Security & Utilities Software

OS OS

    • More...
  • More...

Category Category

License License

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...

User Interface User Interface

  • More...

Database Environment Database Environment

Security & Utilities Software

  • 2018 Thomson Reuters Top 100 Global Tech Leaders 2018 Thomson Reuters Top 100 Global Tech Leaders Icon
    2018 Thomson Reuters Top 100 Global Tech Leaders Icon

    See how tech-sector leadership is being redefined in today’s complex business environment.

    21st century technology-sector leadership requires not only optimal financial performance but also attention to many other factors, including management and investor confidence, risk and resilience, legal compliance, innovation, environmental impact, social responsibility, and reputation. Successfully managing these areas may determine which tech companies have the fortitude to succeed in the future. Here’s to those that made the list.
    Who are today’s top global tech leaders?
    Read the report
  • WhatsUp® Gold - Start A Free 30-Day Trial WhatsUp® Gold - Start A Free 30-Day Trial Icon
    WhatsUp® Gold - Start A Free 30-Day Trial Icon

    All-in-one monitoring of your entire infrastructure with the industry's most user friendly pricing. Free trial of our award-winning software

    If you are like the rest of our user community, your IT team is busy. With pressure to deliver on-time projects, you don’t have a lot of time to spend making your management tools work. You need network monitoring tools that work for you. You want tools that makes it easy to find performance issues before your users do and resolve them before they impact the business. That’s why tens of thousands of customers around the world love WhatsUp Gold.
    1/2
    How many devices do you monitor on your company's network?
    2/2
    One last question before you visit our site:

    When do you plan to purchase a network performance monitoring solution?
  • OWASP Mantra - Security Framework Icon

    OWASP Mantra - Security Framework

    Free and Open Source Browser based Security Framework

    OWASP Mantra - Free and Open Source Browser based Security Framework, is a collection of free and open source tools integrated into a web browser, which can become handy for penetration testers, web application developers, security professionals etc.

  • DENRIT Icon

    DENRIT

    Perform anonymous and non-anonymous pentesting.

    DENRIT allows remote administration of anonymous networks (TOR, I2P and FreeNet). Also, contains a pentesting module to execute commands using a selected anonymous network, pentesting with TOR or TCP Follows a client/server model with well-defined communication interfaces. SSH is used to allow remote clients to access the machine and manage any anonymous network that is installed there, plus allows penetration testing anonymously (or non-anonymously) using tools such as Metasploit Framework, nmap, nikto, among others. The list of supported applications will grow as the project progresses. Until now, this project is under development and is very unstable (and some features aren't included). But I've been developing constantly and I think that soon this software will become stable and very useful to pentesters, hackers and researchers (I hope so!) Well, you can see the wiki page and the presentation exposed in the download section if you want more information about this project.

  • Arcanum Editor Icon

    Arcanum Editor

    The Arcanum Editor is a small but powerful tool to encrypt and decrypt messages. The program also comes with it's own format CTXT. This format is based on XML and allows you to save texts with the Advanced Encryption Standard.

    Downloads: 11 This Week Last Update: See Project
  • Process Manager Icon

    Process Manager

    A Simple Process Manager for Windows.

    A simple C# Program created for managing processes currently running on your PC.

    Downloads: 1 This Week Last Update: See Project
  • Ada Cryptographic Objects

    Ada Cryptographic Objects (ACO) is an Ada library of cryptographic algorithms and related services.

    Downloads: 0 This Week Last Update: See Project
  • Communicate & Connect with Ring Central's VoIP Solution Communicate & Connect with Ring Central's VoIP Solution Icon
    Communicate & Connect with Ring Central's VoIP Solution Icon

    Cloud Powered Business Phone System

    • Unrivaled value & reliability in one solution
    • Unlimited Calls/SMS/Conferencing/Fax
    • Trusted by 350,000+ Businesses
  • Adytum PHP CA Suite

    PHP-driven CA for small enterprises

    Adytum is a certificate authority suite, powered by OpenSSL, specifically designed for internal use small enterprises which need a secure and robust PHP solution without the rich feature set of software aimed at large retail CAs.

    Downloads: 0 This Week Last Update: See Project
  • Black scalpel

    Black scalpel is an advanced graphical (Swing gui) security and analysis tool written in Java, C and Assembler (platform independent). Current stage is early alpha, many features are still missing. Use SVN!

    Downloads: 0 This Week Last Update: See Project
  • BluVAULT

    BluVAULT mobile and desktop apps.

    This is the mobile and desktop app repo for the BluVAULT secure cloud storage service.

    Downloads: 0 This Week Last Update: See Project
  • BrainStorm Encrypter

    Tool for encrypting files using blowfish, aes, des or cast5, File hashing with md5, sha and ripemd160, compresssion with gzip, and a nice user interface. Created using C++ with Qt framework, depends on QCA third-part Qt Library and OpenSSL.

    Downloads: 0 This Week Last Update: See Project
  • CEHALET

    CEHALET (Common Ethical Hacker's Toolkit) is a collection of open source tools used for ethical hacking or pen-test.

