Security & Utilities Software


    • More...
  • More...
    • More...
    • More...

Category Category

License License

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

User Interface User Interface

  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • Microsoft Office 365 monitoring simplified Microsoft Office 365 monitoring simplified Icon
    Microsoft Office 365 monitoring simplified Icon

    Monitor your Office 365® (O365) Exchange™ mailboxes and system applications with the SolarWinds® Server & Application Monitor unified platform.

    SolarWinds Server & Application Monitor allows you to monitor your hybrid IT applications and systems. Monitor Microsoft® Office 365 Exchange side by side on your on-premises Exchange server and other applications. Check, track, and report on O365 user/shared mailbox growth, users over quota, archived mailboxes, inactive mailboxes, mobile device, mailbox groups, and more. You can also monitor Microsoft portal access to help ensure you’re meeting your SLAs.
  • C++Builder: 1 codebase, 1 UI designer, 4 platforms. C++Builder: 1 codebase, 1 UI designer, 4 platforms. Icon
    C++Builder: 1 codebase, 1 UI designer, 4 platforms. Icon

    The best visual IDE for creating fast performance native apps across platforms. Start today a 30-Day trial (no credit card needed).

    Modern C++, standards-compliant with enhanced language extensions, beautiful native UI tools, and cross-compilation to Windows, macOS, iOS and Android. We provide the ‘full stack’ for native app development, from database to native and flexible UI to REST and more. If you want crossplatform C++ done right - choose the Complete App Platform for Multi-Device Native Development - Choose C++Builder.
  • VeraCrypt Icon


    Open source disk encryption with strong security for the Paranoid

    VeraCrypt is a free disk encryption software brought to you by IDRIX ( and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data. All released files are PGP signed with key ID=0x54DDD393, available on key servers and downloadable at VeraCrypt can mount TrueCrypt volumes. It also can convert them to VeraCrypt format. Documentation: FAQ :

  • RetroShare Icon


    RetroShare is a cross-platform, secured and decentralized communication system. It lets you to securely chat, share photos, videos, and more with family and friends, using OpenPGP to authenticate peers and OpenSSL to encrypt all communication.

  • Razorback Icon


    Project Razorback(tm). A framework for detection.

  • Network Grep

    ngrep strives to provide most of GNU grep's common features,applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular expressions to match against data payloads of packets. SUPPORT/REPORTING BUGS: please use Thank you!

  • extcv

    Expand a TrueCrypt volume on the fly without reformatting. All kind of volumes (container files, disks and partitions) formatted with the NTFS file system are supported.

  • Any Platform Anywhere: The Best Workflow Software Any Platform Anywhere: The Best Workflow Software Icon
    Any Platform Anywhere: The Best Workflow Software Icon

    Empower employees to improve their productivity with nocode process automation tools.

    Most people intuitively understand how workflows can streamline and speed up their business processes, integrate systems and route content to the right people. While every business has different needs, requirements and goals, workflow automation can help everyone. Whether you’re a company of 500 or 5,000, based in the cloud or on-premises, workflow automation can help maximize the efficiency of your business processes.
  • Mixmaster

    Mixmaster is an anonymous remailer. Remailers provide protection against traffic analysis and allow sending electronic mail anonymously or pseudonymously. Mixmaster consists of both client and server installations.

  • DomainKeys library and tools

    A general purpose set of tools, C library and CPAN modules to help DomainKeys developers. The goal is that these tools and library can be easily adopted by all MTAs, LDAs and possibly MUAs. This project is about conforming to the DomainKeys standard,

    Downloads: 40 This Week Last Update: See Project
  • MobileJustice Icon


    Antitheft software for WM5 and WM6 phones with GPS module(tested on Eten X500+ and Mio A701). Useful for searching of lost/stolen phones and children monitoring. Can monitor sim card changes. Coordinates of the phone can be acquired by SMS.

  • WiKID Strong Authentication System Icon

    WiKID Strong Authentication System

    Two-factor authentication system

    The WiKID Strong Authentication System is a public-key based two-factor authentication system. It is a flexible, extensible, and secure alternative to tokens, certs and passwords. Application & API support exists for Java, ASP, PHP, Ruby, OpenVPN, TACACS+, etc. Read our eGuide on how to setup your network with two-factor authentication:

  • domainkeys-milter

    dk-milter consists of two parts: A milter-based application (dk-filter) which plugs in to Sendmail to provide DomainKeys service, and a library (libdk) which can be used to build DomainKeys-compliant applications or MTAs. See the home page for details.

  • Identify and respond to threats before damage is done Identify and respond to threats before damage is done Icon
    Identify and respond to threats before damage is done Icon

    A SIEM that makes it easy to use logs for security, compliance, and troubleshooting.

