Security & Utilities Software

OS OS

    • More...
  • More...
    • More...
    • More...
    • More...

Category Category

    • More...
    • More...
      • More...
    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

    • More...
  • More...

Database Environment Database Environment

    • More...

Freshness Freshness

Security & Utilities Software

  • Mac CRM & Project Management app for small business Mac CRM & Project Management app for small business Icon
    Mac CRM & Project Management app for small business Icon

    Manage your leads, clients and projects – all in one place. Daylite keeps everyone on the same page.

    Stop using frustrating spreadsheets and expensive, clunky CRMs that waste more time than they save. Try Daylite, a better way to keep track of relationships and projects so your team can win more business & get more done.
    1/2
    Do you and everyone who will be using your CRM use Macs, iPhones & iPads?
    2/2
    One last question before you visit our site:

    How many people in your company will need to use your CRM?
  • Get the Edge; Toad Edge Get the Edge; Toad Edge Icon
    Get the Edge; Toad Edge Icon

    Your next-gen toolset for MySQL database environments

    If your organization takes advantage of the cost-effective, flexible MySQL open source database platform, then you need a toolset that supports your commitment to open source relational databases.  Toad Edge for MySQL has what you need and helps you ramp up on MySQL quickly, ensuring faster time to value.
  • Jacksum Icon

    Jacksum

    a free cross platform checksum utility, supports 58+ hash algorithms

    Jacksum is a platform independent checksum utility (written entirely in Java) for computing and verifying (integrity check) checksums, CRC and hashes (fingerprints). It supports 58 popular hash algorithms and a lot of unique features.

  • Hide In Picture

    Hide In Picture is a program that allows you to conceal files inside bitmap pictures, using a password. The pictures look like normal images, so people will not suspect there is hidden data in them.

  • FileVerifier++ Icon

    FileVerifier++

    FileVerifier++ is a Windows utility for calculating hashes using a number of algorithms including CRC32, MD5, SHA-1, SHA-256/224/384/512, WHIRLPOOL, and RIPEMD-128/160/256/320. Supported hash file formats include MD5SUM .MD5, SFV, BSD CKSUM, and others.

  • IBM's TPM 2.0 TSS

    IBM's TPM 2.0 TSS

    This is a user space TSS for TPM 2.0. It implements the functionality equivalent to (but not API compatible with) the TCG TSS working group's ESAPI, SAPI, and TCTI API's (and perhaps more) but with a hopefully simpler interface. It comes with over 110 "TPM tools" samples that can be used for scripted apps, rapid prototyping, education, and debugging. It also comes with a web based TPM interface, suitable for a demo to an audience that is unfamiliar with TCG technology. It is also useful for basic TPM management. See the below link for operating system, platform, and hardware support. See the companion IBM TPM 2.0 at https://sourceforge.net/projects/ibmswtpm2/ and attestation at projects/ibmtpm2acs I welcome (1) bug reports, (2) documentation requests, (3) suggestions for ECC tests, and (4) requests for features for which you have an immediate need. See the wiki for additional support - additions to the documentation.

  • OAST - New OpenVPN GUI Icon

    OAST - New OpenVPN GUI

    OAST is a cross-platform front-end (GUI) for OpenVPN-client, allowing to manage multiple. It's quite simple in use and provides base functionality such as monitoring connection status. Application is written in Java so it works on both Windows and Linux

  • Use DigitalOcean to Build, Deploy & Scale Web Apps Use DigitalOcean to Build, Deploy & Scale Web Apps Icon
    Use DigitalOcean to Build, Deploy & Scale Web Apps Icon

    The ease and simplicity of DigitalOcean gives developers more time to build and innovate for their customers.

    Thousands of businesses and developers around the world use DigitalOcean to easily deploy, manage, and scale applications of any size with less infrastructure friction. Go from one to a thousand virtual servers in seconds. Also, we continue to add hundreds of in-depth tutorials to our documentation library and have an active online community to get the support you need to succeed.
  • Genode OS Framework Icon

    Genode OS Framework

    Tool kit for building highly secure special-purpose operating systems

    The Genode OS Framework is a tool kit for building highly secure special-purpose operating systems. It scales from embedded systems with as little as 4 MB of memory to highly dynamic general-purpose workloads. Genode is based on a recursive system structure. Each program runs in a dedicated sandbox and gets granted only those access rights and resources that are needed for its specific purpose. Programs can create and manage sub-sandboxes out of their own resources, thereby forming hierarchies where policies can be applied at each level. The framework provides mechanisms to let programs communicate with each other and trade their resources, but only in strictly-defined manners. Thanks to this rigid regime, the attack surface of security-critical functions can be reduced by orders of magnitude compared to contemporary operating systems.

