Security & Utilities Software


    • More...
  • More...
    • More...
    • More...
    • More...

Category Category

    • More...
    • More...

License License

    • More...
  • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

    • More...
    • More...
  • More...

Database Environment Database Environment

    • More...

Freshness Freshness

Security & Utilities Software

  • Microsoft Office 365 monitoring simplified Microsoft Office 365 monitoring simplified Icon
    Microsoft Office 365 monitoring simplified Icon

    Monitor your Office 365® (O365) Exchange™ mailboxes and system applications with the SolarWinds® Server & Application Monitor unified platform.

    SolarWinds Server & Application Monitor allows you to monitor your hybrid IT applications and systems. Monitor Microsoft® Office 365 Exchange side by side on your on-premises Exchange server and other applications. Check, track, and report on O365 user/shared mailbox growth, users over quota, archived mailboxes, inactive mailboxes, mobile device, mailbox groups, and more. You can also monitor Microsoft portal access to help ensure you’re meeting your SLAs.
  • Identify and respond to threats before damage is done Identify and respond to threats before damage is done Icon
    Identify and respond to threats before damage is done Icon

    A SIEM that makes it easy to use logs for security, compliance, and troubleshooting.

    SolarWinds® Log & Event Manager (LEM) delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-use, and quick-to-deploy virtual appliance. LEM provides the visibility, security, and control that IT professionals need to alert on and respond to security threats, and assist in meeting the regulatory compliance guidelines of HIPAA, PCI DSS, SOX, and more. Try it free for 30 days!
  • JSch

    JSch is a pure Java implementation of SSH2. JSch allows you to connect to an sshd server and use port forwarding, X11 forwarding, file transfer, etc., and you can integrate its functionality into your own Java programs.

  • Rootkit Hunter

    Rootkit Hunter, security monitoring and analyzing tool for POSIX compliant systems.

  • JSignPdf Icon


    JSignPdf is an open source Java application which adds digital signatures to PDF documents. It also contains Add-On for

  • xca

    X Certificate and Key management is an interface for managing asymetric keys like RSA or DSA. It is intended as a small CA for creation and signing certificates. It uses the OpenSSL library for the cryptographic operations. Please see the XCA homepage

  • TrouSerS

    TrouSerS - An open-source TCG Software Stack implementation.

  • Take Our Survey. We Plant a Tree. Take Our Survey. We Plant a Tree. Icon
    Take Our Survey. We Plant a Tree. Icon

    In honor of Earth Day, HPCC Systems is committed to planting 10,000 new trees across our national forests.

    HPCC Systems is dedicated to the environment and is giving you the opportunity to take action and be a small part of a big impact. In partnership with the National Forest Foundation, HPCC Systems is growing and promoting awareness of environmental sustainability with their 10K Trees Challenge. The best time to plan a tree was 20 years ago. The second best time is now! Take our survey and take part in helping the environment.
  • AWStats Icon


    AWStats is a free powerful and featureful server logfile analyzer that shows you all your Web/Mail/FTP statistics including visits, unique visitors, pages, hits, rush hours, os, browsers, search engines, keywords, robots visits, broken links and more

  • Portecle Icon


    Portecle is a user friendly GUI application for creating, managing and examining key stores, keys, certificates, certificate requests, certificate revocation lists and more.

  • OpenCA Icon


    Open Source PKI solutions

    The OpenCA PKI Development Project is a collaborative effort to develop a robust, full-featured and Open Source out-of-the-box Certification Authority implementing the most used protocols with full-strength cryptography world-wide.

  • PWGen Icon


    Generator of cryptographically-strong passwords

    PWGen is a professional password generator capable of generating large amounts of cryptographically-secure passwords, pronounceable passwords, pattern-based passwords, and passphrases consisting of words from word lists. It uses a "random pool" technique based on strong cryptography to generate random data from indeterministic user inputs (keystrokes, mouse handling) and volatile system parameters. PWGen provides lots of options to customize passwords to the users' various needs. Additionally, it offers strong text encryption and the creation of random data files (e.g., key files).

  • pdfcrack

    pdfcrack is a command line, password recovery tool for PDF-files.

  • C++Builder: 1 codebase, 1 UI designer, 4 platforms. C++Builder: 1 codebase, 1 UI designer, 4 platforms. Icon
    C++Builder: 1 codebase, 1 UI designer, 4 platforms. Icon

    The best visual IDE for creating fast performance native apps across platforms. Start today a 30-Day trial (no credit card needed).

    Modern C++, standards-compliant with enhanced language extensions, beautiful native UI tools, and cross-compilation to Windows, macOS, iOS and Android. We provide the ‘full stack’ for native app development, from database to native and flexible UI to REST and more. If you want crossplatform C++ done right - choose the Complete App Platform for Multi-Device Native Development - Choose C++Builder.
  • Wapiti Icon


    Wapiti is a web-application vulnerability scanner

    Wapiti is a vulnerability scanner for web applications. It currently search vulnerabilities like XSS, SQL and XPath injections, file inclusions, command execution, XXE injections, CRLF injections... It use the Python programming language.

  • RetroShare Icon


    RetroShare is a cross-platform, secured and decentralized communication system. It lets you to securely chat, share photos, videos, and more with family and friends, using OpenPGP to authenticate peers and OpenSSL to encrypt all communication.

