OSI-Approved Open Source (98)
- GNU General Public License version 2.0 (57)
- BSD License (18)
- GNU General Public License version 3.0 (8)
- GNU Library or Lesser General Public License version 2.0 (7)
- MIT License (6)
- Artistic License (4)
- Apache License V2.0 (3)
- Academic Free License (2)
- Apache Software License (2)
- Common Development and Distribution License (2)
- Historical Permission Notice and Disclaimer (2)
- NASA Open Source Agreement (2)
- Adaptive Public License (1)
- Common Public License 1.0 (1)
- Computer Associates Trusted Open Source License 1.1 (1)
- Public Domain (9)
- Other License (4)
- Creative Commons Attribution License (3)
- Linux (94)
Grouping and Descriptive Categories (85)
- All POSIX (46)
- All 32-bit MS Windows (29)
- 32-bit MS Windows (14)
- All BSD Platforms (11)
- 64-bit MS Windows (10)
- OS Portable (10)
- OS Independent (9)
- 32-bit MS Windows (6)
- Project is an Operating System Kernel (6)
- Project is OS Distribution-Specific (3)
- Project is an Operating System Distribution (2)
- Classic 8-bit Operating Systems (1)
- Windows (76)
- BSD (47)
- Mac (46)
- Modern (45)
- Android (24)
- Other Operating Systems (20)
- Emulation and API Compatibility (11)
- Programming Language: Assembly ×
SNET (Several Network Explore Tool) allows you to safely browse, discover and exploit vulnerabilities in your network, replicating the kinds of access an intruder can achieve, and proving actual paths of attacks that must be eliminated.2 weekly downloads
Open source disk encryption with strong security for the Paranoid3,375 weekly downloads
Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and actions more accessible, local banlist for forbidden addresses, private identity isolation, a point-and-click process interceptor that can redirect connections from programs that don't support proxies, also giving them fake information about the local system and support for .onion addresses. Also, it can estimate AS paths for all circuits and prevent AS path intersections, it can restrict circuits to be built using only nodes from different countries, can change circuit lengths and more.2,747 weekly downloads
This projects provides tools to analyze any file and graphically display the data in several ways to recognize differences in the entropy distributed in the file. It also provides a script collection for data displaying.
A 448-bit Edwards curve
Innovative prototype of network applications such as TCP fuzzers that can be used for many purposes such as network and application security assessments and more. Adapt it freely to fit your needs or to simply understand how TCP works in .NET.1 weekly downloads
This library contains functions to calculate hash values and checkdigits like Adler, MD5 and much more. Over 30 different hash codes, checkdigits and barcodes will be supported.
A security oriented operating system, called WARBIRD(under development).
Security System Integrated (SSI) is a open source program for differents operative systems (principally Linux and Darwin systems). This program thought to provide the system administrator of a high control of your system security.
Low-cost, ISO 14443 compliant emulator for contactless smartcards1 weekly downloads
The Felix can propagate accross a network without the knowledge of the users and randomly run a program, which can be incorparated. It's ideal for keeping programs running that advanced users would remove and can even optionally play Bach's famous two1 weekly downloads
An application-level intrusion prevention system. Prevents buffer overflows, integer overflows, format string vulnerabilities, and the like. Designed for 32-bit and 64-bit ELF (Linux and *BSD) executables.
Simple and easy to use password generator.
Classic & Modern Cryptography tools1 weekly downloads
Secure Striker Manager1 weekly downloads
Do AES by GPU
The Nexus Operating System is a planned, realtime multimedia operating system compliant with POSIX standards. Nexus is intended not to become the next fad; it is the OS all developers can develop for without losing market standing in other OS's.
Security Depot is a central place for computer security tools and documentation for every OS and platform. Defense, attack, and auditing tools for and against all OSes have been collected into one repository.
Cryptofon - a safe phone with integrated encryption.
BitVisor is a tiny hypervisor initially designed for mediating I/O access from a single guest OS. Its implementation is mature enough to run Windows and Linux, and can be used as a generic platform for various research and development projects.13 weekly downloads
Wireless DCC, Digital Command Control for model railroad over 802.15.4 the network nodes being the handhelds and the DCC decoders themself. Backward compatibility with DCC will be kept but new users wont need command stations and boosters.
This is the worlds first and probably only FLOSS project aimed to create a lowbudget, based on availble technology, cruise missile. No this is not a Joke, its for real. Why? Since no one has tried to do this before and certainly not under the GPL.
Secure common Internet applications against exploits, virus, trojans, hacks.
The purpose of this project is to provide a biometric security solution by using voice print, fingerprint and/or facial recognition along with a password and/or smart card support using AES to protect data. Please read forums for if interested.
Note: I haven't even looked at this project for years. I was a pretty bad programmer back then, so the code is sloppy. The next version will be better. Similar to a stream cipher, but rather than performing an exclusive OR on the input bytes and cipher, it performs a mixture of 'rolling' (see x86 instruction ROR) and bit NOT operations according to the key.7 weekly downloads