with netsniff-ng. Xplico is used...
    Downloads: 27 This Week
    Last Update:
    See Project
  • 11
    Our idea is to deploy a society of computational agents that collaborate in order to achieve the shared goal of decrypting a chunk of ciphertext or recovering a password from an hash by means of a dictionary-based attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    PF_HP

    PF_HP

    Prediction of proteinfolding in 2D HP model

    Even in the simplified two dimensional HP-model (hydrophob/polar) the prediction of proteinfolding is NP complete. We implement a brute force algorithm with serial and parallel execution to solve short inputs of HP sequences (0-1 bitstrings). Selbst im vereinfachten zweidimensionalen HP-Modell (hydrophob/polar) ist die Proteinfaltung bereits NP-vollständig. Hier implementieren wir einen brute-force Algorithmus zur Lösung kurzer Eingabesequenzen (0-1-Bitstrings) für die...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    GILIB

    GILIB

    GILIB Large Integer Arithmetic Library

    A large integer arithmetic library written in plain C.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    mep4j

    Math Expression Parser 4 Java

    Math Expression Parser 4 Java MEP4J is a high performance math expression strings parser for Java (J2SE >= 5). Compare its performance against similiar libraries and let me know your experince. The library manages the 5 operators (+, -, /, %, *) together with the following functions: - "abs" - "cos" - "sin" - "acos" - "asin" - "cosh" - "sinh" - "tan", - "tanh" - "atan" - "sqrt" - "cbrt" - "root" - "log" - "log10" - "log1p" - "exp" - "expm1" - "atan2" - "pow" The...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    S2CBench

    S2CBench

    Synthesizable SystemC Benchmark Suite

    S2CBench v.2.0 provides 18 programs written in synthesizable SystemC language. Each benchmark is designed for specific domains such as multimedia, digital signal processing, security, image processing, etc. The programs are provided with the objective to enable researchers analyze their innovative algorithms and techniques and help users compare the quality of results of state of the art commercial High Level Synthesis tools available in industry. You can log in to our Youtube channel to watch some videos about S2CBench and SystemC in general www.youtube.com/DARClabify or visit our labs web page at www.utdallas.edu/~schaferb/darclab To know more about the designs and why they were included in the benchmark suite you can read the following academic paper: B. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Latin Square Toolbox

    Generates Latin squares and counts their transversals

    The Latin Square Toolbox contains software tools for efficiently generating Latin squares and counting their transversals with various user-configurable options. This open source release aims to help educate folks on Latin squares and their important applications to cryptography. This version contains three tools: 0. Latin Square Generator (LSG) 1. Latin Square Transversal Counter (LSTC) 2. Latin Square Property Checker (LSPC)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Computer Science (OSSU)

    Computer Science (OSSU)

    Path to a free self-taught education in Computer Science

    OSSU (Open Source Society University) Computer Science is a free, peer‑maintained, self‑paced undergraduate-level CS curriculum using high-quality open online courses (often from top universities), structured to deliver a thorough CS education without tuition. It is designed according to the degree requirements of undergraduate computer science majors, minus general education (non-CS) requirements, as it is assumed most of the people following this curriculum are already educated outside the...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18

    SCADA-SST

    SCADA Security Testbed

    A simulation environment intended to study and analyze SCADA systems security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Primes

    Calculate primes by using extremely fast sorting

    This project considers the problem of calculating primes as a sorting problem. It includes the most efficient tree-based sorting algorithm that is possible and shows that finding a new prime can be done by sorting the differences between the previous primes in the right way. Unfortunately it has turned out that going this way is even more slowly than trying to find primes by brute force. So it can only be used as a test with heavy load for the sorting algorithm, which can be used for...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The Tolven platform and ePHR and eCHR applications enable interoperability across electronic health records for consumers and clinicians. Using Java, EJB3, Faces, Facelets, AJAX, relational database, and LDAP for security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    ipcvis

    Visualize Inter Process Communication

    Small python script that can visualize Inter Process Communication on Linux. It can create a graph of TCP and Unix sockets, pipes and also process hierarchy. Short (59 sec) demo visualizing ssh client connecting to ssh server on the same Ubuntu host: http://youtu.be/8XFKwzkexQY Longer (2 min 13 sec) demo visualizing ZoneMinder surveillance solution operation (stopping, starting, enabling and viewing camera): http://youtu.be/kM7klE61Ibk Tested on Ubuntu 14.10 and Debian...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    GDLOG

    Implementation of the GNFS for discrete logarithm problem in GF(p)

    GDLOG is an implementation of the General Number Field Sieve algorithm for discrete logarithm problem in GF(p).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    SEPIA: Security-oriented PN Framework

    SEPIA: Security-oriented PN Framework

    Petri net framework for security related modeling and reasoning.

    ...Along Place/Transition-nets, it supports Petri nets with distinguishable token colors and defines coloured workflow nets, where coloured tokens are interpreted as data elements used during process execution. To support information flow analysis of processes, SEPIA defines so-called IF-Nets, tailored for security-oriented workflow modeling which enable users to assign security-levels (HIGH, LOW) to transitions, data elements and persons/agents participating in the process execution. SEPIA builds upon TOVAL (http://sourceforge.net/p/toval), JAGAL (http://sourceforge.net/p/jagal) and SEWOL (https://sourceforge.net/projects/jawl/). To use SEPIA, make sure these libraries are on the build path. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    S2O

    Converting IBM SPSS files to CDISC ODM

    ...Possible use-cases: - A project is running out of funding and scientific data collection should be performed in free available/open-source data capture systems - Advantages of reliable EDC systems like: Data security (role/right management), backup infrastructure, support of the entire clinical trial lifecycle, traceability of data (who has when entered what data or changed to what value with what reason) and compliant to regulatory requirements. - Pre- / Pilot-Studies based on spreadsheets should now be enhanced towards multi-site/multi-user data collection. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    SEWOL: Security-oriented Workflow Lib

    SEWOL: Security-oriented Workflow Lib

    Java Library for workflow handling

    ...It allows to specify the shape and content of process traces in terms of entries representing the execution of a specific workflow activity. Currently it supports plain text, Petrify, MXML and XES log file types. In order to specify security-related context information, SEWOL provides access control models such as access control lists (ACL) and role-based access control models (RBAC). SEWOL uses and encloses the following libraries: - TOVAL (http://sourceforge.net/p/toval), - JAGAL (http://sourceforge.net/p/jagal), - OpenXES (http://www.xes-standard.org/openxes/), - Spex (http://code.deckfour.org/Spex/) - Google Guava (https://github.com/google/guava), - xstream (http://xstream.codehaus.org/) and - graph-impl and visualization components of Jung 2 (http://jung.sourceforge.net/). ...
    Downloads: 0 This Week
    Last Update:
    See Project