Security & Utilities Software

OS OS

  • More...

Category Category

    • More...

License License

    • More...
  • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

    • More...
  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • 2018 Network Intelligence Planning Guide 2018 Network Intelligence Planning Guide Icon
    2018 Network Intelligence Planning Guide Icon

    Get insights on net neutrality, cloud readiness, security and WAN transformation.

    Networking is becoming cloudier, hybrid and more Internet-centric. IT managers now own user experience, whether they own the networks or not. Get our latest ebook to learn how network intelligence will help you adapt to a quickly changing Internet-centric environment.
    Are you involved with your company's network performance/operations team?
    Get Ebook
  • Discover server and application network dependencies Discover server and application network dependencies Icon
    Discover server and application network dependencies Icon

    Discover and troubleshoot application dependencies to determine if it’s an application or network problem with SolarWinds Server & Application Monitor

    Server & Application Monitor helps you discover application dependencies to help identify relationships between application servers. Drill into those connections to view the associated network performance such as latency and packet loss, and application process resource utilization metrics such as CPU and memory usage. Determine if process utilization or network performance is affecting the application and end-user performance.
  • OWASP Mantra - Security Framework Icon

    OWASP Mantra - Security Framework

    Free and Open Source Browser based Security Framework

    OWASP Mantra - Free and Open Source Browser based Security Framework, is a collection of free and open source tools integrated into a web browser, which can become handy for penetration testers, web application developers, security professionals etc.

  • EncFSMP Icon

    EncFSMP

    Mount EncFS folders - multiplatform style.

    EncFSMP can create, mount and edit EncFS (encrypted file system) folders on Windows and Mac OS X.

  • Aircrack-ng Windows GUI Icon

    Aircrack-ng Windows GUI

    This is mainly just an interface tweak. Added function of mac address changer. If you have problems getting the mac changer to work, try using a mac address that starts with something other than "00" in the first octet. If you are intersted in learning about network security please check out my Juniper Networks training course at: http://academy.gns3.com/courses/juniper-jncia-intro-to-junos

  • Cyberoam iView - Open Source SIEM Icon

    Cyberoam iView - Open Source SIEM

    Cyberoam iView; the Intelligent Logging & Reporting solution provides organizations network visibility across multiple devices to achieve higher levels of security, data confidentiality while meeting the requirements of regulatory compliance. To know more about Cyberoam and it’s security solutions visit us at www.cyberoam.com.

  • Yet Another (remote) Process Monitor Icon

    Yet Another (remote) Process Monitor

    Yet Another Process Monitor (YAPM) is a powerful process viewer for Windows that monitors the services & processes, their modules, threads, handles, windows, TCP/UDP connections... etc. running on local system or on any of the computers on your network.

  • Modern Object Pascal coding? Try Delphi Modern Object Pascal coding? Try Delphi Icon
    Modern Object Pascal coding? Try Delphi Icon

    The most powerful Object Pascal IDE and library for cross-platform Native App Development with flexible Cloud services and broad IoT connectivity

    Delphi is the choice for developers wanting the power, readability and flexibility of the Modern Object Pascal language, coupled with native compilers and component libraries for fast single source code development on Windows, macOS, iOS, Android and Linux. Get Started with a FREE, fully functional 30-day license of Delphi.
  • FileVerifier++ Icon

    FileVerifier++

    FileVerifier++ is a Windows utility for calculating hashes using a number of algorithms including CRC32, MD5, SHA-1, SHA-256/224/384/512, WHIRLPOOL, and RIPEMD-128/160/256/320. Supported hash file formats include MD5SUM .MD5, SFV, BSD CKSUM, and others.

