Security & Utilities Software

OS OS

    • More...
  • More...
    • More...
    • More...

Category Category

    • More...
    • More...
    • More...
    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

    • More...
    • More...
  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • SolarWinds is #1 in network monitoring. SolarWinds is #1 in network monitoring. Icon
    SolarWinds is #1 in network monitoring. Icon

    Reduce network outages and improve performance with advanced network monitoring software.

    SolarWinds® Network Performance Monitor (NPM) is the ONLY monitoring solution with NetPath™ for hop-by-hop visibility into your critical paths, on-premises and into the cloud. NPM also features PerfStack™, helping you accelerate identification of root cause by dragging-and-dropping network performance metrics on a common timeline for immediate visual correlation across all of your network data. See why we're the leader. Try it free for 30 days!
  • Rapid Development Environment like no other! Rapid Development Environment like no other! Icon
    Rapid Development Environment like no other! Icon

    89% of Our Customers Reduced Development Cycles Using RAD Studio. Start today a 30-Day trial (no credit card needed).

    RAD Studio™: Build cross-platform apps ridiculously FAST!  The top challenges customers solved with RAD Studio while developing applications include: Creating fast runtime application performance (50%), Keeping up with latest platforms and devices (50%), Meeting project deadlines (37%), Deploying to multiple platforms (36%) and Responsive design for multiple device types (27%).
  • Corbicula anti virus

    Corbicula anti virus provides a GNOME HIG compliant front end for ClamAV

    Downloads: 0 This Week Last Update: See Project
  • Could be A SHell

    A shell that looks and acts like a real unix-style shell, but doesn't modify the system it runs on. Ideal for sandbox SSH accounts.

    Downloads: 0 This Week Last Update: See Project
  • Credential Translation Service

    CTS is a standalone web service for converting security tokens in different formats. It uses a WS-Trust interface and supports all security token formats profiled by OASIS, including UsernameToken, Kerberos ticket, X509 Certificate and SAML assertion.

    Downloads: 0 This Week Last Update: See Project
  • Cross Site Scripting Anonymous Browser

    Cross Site Scripting Anonymous Browser (XAB) leverages web sites and client browsers to build a network of drones. It is not to replace the current anonymous browsing applications, but provides an alternative that does not require willing participants.

    Downloads: 0 This Week Last Update: See Project
  • Crybt Icon

    Crybt

    Crybt is a Data-Encryption-Tool. You can use it easily for Dropbox.

    Crybt is based on the Rijandael algorithm (AES). You can use it to encrypt your sensitive files direct into your Dropbox. But you can also use it for normal file-encryption. Crybt works with a new algorithm built by me ,that allowes you to save your password almost uncrackable.

    Downloads: 0 This Week Last Update: See Project
  • Use DigitalOcean to Build, Deploy & Scale Web Apps Use DigitalOcean to Build, Deploy & Scale Web Apps Icon
    Use DigitalOcean to Build, Deploy & Scale Web Apps Icon

    The ease and simplicity of DigitalOcean gives developers more time to build and innovate for their customers.

    Thousands of businesses and developers around the world use DigitalOcean to easily deploy, manage, and scale applications of any size with less infrastructure friction. Go from one to a thousand virtual servers in seconds. Also, we continue to add hundreds of in-depth tutorials to our documentation library and have an active online community to get the support you need to succeed.
  • CrypTunnel

    CrypTunnel is a generic cryptographed tunnel for tcp connections. its goal is to allow connections through "mean" firewalls and proxies with the tunnel and protect the content of the packages with cryptography

    Downloads: 0 This Week Last Update: See Project
  • Cryptic Icon

    Cryptic

    Cryptic is a cryptographic applications suite for encryption/decryption of data, calculating cryptographic hashes or message digests and securing user passwords using a master password in a password safe.

    Downloads: 0 This Week Last Update: See Project
  • Cryptico

    An open source, easy to use encryption program, with features to help keep your encrypted files secure.

    Downloads: 0 This Week Last Update: See Project
  • Crypto

    Crypto je aplikacija za mobilne telefone, koja sluzi za kriptovanje SMS poruka polialfabetskom sifrom.

    Downloads: 0 This Week Last Update: See Project
  • Crypto Boot Manager

    Makes it easier to build a Linux system where the whole hard drive is encrypted (except for the MBR), and where the system must be booted from a USB memory stick which holds slightly customized boot code and the passphrase-protected keys.