  • Free Key Generator

    Very small and quick password generator.

  • OpenAS2

    OpenAS2 is a java-based implementation of the EDIINT AS2 standard. It is intended to be used as a server. It is extremely configurable and supports a wide variety of signing and encryption algorithms. Planned enhancements in the next major release: - User interace configuration GUI - Certificate Exchange Management - OSGi deployer IMPORTANT: Read the release notes for running OpenAS2 with Java 1.6 Java 1.5 is no longer supported.

  • PwnPi

    A Pen Test Drop Box distro for the Raspberry Pi

    PwnPi is a Linux-based penetration testing dropbox distribution for the Raspberry Pi. It currently has 200+ network security tools pre-installed to aid the penetration tester. It is built a stripped down version of the Debian Wheezy image from the Raspberry Pi foundation's website and uses Openbox as the window manager. PwnPi can be easily setup to send reverse connections from inside a target network by editing a simple configuration file.

  • Mouse Lock Icon

    Mouse Lock

    Locks your computer and see if anyone was trying to guess the password

    Feel like locking your mouse when you are away? Well... you can! Mouse Lock dims your desktop (or set to solid black background) while sucking your mouse cursor to the centre of the screen! The password window also acts like an inescapable mouse trap. Neat! (No mouse is harmed during the production of this software.) If you encounter any bugs, please contact me wongchoonjie (at) gmail (dot) com If you really like Mouse Lock, please consider donating ;) http://www.misc314.com/blog/donation/ Thanks!

  • One Backup & Disaster Recovery Solution for Any Need One Backup & Disaster Recovery Solution for Any Need Icon
    One Backup & Disaster Recovery Solution for Any Need Icon

    SherWeb Online Backup Is Your Easy Solution for Cloud & Local Backups. The App Is Free, Pay Only for the Cloud Data Storage.

    With the diversity of IT solutions used, managing backup and disaster recovery can turn very complex for a business. SherWeb Online Backup simplifies everything. You back up servers, desktops, virtual machines and smart devices, plus popular applications and Office 365 data – all from a single web-based console. Active Protection, the embedded anti-ransomware feature, adds a security layer while the Cloud-to-Cloud feature saves network bandwidth.
    Are you an IT professional looking for a great security solution to resell?
    Try it FREE for 30 days!
  • secure rm

    srm is a command-line program to delete files securely.

    srm (secure rm) is a command-line compatible rm(1) which overwrites file contents before unlinking. The goal is to provide drop in security for users who wish to prevent recovery of deleted information, even if the machine is compromised.

  • phpLDAPadmin Icon

    phpLDAPadmin

    phpLDAPadmin is a web-based LDAP administration tool for managing your LDAP server. With it you can browse your LDAP tree, view LDAP schema, perform searches, create, delete, copy and edit LDAP entries. You can even copy entries between servers.

    Downloads: 284 This Week Last Update: See Project
  • Katana : Multi-Boot Security Suite Icon

    Katana : Multi-Boot Security Suite

    Katana packages security / ethical hacking distributions (like Backtrack, Ophcrack, & UBCD) together with portable Windows applications (like Metasploit, NMAP, Cain & Able, & Wireshark) to run off a single USB flash drive.

  • USB Raptor Icon

    USB Raptor

    Lock and unlock your computer using USB flash drives as keys

    Turn any USB flash drive to a computer lock and unlock key! USB Raptor can lock the system once a specific USB drive is removed from the computer and unlock when the drive is plugged in again to any USB port. The utility checks constantly the USB drives for the presence of a specific unlock file with encrypted content. If this specific file is found the computer stays unlocked otherwise the computer locks. To release the system lock user must plug the USB with the file in any USB port. Alternative the user can enable (or disable) two additional ways to unlock the system such is network messaging or password. Features • Automated USB lock and unlock function • Lock file contents are encrypted • Password to override lock (can be enabled by user) • Network command to override lock (can enabled by user) • USB drive serial number check (can be enabled by user) • Unique key for each system (can be enabled by user) • Status report function

    Downloads: 281 This Week Last Update: See Project
  • EIDAuthentication

    Allow the use of ALL smart cards (including EID or DoD smart card) to logon on Windows Vista & later on stand alone computer. This solution doesn't need an Active Directory. Please look at the projet homepage to see a list of smart cards tested.

