Security & Utilities Software

OS OS

  • More...

Category Category

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...

User Interface User Interface

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • Trial SolarWinds Backup and you could receive a free Amazon Echo Dot Trial SolarWinds Backup and you could receive a free Amazon Echo Dot Icon
    SolarWinds Backup provides lightning-quick recovery that can restore business continuity after a disaster. For a limited time only, when you try SolarWinds Backup and store at least 100GB of selected data, you have the chance to receive a free Amazon Echo Dot.
  • Pyramid - The Complete Self-Service Analytics Platform Pyramid - The Complete Self-Service Analytics Platform Icon
    Pyramid - The Complete Self-Service Analytics Platform Icon

    Easily combine data from multiple sources to build dashboards and reports with our scalable solution built for mid-size to enterprise companies.

    Pyramid combines analytic tools often found in separate applications. It features a graphically based ETL to model data and incorporate machine learning algorithms, intuitive data discovery tools that produce simple and advanced visualizations, a presentation builder for creating analytic applications and presentations, and an enterprise-grade report builder—all in a single, integrated platform that can be accessed from any browser or device.
  • KeePass Icon

    KeePass

    A lightweight and easy-to-use password manager

    KeePass Password Safe is a free, open source, lightweight, and easy-to-use password manager for Windows, Linux and Mac OS X, with ports for Android, iPhone/iPad and other mobile devices. With so many passwords to remember and the need to vary passwords to protect your valuable data, it’s nice to have KeePass to manage your passwords in a secure way. KeePass puts all your passwords in a highly encrypted database and locks them with one master key or a key file. As a result, you only have to remember one single master password or select the key file to unlock the whole database. And the databases are encrypted using the best and most secure encryption algorithms currently known, AES and Twofish. See our features page for details.

  • WinSCP Icon

    WinSCP

    Free FTP and SFTP client for Windows

    WinSCP is a free SFTP and FTP client for Windows, and a multi-functional tool that improves your productivity. WinSCP copies files between and remote computers using multiple protocols: FTP, FTPS, SCP, SFTP, or WebDAV. And WinSCP offers an intuitive interface. You can also automate WinSCP functionality using .NET assembly or simple batch file scripting. Use WinSCP for common operations with files and edit files directly from WinSCP using WinSCP internal text editor, or by integrating with an external text editor. WinSCP operations are not limited to individual files; WinSCP offers several ways to synchronize your remote and local directories. After connecting to a site, store site information for easy access. WinSCP integrates with Pageant (PuTTY authentication agent) for full support of public key authentication with SSH. Admins love WinSCP support for portable operation using a configuration file instead of registry entries, suitable for operation from removable media.

  • ClamWin Icon

    ClamWin

    Antivirus software with virus scanning and virus definition updates

    Looking for free Open Source Antivirus for Windows? Download ClamWin Free Antivirus and get free virus scanning and free virus definition updates. Free Antivirus software for Windows, using the well-respected ClamAV scanning engine. Includes virus scanner, scheduler, virus database updates, context menu integration to MS Windows Explorer and Add-in to MS Outlook. Also features easy setup program.

  • AxCrypt - File Encryption for Windows Icon

    AxCrypt - File Encryption for Windows

    AxCrypt - Personal Privacy and Security with AES-256 File Encryption and Compression for Windows. Double-click to automatically decrypt and open documents.

  • FileVerifier++ Icon

    FileVerifier++

    FileVerifier++ is a Windows utility for calculating hashes using a number of algorithms including CRC32, MD5, SHA-1, SHA-256/224/384/512, WHIRLPOOL, and RIPEMD-128/160/256/320. Supported hash file formats include MD5SUM .MD5, SFV, BSD CKSUM, and others.

  • Locate Sensitive Data across Networks and Workstations Locate Sensitive Data across Networks and Workstations Icon
    Locate Sensitive Data across Networks and Workstations Icon

    Build the Business Case for Effective Security Investments

    Your customers recognize the importance of security, but often don’t realize the urgency until they see something tangible. SolarWinds Risk Intelligence assigns value to your data vulnerability, helping you build a strong business case for data protection and triage the most important problems to tackle. Some powerful features include data risk communicated as financial impact, at-risk data discovery and PCI DSS, PAN & PII scans.
  • mdd

    MDD is a physical memory acquisition tool for imaging Windows based computers created by the innovative minds at ManTech International Corporation. MDD is capable of acquiring memory images from Win2000, XP, Vista and Windows Server.

  • Base64 Encoder/Decoder

    Summary goes here.

    Base64 Encoder/Decoder is a tool that allows you to encode/decode in base64. Commonly template designers and authors will encode their copyright footer in to their work to help prevent people from finding and removing it. With this tool you can use it to modify the base64 encoded text. This tool can also create an MD5 hash of ASCII text.

    Downloads: 151 This Week Last Update: See Project
  • eEye Retina Community  Icon

    eEye Retina Community

    Powered by the same engine as the world famous Retina Network Scanner

    Powered by the same engine as the Retina Network Security Scanner, Retina Community is a completely free security scanner for up to 128 IPs. Use it to scan servers, desktops - any networked device - for security flaws, and learn how to fix them. New: Now, you can scan virtual applications, deployed via VMware ThinApp, for flaws as well. This is a new industry development, completely unique to eEye.