    Downloads: 0 This Week Last Update: See Project
  • Identify and respond to threats before damage is done Identify and respond to threats before damage is done Icon
    Identify and respond to threats before damage is done Icon

    A SIEM that makes it easy to use logs for security, compliance, and troubleshooting.

    SolarWinds® Log & Event Manager (LEM) delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-use, and quick-to-deploy virtual appliance. LEM provides the visibility, security, and control that IT professionals need to alert on and respond to security threats, and assist in meeting the regulatory compliance guidelines of HIPAA, PCI DSS, SOX, and more. Try it FREE for 30 days!
  • Crypto Library GOST R-34.*

    the library provides elliptic-curves cryptographic functionality (as described in russian standards R-34.*) and also huge integers arithmetics and finite fields arithmetics functions NOTE ! you have an option to choose your own RNG

    Downloads: 0 This Week Last Update: See Project
  • Crypto Library for .NET

    The purpose of this project is to create a library of cryptographic functions for .NET, in fully managed C#. This will extend the existing .NET framework crypto functionality.

    Downloads: 0 This Week Last Update: See Project
  • CryptoGnome

    CryptoGnome is an attempt to reinvent the wheel without reinventing the wheel. The final goal is an open source VCS similiar to ClearCase. There will be a major milestone at the CVS/PRCS level of functionality.

    Downloads: 0 This Week Last Update: See Project
  • CryptoLabs

    This project is a collection of labs from the book by N. Smart, "Cryptography". Programming language: C/C++. OS: QNX.

    Downloads: 0 This Week Last Update: See Project
  • CryptoSMS

    This tool provides an J2ME Application for your mobile phone for sending SMS ciphered (DES, 3DES, IDEA, RC2, Blowfish, AES, Rijandel).

    Downloads: 0 This Week Last Update: See Project
  • Cryptographic Disk Driver in Linux

    Cryptographic Disk Driver for Linux

    Downloads: 0 This Week Last Update: See Project
  • Cryptos

    A very simple encryption tool. Includes: 1. Ability to encrypt files and text using the Blowfish algorithm 2. Encode files and text using Base 64 algorithm, 3. ROT13 4. Calculation of MD5 digests

    Downloads: 0 This Week Last Update: See Project
  • Downloads: 0 This Week Last Update: See Project
  • CurrentTime

    This is a program to actually log a user off of Win32 desktop at a specified time.

    Downloads: 0 This Week Last Update: See Project
  • Cyana

    Cyana is a security framework for analyzing security systems and developing methods of exploitation.

    Downloads: 0 This Week Last Update: See Project
  • CyberDemon

    CyberDemon is highly experimental prototype of the antivirus engine and is based on a new model of artificial neuron (cyberneuron).

    Downloads: 0 This Week Last Update: See Project
  • DCracker

    The program uses a number of processes to brute-force crack MD5 hashes. MD5 brute-force cracking involves hashing all possible strings and each time compare the obtained hash to the one we are trying to crack

    Downloads: 0 This Week Last Update: See Project
  • DDoS Wifi Attack Icon

    DDoS Wifi Attack

    DDoS Wifi Attack

    DDoS Wifi Attack

  • DENRIT Icon

    DENRIT

    Perform anonymous and non-anonymous pentesting.

    DENRIT allows remote administration of anonymous networks (TOR, I2P and FreeNet). Also, contains a pentesting module to execute commands using a selected anonymous network, pentesting with TOR or TCP Follows a client/server model with well-defined communication interfaces. SSH is used to allow remote clients to access the machine and manage any anonymous network that is installed there, plus allows penetration testing anonymously (or non-anonymously) using tools such as Metasploit Framework, nmap, nikto, among others. The list of supported applications will grow as the project progresses. Until now, this project is under development and is very unstable (and some features aren't included). But I've been developing constantly and I think that soon this software will become stable and very useful to pentesters, hackers and researchers (I hope so!) Well, you can see the wiki page and the presentation exposed in the download section if you want more information about this project.

  • DKAA

    This is a Java project that aims to provide an implementaion of the Oasis Kerberos Token Profile 1.1, by providing both client and server side java classes.

    Downloads: 0 This Week Last Update: See Project

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you