  • Network Security Toolkit (NST) Icon

    Network Security Toolkit (NST)

    A network security analysis and monitoring toolkit Linux distribution.

    Network Security Toolkit (NST) is a bootable ISO image (Live DVD/USB Flash Drive) based on Fedora 26 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available in the toolkit. An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, network monitoring, host geolocation, network analysis and configuration of many network and security applications found within the NST distribution. In the virtual world, NST can be used as a network security analysis, validation and monitoring tool on enterprise virtual servers hosting virtual machines.

  • Cracx Icon


    simple and light-weight archive password cracker

    Cracx allows you to crack archive passwords of any encryption using 7-zip, WinRAR or a custom command, via Brute Force or Dictionary attack. Note: You must NOT use this program with files you don't have the rights to extract/open/use them! Currently, the program requires a current version of either 7-zip or WinRAR to be installed, but you can also use it to bruteforce basically anything that is executably via command-line with custom parameters. On an i7 CPU, it runs approximately 30 combination tests per second. Feel free to make suggestions or contribute by implementing features and translating the tool into your native language!

  • EJBCA, JEE PKI Certificate Authority

    EJBCA is an enterprise class PKI Certificate Authority built on JEE technology. It is a robust, high performance, platform independent, flexible, and component based CA to be used standalone or integrated in other JEE applications.

  • Lazesoft Windows Key Finder Icon

    Lazesoft Windows Key Finder

    A free Windows and MS Office product key code finder and retriever.

    Lazesoft Windows Product finder is a free Windows and Microsoft Office product key code finder and retriever. It allows you to recover your CD product key for Windows or Microsoft Office for use when you are reinstalling or repairing your Windows and Microsoft Office setups. With it, you can recover your lost key for Windows 2000, XP, 2003, Vista, 2008, 7, 8, 8.1, 10 and all versions of Microsoft Office. What's new in the Version 1.7: Retrieve Windows 10 product key Retrieve Microsoft Office 2016 key Fixed bugs of decoding Microsoft Office 2013 key Supported Windows Versions: Windows 2000 SP4 Windows XP Windows Vista Windows 7 Windows 8 Windows 8.1 Windows 10 Windows Server 2003 Windows Server 2008 Windows Server 2008 R2 Windows Server 2012 Windows Server 2012 R2 Windows Server 2016 Supported Microsoft Office Versions: Microsoft Office 2000, 2003, 2007, 2010, 2013, 2016

  • jasypt: java simplified encryption

    Jasypt (Java Simplified Encryption) is a java library which allows the developer to add basic encryption capabilities to his/her projects with minimum effort, and without the need of having deep knowledge on how cryptography works.

  • BleachBit Icon


    deletes junk files to free disk space and improve privacy

    BleachBit frees disk space and maintains privacy. Cleans cache, Internet history, temporary files, logs, cookies, Firefox, Google Chrome, Flash, Windows, Linux, and more. Downloads are at and source code is at GitHub.

  • Autopsy

    Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.

  • Endian Firewall Community Icon

    Endian Firewall Community

    Endian Firewall Community (EFW) is a "turn-key" linux security distribution that makes your system a full featured security appliance with Unified Threat Management (UTM) functionalities. The software has been designed for the best usability: very easy to install, use and manage and still greatly flexible. The feature suite includes stateful packet inspection firewall, application-level proxies for various protocols (HTTP, FTP, POP3, SMTP) with antivirus support, virus and spam-filtering for email traffic (POP and SMTP), content filtering of Web traffic and a "hassle free" VPN solution (based on both OpenVPN and IPsec).

    Downloads: 1,665 This Week Last Update: See Project
  • AxCrypt - File Encryption for Windows Icon

    AxCrypt - File Encryption for Windows

    AxCrypt - Personal Privacy and Security with AES-256 File Encryption and Compression for Windows. Double-click to automatically decrypt and open documents.

  • DAR - Disk ARchive Icon

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing. DAR knows how to perform full, differential, incremental and decremental backups. It provides testing, diffing, merging, listing and of course data extracting from existing archives. Archive internal's catalog, allows very quick restoration of a even a single file from a very large, eventually sliced, compressed and encrypted archive. Dar saves *all* UNIX inode types, takes care of hard links, sparse files as well as Extended Attributes (MacOS X file forks, Linux ACL, SELinux tags, user attributes), it has support for ssh and is suitable for tapes and disks (floppy, CD, DVD, hard disks, ...) more details at:

  • EncFSMP Icon


    Mount EncFS folders - multiplatform style.

    EncFSMP can create, mount and edit EncFS (encrypted file system) folders on Windows and Mac OS X.



    Java SSH API

    This project now hosts the successor to the original J2SSH API; J2SSH Maverick. This new API was built from the ground up by the original author of J2SSH back in 2003 and has been maintained and available since then exclusively under a commercial license. This API is now available to the community under the LGPL open source license. The project continues to host both the original API and legacy applications created around it, however these are now considered deprecated and we do not recommend their use in anyway.

  • PacketFence

    A network access control (NAC) system featuring a captive-portal for registration and remediation, wired and wireless management, 802.1X support, isolation of devices, integration with IDS; it can be used to secure networks from small to large. Source code is hosted here: Issue tracker tracker is hosted here:

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you