    SolarWinds® Log & Event Manager (LEM) delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-use, and quick-to-deploy virtual appliance. LEM provides the visibility, security, and control that IT professionals need to alert on and respond to security threats, and assist in meeting the regulatory compliance guidelines of HIPAA, PCI DSS, SOX, and more. Try it free for 30 days!
  • DMZS-Biatchux Bootable CD Distro

    Bootable CD Forensics/Virus Scanning/Recovery/PenTesting platform

    Downloads: 9 This Week Last Update: See Project
  • libtnc

    OS independent implementation of the Trusted Network Connect (TNC) specification from Trusted Computing Group (TCG). Functions for loading and communicating with TNC plugins, sample IMC and IMV plugins, TNCCS-XML support on Windows, Linux, Mac, *BSD

    Downloads: 7 This Week Last Update: See Project
  • dkim-milter

    NOTE: dkim-milter has been replaced by OpenDKIM, available at dkim-milter consists of two parts: A milter-based application (dkim-filter) which plugs in to Sendmail to provide DomainKeys Identified Mail service, and a library (libdkim) which can be used to build DKIM-compliant applications or MTAs.

  • The Linux Admin CD

    Found at in the Projects area. The complete Linux Administrators CD. For normal system and network administration, security, forensics tools and utilities.

    Downloads: 3 This Week Last Update: See Project
  • MagNet

    Fully packaged linux distribution to provide internet access and resource management to small and medium companies.

    Downloads: 1 This Week Last Update: See Project
  • Automated Security Tools

    Automated Security Tools (autosec) aims to provide automatic tools which network administrators may use to help check and test the security of their network.

    Downloads: 0 This Week Last Update: See Project
  • BP-Sim Icon


    EFT simulator

    BP-Sim allows users to perform an extensive range of tests across the chain of payment services and thus identify potential causes of failures before launching payment systems into production. BP-Sim consists of following modules: BP-Source, BP-Host, BP-HSM and BP-SeeEMV. BP-Source and BP-Host are payment transaction simulators supporting formats as: APACS30, AS2805, many ISO8583 dialects, IFSF, SPDH, TCMP. Together with industry-standard cryptography, multi-platform support, configurable transaction load up to 2000 TPS. BP-Sim HSM module provides an adequate TCP/IP simulation of the Thales Hardware Security Mod. BP-SeeEMV simulates the steps involved in an EMV transaction that take place in the EMV terminal and the Issuer Server (when conducted online). Module can process a transaction one step at a time in step-by-step mode or to certain break-point.

    Downloads: 0 This Week Last Update: See Project
  • Blockpost

    Blockpost plugin for Agnitum Outpost Firewall. Every IP-packet from or to IP address in "Restricted Zone" list to be dropped/rejected. Good for p2p spyware blocking.

  • Cryptic Plus

    Derived from TrueCrypt 6.3 release, I added some command line options to "TrueCrypt Format.exe" to allow TrueCrypt volumes to be created without using the graphical user interface

  • CyaSSL

    The CyaSSL embedded SSL library (Now known as wolfSSL) is a lightweight, portable, C-language-based SSL/TLS library targeted at IoT, embedded, and RTOS environments primarily because of its size, speed, and feature set. It works seamlessly in desktop, enterprise, and cloud environments as well. wolfSSL supports industry standards up to the current TLS 1.2 and DTLS 1.2, is up to 20 times smaller than OpenSSL, offers a simple API, an OpenSSL compatibility layer, OCSP and CRL support, is backed by the robust wolfCrypt cryptography library, and much more. wolfSSL relies on the soon-to-be FIPS 140-2 validated wolfCrypt library for all cryptographic functionality. Visit for more info!

    Downloads: 0 This Week Last Update: See Project
  • ECDSA Signing interface

    A cross platform implementation of ECDSA (elliptic curve digital signature algorithm) interface to the aSuretee Token.

    Downloads: 0 This Week Last Update: See Project
  • Free Agents DIDS

    Free Agents DIDS is a distributed intrusion detection system that you place on each host on your network. Agents intercommunicate with aes encryption, automatically alert you, and secure your network for free!

  • Free Tiger

    Free fast implementation of tiger and the TTH algorithms

    Free Tiger aims to provide a fast C implementation of the tiger and TTH hash algorithms in order to provide a performing hasher. It also aims to provide pure implementations of tiger and when possible TTH in other languages for reference.

    Downloads: 0 This Week Last Update: See Project

    NOAHDB is a command line tool that parses the log files that are emitted by the Argos Honeypot and populates the tables of a MySQL database.

    Downloads: 0 This Week Last Update: See Project
  • Nautilus Secure Phone

    One of the first secure telephony programs. Not limited to VOIP but can also directly encrypt a telephone line by using modems. Calls are encrypted using Diffie-Hellmann key exchange and several symmetric ciphers. Download is possible from Germany only, see homepage

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you