Security & Utilities Software

OS OS

    • More...
  • More...
    • More...
    • More...

Category Category

License License

Translations Translations

Programming Language Programming Language

  • More...

Status Status

Audience Audience

User Interface User Interface

  • More...

Freshness Freshness

Security & Utilities Software

  • Get the Edge; Toad Edge Get the Edge; Toad Edge Icon
    Get the Edge; Toad Edge Icon

    Your next-gen toolset for MySQL database environments

    If your organization takes advantage of the cost-effective, flexible MySQL open source database platform, then you need a toolset that supports your commitment to open source relational databases.  Toad Edge for MySQL has what you need and helps you ramp up on MySQL quickly, ensuring faster time to value.
  • Identify and respond to threats before damage is done Identify and respond to threats before damage is done Icon
    Identify and respond to threats before damage is done Icon

    A SIEM that makes it easy to use logs for security, compliance, and troubleshooting.

    SolarWinds® Log & Event Manager (LEM) delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-use, and quick-to-deploy virtual appliance. LEM provides the visibility, security, and control that IT professionals need to alert on and respond to security threats, and assist in meeting the regulatory compliance guidelines of HIPAA, PCI DSS, SOX, and more. Try it free for 30 days!
  • Logsurfer

    Logsurfer is a program for monitoring system logs in real-time, and reporting on the occurrence of events. It is capable of grouping information together to enhance loganalysis and create automatic reports.

  • domainkeys-milter

    dk-milter consists of two parts: A milter-based application (dk-filter) which plugs in to Sendmail to provide DomainKeys service, and a library (libdk) which can be used to build DomainKeys-compliant applications or MTAs. See the home page for details.

  • logcheck

    Logcheck is software package that is designed to automatically run and check system log files for security violations and unusual activity. Logcheck utilizes a program called logtail that remembers the last position it read from in a log file.

  • yaSSL

    yaSSL, or yet another SSL, is an embedded ssl library for programmers building security functionality into their applications and devices. yaSSL is highly portable, and runs on standard as well as embedded platforms(QNX, ThreadX, VxWorks, Tron) yaSSL is still available but no longer being developed. Current development on the same project continues under wolfSSL. Visit yaSSL Home above for the latest stable release.

  • psyBNC

    psyBNC is an easy-to-use, multi-user, permanent IRC-Bouncer with many features. Some of its features include symmetric ciphering of talk and connections (Blowfish and IDEA) It compiles on Linux, FreeBSD, SunOs and Solaris.

    Downloads: 6 This Week Last Update: See Project
  • SolarWinds is #1 in network monitoring. SolarWinds is #1 in network monitoring. Icon
    SolarWinds is #1 in network monitoring. Icon

    Reduce network outages and improve performance with advanced network monitoring software.

    SolarWinds® Network Performance Monitor (NPM) is the ONLY monitoring solution with NetPath™ for hop-by-hop visibility into your critical paths, on-premises and into the cloud. NPM also features PerfStack™, helping you accelerate identification of root cause by dragging-and-dropping network performance metrics on a common timeline for immediate visual correlation across all of your network data. See why we're the leader. Try it free for 30 days!
  • FTimes

    FTimes is a system baselining and evidence collection tool. The primary purpose of ftimes is to gather and/or develop topographical information and attributes about specified directories and files in a manner conducive to intrusion and forensic analysis.

  • ClamSAP

    ClamSAP exists of two 'C' shared libraries which link between ClamAV and the Virus Scan Interface (VSI) of SAP (offical name: NW-VSI). A SAP application can use the ClamAV engine to scan for malicious uploads in HTTP uploads for example.

    Downloads: 5 This Week Last Update: See Project
  • DS NT Authentication Plugin

    ns-slapd plugin to perform pass-through authentication of LDAP users to NT domain controllers (based on the ntUserDomainID attribute).

    Downloads: 0 This Week Last Update: See Project
  • Ocotillo PRNG

    Ocotillo Pseudo-Random Number Generator -- a cryptographically secure PRNG for Unix platforms that do not have a /dev/urandom.

    Downloads: 0 This Week Last Update: See Project
  • Operation Project X

    The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.

    Downloads: 0 This Week Last Update: See Project
  • 2018 Network Intelligence Planning Guide 2018 Network Intelligence Planning Guide Icon
    2018 Network Intelligence Planning Guide Icon

    Get insights on net neutrality, cloud readiness, security and WAN transformation.

    Networking is becoming cloudier, hybrid and more Internet-centric. IT managers now own user experience, whether they own the networks or not. Get our latest ebook to learn how network intelligence will help you adapt to a quickly changing Internet-centric environment.
    Are you involved with your company's network performance/operations team?
    Get Ebook
  • Sophie

    Sophie is a daemon which allows the use of the 'libsavi' library from the Sophos anti virus vendor ( www.sophos.com ).

    Downloads: 0 This Week Last Update: See Project
  • cryptme

    A command line tool to create secure encrypted file using private key. You must provide key string to convert you source file into ecrypted one.

    Downloads: 0 This Week Last Update: See Project
  • phalanx # parallel hash alternative Icon

    phalanx # parallel hash alternative

    parallel hash alternative message digest

    phalanx - parallel hash alternative (PHA) is an initiative to provide a fast and portable, parallel/multithreaded message digest utility and library.

    Downloads: 0 This Week Last Update: See Project
  • rEdEyEs

    Combined coded remote-administrative service with SSL secure port scan, anonymous routing and third-party plugin inbuilt for quick and automatic "scan and install" process. Easy to use and will work under firewalls and up to 1024 bit strong cipher

    Downloads: 0 This Week Last Update: See Project
  • sudosh

    sudosh is a sudo shell, filter and can be used as a login shell. Sudosh records all keystrokes and output and can play back the session as just like a VCR.

  • Previous
  • You're on page 1
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you