  • IBM's Software TPM 2.0

    This project is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 source code donated by Microsoft, with additional files to complete the implementation. See the wiki for additional support - additions to the documentation. See the companion IBM TSS at https://sourceforge.net/projects/ibmtpm20tss/

    Downloads: 199 This Week Last Update: See Project
  • Web Application Protection Icon

    Web Application Protection

    Tool to detect and correct vulnerabilities in PHP web applications

    WAP automatic detects and corrects input validation vulnerabilities in web applications written in PHP Language (version 4.0 or higher) and with a low rate of false positives. WAP detects the following vulnerabilities: - SQL injection using MySQL, PostgreSQL and DB2 DBMS - Reflected cross-site scripting (XSS) - Stored XSS - Remote file inclusion - Local file inclusion - Directory traversal - Source code disclosure - OS command injection - PHP code injection WAP is a static analysis tool that performs taint analysis to detect vulnerabilities, tracking malicious users inputs and checking if they reach calls of sensitive functions. It has a low rate of false positives because has implemented a data mining module to predict false positives when detects vulnerabilities. The output of the tool is: - shows the vulnerabilities found and how they are corrected - new files with the corrections

  • RetroShare Icon

    RetroShare

    RetroShare is a cross-platform, secured and decentralized communication system. It lets you to securely chat, share photos, videos, and more with family and friends, using OpenPGP to authenticate peers and OpenSSL to encrypt all communication.

  • EMS - E-mail Spoofer

    E-mail Spoofer is a tool designed for penetration testers who need to send phishing e-mails. It allows to send mails to a single recipient or a list, it supports plain text/html email formats, attachments, templates and more... Update Version 1.1: =============== * Added text conversion to Homographs for bypassing spam filters. (based on http://www.exploit-db.com/wp-content/themes/exploit/docs/20114.pdf) * Added Reply-To header * Added Sender Name Field * Added Built in User Agent * Detailed error log If you find this tool useful crypto currency donations are welcome: Bitcoin: 1Kksc9b4WZ5X36xGDgpodPVpBSozMje6ui Litecoin: LQ1JCMxo122FpJ8iKX7HsrNtjCacpTkkFW

  • Mac CRM & Project Management app for small business Mac CRM & Project Management app for small business Icon
    Mac CRM & Project Management app for small business Icon

    Manage your leads, clients and projects – all in one place. Daylite keeps everyone on the same page.

    Stop using frustrating spreadsheets and expensive, clunky CRMs that waste more time than they save. Try Daylite, a better way to keep track of relationships and projects so your team can win more business & get more done.
    1/2
    Do you and everyone who will be using your CRM use Macs, iPhones & iPads?
    2/2
    One last question before you visit our site:

    How many people in your company will need to use your CRM?
  • Hive Mind LOIC Icon

    Hive Mind LOIC

    Hive Mind LOIC is a version of the Low Ordbit Ion Cannon made by Praetox, which was adapted for centralized control by NewEraCracker, when the project was then taken on by me. The amongst a few fixes I added RSS control (Such as via Twitter).

  • QPass password manager Icon

    QPass password manager

    QPass is easy to use, open source password manager application with built-in password generator. You can store in it's database such data as passwords and logins which will be encrypted using AES-256 with PBKDF2(number of iterations set by user). Each entry can include additional information about entry such as name, url adress and description.

  • Tyrant SQL Icon

    Tyrant SQL

    Tyrant SQL is a Havij based cross-platform. It's Sqlmap's gui version.

    It's a poweful Sql Injection Tool. It's a GUI version of SqlMap, saving time and getting better results. Was designed basing on Havij.

    Downloads: 39 This Week Last Update: See Project
  • Fast Wipe Icon

    Fast Wipe

    Fast Wipe

    - Fast Wipe: wipe files and/or free hd space FAST! - Fast wipe has also secure deletion! wipe&fwip now supports up to 12 different wipe standards. - It works from command line: windows and linux os available. - works from windows explorer "Send To" - Works on any mounted partition.

    Downloads: 35 This Week Last Update: See Project
  • CryptKeeper

    Encryption/Decryption Application

    Basic text file encryption & decryption. Can encrypt text files with or without formatting. CryptKeeper is the upgraded version of EnCREEPtor.