  • Snare Lite (SIEM & Logging Software) Icon

    Snare Lite (SIEM & Logging Software)

    Snare Enterprise: http://bit.ly/premium_snare

    ATTENTION: Snare Lite is unsupported legacy software. While it will remain a part of the SourceForge community, it is no longer secure and compliant. For up to date Snare software check out Snare Enterprise. https://www.intersectalliance.com/why-snare-enterprise/ Snare Enterprise was created to keep up with the fast paced security software market. It started with the desire to create premium logging and SIEM tools that were agnostic by nature so they could be used to boost any SIEM architecture regardless of third party developers. In fact, the agnostic nature allows it to bridge gaps between multiple SIEM implementations across business units. For more on use cases, check out the Intersect Alliance website. https://www.intersectalliance.com/ Snare Enterprise’s premium features include: - Regulatory Compliance - TLS Encryption - Log Simulcasting - TCP – Guaranteed Log Delivery - USB Device Monitoring - And more! For updates follow us on social media!

    Downloads: 37 This Week Last Update: See Project
  • SetACL: Windows ACL management

    SetACL: manage permissions (ACLs) on Windows systems from the command line or your programs/scripts. Supports all options available in Explorer, and more.

  • SolarWinds is #1 in network monitoring. SolarWinds is #1 in network monitoring. Icon
    SolarWinds is #1 in network monitoring. Icon

    Reduce network outages and improve performance with advanced network monitoring software.

    SolarWinds® Network Performance Monitor (NPM) is the ONLY monitoring solution with NetPath™ for hop-by-hop visibility into your critical paths, on-premises and into the cloud. NPM also features PerfStack™, helping you accelerate identification of root cause by dragging-and-dropping network performance metrics on a common timeline for immediate visual correlation across all of your network data. See why we're the leader. Try it free for 30 days!
  • MyHook

    MyHook is a low resource, fast, reliable, key logger, with open source code. After 7 years and 30,000 downloads, we have decided to move this project to GitHub. Please visit us here: https://github.com/danamodio/myhook

  • RunAsAdmin Explorer Shim

    RunAsAdmin Explorer Shim is a tool that lets administrators to keep and easily use their administrative rights but still enjoy safety of using least privileged accounts.

    Downloads: 4 This Week Last Update: See Project
  • SpillGuard

    SpillGuard is a Data Loss/Leak Prevention (DLP) plugin for Microsoft Office designed to help prevent the opening, saving or printing of Microsoft Office files containing classification markings higher than the classification of the user's computer.

  • Applications of Linear Algebra

    Matlab, Maple and C/C++ applications of Linear Algebra in many domains, including curves in many dimensions, Cryptography and Chaos etc.

    Downloads: 0 This Week Last Update: See Project
  • Clipboard Clearer Icon

    Clipboard Clearer

    Helps in removing sensitive or other data from the clipboard.

    Clipboard Clearer helps in removing sensitive or other data from the clipboard. It creates an icon in the system tray for easy access.

    Downloads: 0 This Week Last Update: See Project
  • Computer antitheft B

    Recovery of lost or stolen computer

    Install antitheftB on your computer(s) and upload file monitoring_center.php to your web site. AnitheftB will regularly report computer location to your web site. In case computer is lost or stolen you will keep track of its location on web site so it can be recovered. If you install it on many computers you must enter different username on every installation. That will let you monitor all computers from one monitoring center.

    Downloads: 0 This Week Last Update: See Project
  • Cryptic Plus

    Derived from TrueCrypt 6.3 release, I added some command line options to "TrueCrypt Format.exe" to allow TrueCrypt volumes to be created without using the graphical user interface

  • Elepheye

    Another simple integrity checker for the Windows filesystem, registry and WMI.

    Downloads: 0 This Week Last Update: See Project
  • Evidence Removal

    Evidence Removal completely cleans your history, ensuring your computer and Internet use cannot be discovered by anyone ever.

    Downloads: 0 This Week Last Update: See Project
  • Privacy Suite

    Complete Privacy Suite. Deletes all Junks, Browser history, Manage passwords, Crypt Disk, Anonymous surfing, etc.

    Downloads: 0 This Week Last Update: See Project
  • Downloads: 0 This Week Last Update: See Project
  • Secret

    This project aims at building an application that allows storing files and folders in an archive file encrypted using SHA-1 and Skipjack. Supports hierarchical ordering of entries, with specific or inherited keys at each node.

    Downloads: 0 This Week Last Update: See Project
  • Security Center

    This toolkit has complete security Package start from Tweak manager , Updater , Virus scanner ,Proxy server and many more This will be help full for user from corporate to small user we have already started working on it will completed with 2 months

    Downloads: 0 This Week Last Update: See Project
  • Steganifyer

    it is about a GUI (Graphical User Interface ) program based on Qt4 library ,that hides data on a picture using differents method depending on picture format (BMP,JPG,PNG,...) (this is called Steganography) the data can be on any file format

    Downloads: 0 This Week Last Update: See Project
  • Tunnelizer

    Tunnelizer is an application suite that allows you to tunnel TCP and UDP traffic through a firewall or proxy server. Communication between the tunnel ends can be either direct or through a SOCKS or HTTP proxy server, and can be optionally encrypted.

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you