Showing 206 open source projects for "security"

View related business solutions
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 1
    The Digital Communication Systems Lib: This library contains digital communucations systems implementations, such as BSPK and MIMO - WOFDM. Various OpenSource Projects: 1. Password/Username/Domain Analyzer
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    HcryptoJ (Historical cryptology in Java) is a Java based programming library for implementing and analyzing historical ciphers. HcryptoJ is designed to support research and teaching in historical cryptography and computer science. Licensed under GPL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Alkindus is an automated solver for short monoalphabetic substitution ciphers without word divisions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    ScardFace is a python3k library for interfacing with smart cards, which supports Plug-and-Play readers inclusion and threading. It also offers classes for manipulating APDU cmds and resps, and use them in a transport-protocol-independent fashion.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • 5
    GenoGUARD is a DNA sequence screening software that implements the best match method recommended by the federal government to detect the presence of biosecurity threats in synthetic DNA orders.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    TMAJ is software for Tissue MicroArrays (TMA's). Patients, specimens, blocks, slides, cores, images, and scores can all be stored and viewed. Features include advanced security, custom dynamic fields, and an image analysis program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Security Constrained Unit Commitment. Simulation of Power Markets cleared through central commitment and dispatch (MISO/SPP, PJM, ISO NE, Cal ISO MRTU, ERCOT Nodal). Calculates nodal LMP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Matlab, Maple and C/C++ applications of Linear Algebra in many domains, including curves in many dimensions, Cryptography and Chaos etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This project provides a java implementation of the Captcha project ( see http://www.captcha.net ). A CAPTCHA is a program that can generate and grade tests that: -Most humans can pass. -Current computer programs can't pass.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Axe Credit Portal - ACP- is axefinance’s future-proof AI-driven solution to digitalize the loan process from KYC to servicing, available as a locally hosted or cloud-based software. Icon
    Axe Credit Portal - ACP- is axefinance’s future-proof AI-driven solution to digitalize the loan process from KYC to servicing, available as a locally hosted or cloud-based software.

    Banks, lending institutions

    Founded in 2004, axefinance is a global market-leading software provider focused on credit risk automation for lenders looking to provide an efficient, competitive, and seamless omnichannel financing journey for all client segments (FI, Retail, Commercial, and Corporate.)
    Learn More
  • 10
    Graphical OS fingerprinting
    GraphicalOSfp is a python application which aims to collect random data issued by remote systems in IP and TCP sequences. These data are then displayed in a 3D referencial to highlight an attractor of the random engine of the remote machine.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Optimum Path Calculator
    Simple UI to test the effectiveness of a heuristic algorithm against the brute force method for path finding among an arbitrary number of arbitrarily placed points on a grid. This is an educational project, don't expect new and better methods.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    Byte Investigator

    Scripts for parsing and general use in Computer Forensics - Octane Lab

    ...Byte Investigator The Byte Investigator project from Octane Labs was born in order to be a parsing toolkit for several Windows structures (files and file system structures). These Perl script tools are useful tools for Computer Forensics professionals and Information Security researchers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    This is a highly configurable and flexible testing tool capable of generating different streams of network packets based on set of parameters user provides, for performance & robustness testing on a NIDS - Network Intrusion detection System.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Strong cypher with unique recursive alghorythm of bitwise gamma with good avalanche and diffusion. Recurse allow explore quality and parameters at short sequences of data and keys and extrapolate it on very long data and keys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This is the extended euclidean algorithm implemented in haskell. It will put every single step of the algorithm in a file and show the actual result and everything in between.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ConDEnSE (Confidential Data Enabled Statistical Exploration) will be a web-based environment for statistical analysis of confidential data from various database sources, based on Plone and R, and using the Jackknife method of confidentiality protection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The purpose of eAudit is to provide a comprehensive reporting capability relating to Electronic Auditing for various industries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A library to parse user-entered form data such as telephone numbers, social security numbers, dates, etc. and intelligently convert them to usable and normalized forms, with country codes, area codes, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Process Memory Dumper it's developed for IT Consultants IT Security Consultants that need to dump the entire memory of a process and/or save informations about all running processes and modules. It's developed in C++ using MFC
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    BioWebAuth (Biometrics for Web Authentication) is an open source Java framework intended to provide single sign-on web authentication based on BioAPI-compliant biometric software or devices. It uses the JA-SIG Central Authentication Service architecture.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    OpenUAT is a toolkit for authentication in ubiquitous computing systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    An extend version of NuSMV, which supports symbolic model checking of ETL and APSL
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    The kernel network stack may behave not as expected, especially in the case of receiving packets. With Ianus it is possible to bypass the kernel network stack and to develop your own network stack in user space or other tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    SURFnet IDS, a Distributed Intrusion Detection System (D-IDS). The goal is to provide an early warning system which lets system administrators correlate known and unknown exploits to attacks directed towards their networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    a number of clients try to find a secret key by calculating the encryptions to all possible keys of a given key range and comparing them to the encryptin of the secret key until a matching one is detected....
    Downloads: 0 This Week
    Last Update:
    See Project