    Downloads: 12 This Week Last Update: See Project
  • HyenaeFE Icon

    HyenaeFE

    HyenaeFE is a QT based frontend for the Hyenae advanced network packet generator.

    Downloads: 11 This Week Last Update: See Project
  • SHODAN (SIVAS 2.0) Icon

    SHODAN (SIVAS 2.0)

    Shodan - Automatic search for sites vulnerable to SQL injection, XSS injection LFI and RFI! Developed by Theone Lucas.

    Downloads: 9 This Week Last Update: See Project
  • Dir2Encrypt Icon

    Dir2Encrypt

    Dir2Encrypt encrypt a folder with privat files and subfolders into a single password protected archive file. The archive file can be a zip file or a self extracting exe file. Microsoft Net Framwork 2 has to be installed.

  • Absolution Icon

    Absolution

    Computer forensics and e-Discovery investigation software.

    Absolution is an e-Discovery and computer forensics investigation tool that collects, analyzes and reports on digital evidence. The premise behind Absolution is to provide a single integrated system for exhaustive and robust examination of bulk data operated in the simplest way possible. In fact, Absolution should be usable by any reasonably tech savvy individual. Absolution also aims to provide an extensible platform usable by advanced investigators, researchers, auditors, law enforcement, litigators (eDiscovery), enthusiasts, and anyone else that needs to perform a comprehensive search of large amounts of data.

  • IT security resources  Icon

    IT security resources

    IT security resources for ethical hacking & penetration testing

    this collection of most used resources that will help you in ethical hacking and penetration testing. Collection of hacking tools and materials and all major type of attacks and tutorials.

  • Pkcs11Admin Icon

    Pkcs11Admin

    GUI tool for administration of PKCS#11 enabled devices

    This project provides stable releases of Pkcs11Admin project hosted on github. Please visit project website - www.pkcs11admin.net - for more information.

    Downloads: 5 This Week Last Update: See Project
  • Simple UPX Icon

    Simple UPX

    UPX with GUI, UPX, UPX GUI, UPX Unpacker, UPX Packer

    Simple UPX is a tiny application with Graphical User Interface for the popular UPX EXE Compressor/Decompressor. Windows Programs *.exe, *.dll, can be compressed. Simple UPX required .NET 3.5 or higher.

    Downloads: 5 This Week Last Update: See Project
  • AirDrive Icon

    AirDrive

    AirDrive is a file storage utility that uses the storage capacity of linked IMAP enabled email accounts for file storage with an FTP-like interface.

    Downloads: 4 This Week Last Update: See Project
  • Manual Virus Removal Tool Icon

    Manual Virus Removal Tool

    MVRT is a small utility to unhide all files and help in virus deletion

    Manual Virus Removal Tool 1.01-beta Platform: Windows ============ Information: ============ 1- This is NOT an Anti-Virus so don't assume it to be one. 2- If you don't know anything about file types specially (.exe/.bat/.vbs etc) then this application is useless for you. =========================== What this application does? =========================== You select a folder, click 'Unhide All' and MVRT unhides all the files and folders (even super hidden ones) inside the chosen folder. Then you can either go to that folder in the Windows Explorer and delete the .exe,.bat,.cmd,.vbs files or shortcuts you suspect to be viruses. Or you may choose the file in MVRT itself and click 'Delete File' to delete it. You can also check basic information about files like attributes and file size by choosing a file from tree and clicking "File Info". ==================================

    Downloads: 4 This Week Last Update: See Project
  • Arcanum Editor Icon

    Arcanum Editor

    The Arcanum Editor is a small but powerful tool to encrypt and decrypt messages. The program also comes with it's own format CTXT. This format is based on XML and allows you to save texts with the Advanced Encryption Standard.

    Downloads: 3 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you