    Downloads: 0 This Week Last Update: See Project
  • Crybt Icon

    Crybt

    Crybt is a Data-Encryption-Tool. You can use it easily for Dropbox.

    Crybt is based on the Rijandael algorithm (AES). You can use it to encrypt your sensitive files direct into your Dropbox. But you can also use it for normal file-encryption. Crybt works with a new algorithm built by me ,that allowes you to save your password almost uncrackable.

    Downloads: 0 This Week Last Update: See Project
  • Effacor

    Effacor is a tool providing for secure file deletion.

    Effacor provides a drag-and-drop interface for the secure deletion of files from Hard Drives, and from Solid State Drives as well. Currently secure deletion is achieved using the Gutmann algorithm - although more methods are scheduled to be added in the near future. TO USE: Simply drag-and-drop the files you wish to delete into the window, or use the "Add File to Task List" option from the FILE menu. Once all of the files you wish to delete securely have been added to the list hit "GO!", and each of the selected files will be deleted in turn.

    Downloads: 0 This Week Last Update: See Project
  • Encryptor

    Simple VB.Net Encryption software.

    Downloads: 0 This Week Last Update: See Project
  • Fidelity Platform Icon

    Fidelity Platform

    Realtime distributed data sync engine platform

    Fidelity Platform is Distributed Hierarchical Object Orientated Realtime NoSQL Engine (DHOORE) This framework useful for development crosspaltform hi loaded distributed automation systems with data replication and synchronisation in real time mode. With Fidelity Platform can create any monitoring and controll applicaitions, servers with redundancy, proxy servers, clients and other data agregation agents. Agregation agents gives the connectivity with many known protocols: JSON, SOAP, XML, RPC, OPC, NMEA, SNMP, MODBUS, SMTP, SMPP and other. Server logic module can execute scripts on JavaScript, Python and Lua languages. This option can be useful for define server logic. Fidelity Platform gives the power for developer abilities for creation automation, OSS/BSS, billing, data migration and other servises. Fidelity Platform is written in clear C++. Fidelity Platform gives several variants of user interface: Qt, RIA (JavaScript), Java (experimintal).

    Downloads: 0 This Week Last Update: See Project
  • GNSA Icon

    GNSA

    Graphical Network Security Advisor : Your way to secure your network.

    Gnsa is an application created with C++ including WinPcap and QT libraries, works in widows, it allows you to test your network security against some known attacks.

    Downloads: 0 This Week Last Update: See Project
  • KCA

    KCA KDE Certificate Authority Manager

    Downloads: 0 This Week Last Update: See Project
  • Kryptograph

    Der Kryptograph (Python 2.7.3)

    Because of my diplom thesis now, i wont update my little project very often :(

    Downloads: 0 This Week Last Update: See Project
  • MD5Analyser Icon

    MD5Analyser

    MD5Analyser is an open source java program to create and verify MD5 checksums.

    Downloads: 0 This Week Last Update: See Project
  • OptiAuth

    A authentication system for iOS, Mac OSX and Windows.

    OptiAuth is an authentication system made for iOS, Mac OSX and Windows. The Windows version is still being developed on and it's the same with the Mac OSX and iOS version.

    Downloads: 0 This Week Last Update: See Project
  • PassHashie

    A password hasher for Internet Explorer, based on and compatible with Wijjo Password-Hasher for FireFox (http://wijjo.com/PasswordHasher)

    Downloads: 0 This Week Last Update: See Project
  • Row Level Security for MS SQL 2005/2008

    Set of .NET libraries to support implementation of row level security in MS SQL Server 2005/2008, as described in this MS whitepaper: http://www.microsoft.com/technet/prodtechnol/sql/2005/multisec.mspx

    Downloads: 0 This Week Last Update: See Project
  • SpyHook

    User-friendly Windows keylogger/backdoor with custom builder

    Supports logging all keystrokes, mouse clicks, screenshots, emailing/ftp, encryption, and more to arrive... For legitimate use only.

  • The CryptoCloak Project

    The CryptoCloak project

    The CryptoCloak project uses cryptographic algorithms for key exchange and encryption that have been selected by the cryptographic community as solid and secure algorithms BUT it is doing the encryption in a clandestine manner. In the light of the latest Internet spying scandals, the goal of the project is to diminish the success of the automatic traffic analyzing engines of anyone who has the access to the chat servers. Those analyzing engines will notice just a cheap chat conversations, while the real encrypted information will be incorporated deeply in that cheap chat. The cheap chat is the cloak to the encrypted information communicated between two CryptoCloak clients. The first realization of the CryptoCloak uses the Skype API for Java programming language. The intermediate goals of the project are to produce wrappers for the most popular chat clients as well as clients for the most popular web browsers.

    Downloads: 0 This Week Last Update: See Project
  • Toolbar Uninstaller

    An uninstaller / detector foor Browser Toolbars for Internet Explorer and FireFox

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you