  • OVAL Interpreter

    The OVAL Interpreter is a freely available reference implementation that demonstrates the evaluation of OVAL Definitions. Based on a set of OVAL Definitions the interpreter collects system information, evaluates it, and generates a detailed OVAL Results file. Developed to demonstrate the usability of OVAL Definitions and to ensure correct syntax and adherence to the OVAL Schemas by definition writers, it is not a fully functional scanning tool nor an enterprise scanning tool. It is a simplistic, command-line application that has the ability to execute OVAL Content on an end system. To learn more about organizations that provide OVAL content and tools or otherwise support the OVAL Language, please see the OVAL Adoption Program (http://oval.mitre.org/adoption/).

  • HPN-SSH

    HPN-SSH is a series of patched for the OpenSSH implementation of the SSH protocol. By addressing network limitations and CPU limitations significant throughput performance can be realized. Gains of close to two orders of magnitude are possible on long fat network paths. A new official git repo is now available at http://github.com/rapier1/openssh-portable. This repo will be the source of all the patches found on this page starting with OpenSSH 6.7 We encourage anyone interested to grab the repo and submit fixes and features. NOTE: The naming scheme for the patches has changed to help me automate the patch generation process. If you want all the features look for the file name "openssh-SSHVERSION-hpn-VERSION.diff"

    Downloads: 257 This Week Last Update: See Project
  • ufonet Icon

    ufonet

    UFONet - (DDoS botnet + DoS tool) via Web Abuse

    UFONet - is a tool designed to launch Layer 7 (HTTP/Web Abuse) DDoS & DoS attacks. + FAQ: https://ufonet.03c8.net/FAQ.html -> UFONet-v1.0 "TachY0n!" (.zip) -> md5 = a928524c167238d6a95a8a38ada5c334 --------------------------------------------

    Downloads: 256 This Week Last Update: See Project
  • FileKiller Icon

    FileKiller

    It completely removes a file from your disk without leaving any track. It is very fast. It overwrites any deleted file with blanks or random data N times - where N is given by the user. Also, it changes the filename. No setup is needed.

  • mendelson AS2 Icon

    mendelson AS2

    Implementation of the EDIINT AS2 protocol (RFC 4130)

    mendelson AS2 is a JAVA-based open source EDIINT AS2 solution. Logging- and configuration GUI (SWING), async & sync MDN, signatures, encryption, SSL, web interface, pluggable into any servlet container, TP manager, compression, optional profiles: MA, FN

  • No Autorun

    A tool to block viruses in USB flash/disk from auto-running. When a USB disk is inserted, this tool not only locks the "autorun.inf" file, but also locks all the autorun-related virus and other suspicious files.

  • WebLocker Icon

    WebLocker

    Ad-Blocker ,Anti-Porn, Anti-DNS Leak, Web Blocker, Connectivity Fixer

    WebLocker is a free software that allows you to block annoying ads, block domains known to spread malware, block adult websites (Pornography), block social networks, block online gambling, stop DNS leaking and more features. Available for Windows: XP, 7, 8, 8.1 and 10. We hope you enjoy using WebLocker! TheYousSoft Team

  • Rinzler USB Cleaner Icon

    Rinzler USB Cleaner

    V2.0-Unhides Folder/Files,removes malicious scripts from USB Drive

    V2.0 (30th Dec 2014). It is a USB Malware Cleaner. This is a small tool that removes malicious scripts created by virus or malware, unhides folder and files, deletes all shortcut from selected drive. Also disables autorun completely and provides option to enable registry, folder options and task manager. Visit the project website for more information.

  • CyoHash Icon

    CyoHash

    Shell extension for easily calculating a file's hash (MD5/SHA1/etc.)

    CyoHash is a simple shell extension that is used from within Windows Explorer to calculate the MD5 hash, SHA1 hash, or CRC32 checksum of a file. (Additional SHA256, SHA384, and SHA512 algorithms are available for users of Windows XP SP3 or newer.)

  • Magstripper

    Magstripper is a magnetic card reader and decoder that takes raw waveform information from a magnetic audio head (soldered directly to a mono audio jack) and processes it via a mic input. It also includes a multi-user door lock access control system.

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you