Security & Utilities Software

OS OS

    • More...
  • More...

Category Category

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...

User Interface User Interface

  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • Pyramid - The Complete Self-Service Analytics Platform Pyramid - The Complete Self-Service Analytics Platform Icon
    Pyramid - The Complete Self-Service Analytics Platform Icon

    Easily combine data from multiple sources to build dashboards and reports with our scalable solution built for mid-size to enterprise companies.

    Pyramid combines analytic tools often found in separate applications. It features a graphically based ETL to model data and incorporate machine learning algorithms, intuitive data discovery tools that produce simple and advanced visualizations, a presentation builder for creating analytic applications and presentations, and an enterprise-grade report builder—all in a single, integrated platform that can be accessed from any browser or device.
  • Discover server and application network dependencies Discover server and application network dependencies Icon
    Discover server and application network dependencies Icon

    Discover and troubleshoot application dependencies to determine if it’s an application or network problem with SolarWinds Server & Application Monitor

    Server & Application Monitor helps you discover application dependencies to help identify relationships between application servers. Drill into those connections to view the associated network performance such as latency and packet loss, and application process resource utilization metrics such as CPU and memory usage. Determine if process utilization or network performance is affecting the application and end-user performance.
  • winPenPack Icon

    winPenPack

    The portable software collection

    winPenPack is a project that aims at collecting the most frequently used and most popular open source applications made portable, so that they can be executed without installation from any USB Flash Drive or Hard Disk. The winPenPack suites offer a wide range of portable applications like office tools, internet tools, multimedia tools, development tools, security applications and other frequently used utilities. Everything you need, completely free, open source and portable!

  • Clam Sentinel

    Clam sentinel is a program that detects file system changes and automatically scans the files added or modified using ClamWin. Require the installation of ClamWin. For Microsoft Windows 98/98SE/Me/2000/XP/Vista, Windows 7 and Windows 8.1.

  • Enchanted Keyfinder Icon

    Enchanted Keyfinder

    NOTE PROJECT MIGRATED TO GITHUB - https://github.com/samrocketman/ekeyfinder is a Magical Jelly Bean Keyfinder fork. It is a utility that retrieves the product key used to install Windows from your registry or from an unbootable Windows installation. It works on Windows 9X, ME, NT/2K/XP, and Vista/Win7 and for other software.

  • KeyNote NF (New Features) Icon

    KeyNote NF (New Features)

    Tabbed notebook with RichText editor, multi-level notes and strong encryption. Added new features to Marek's KeyNote: checkboxes on children of selected nodes, hidden nodes, alarms on nodes.

  • Asterix Password Viewer Icon

    Asterix Password Viewer

    Show Asterix Password

    It Shows Asterix Password Like Outlook For Windows Compiled and Tested On Windows 7. Tested on Windows 10 It works only desktop applications, not web pages. Note: Program compressed with exe packer program.

  • Identify and respond to threats before damage is done Identify and respond to threats before damage is done Icon
    Identify and respond to threats before damage is done Icon

    A SIEM that makes it easy to use logs for security, compliance, and troubleshooting.

    SolarWinds® Log & Event Manager (LEM) delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-use, and quick-to-deploy virtual appliance. LEM provides the visibility, security, and control that IT professionals need to alert on and respond to security threats, and assist in meeting the regulatory compliance guidelines of HIPAA, PCI DSS, SOX, and more. Try it free for 30 days!
  • Malzilla

    Malzilla is an advanced malware-hunting tool specialized for hunting web-based exploits, decode obfuscated JavaScripts etc.

  • Moon Secure Antivirus Icon

    Moon Secure Antivirus

    Free - Simple - Scalable

    Moon Secure Antivirus aims to be the best Free Antivirus for Windows under GPL license. It offers multiple scan engines, Net shield, Firewall, On access, on Exec scanner and rootkits preventions plus features from Commercial Antivirus applications.

  • BruteForcer

    A client-server multithreaded application for bruteforce cracking passwords. The more clients connected, the faster the cracking. Plugin-based. Supports only RAR passwords at the moment and only with encrypted filenames.

  • Free Key Generator

    Very small and quick password generator.

  • TurboPower LockBox

    TurboPower LockBox 2 & 3 Cryptographic Library for Delphi

    LockBox 3 is a Delphi library for cryptography. Currently supported Delphi XE6. It provides support for AES, DES, 3DES, Blowfish, Twofish, SHA, MD5, a variety of chaining modes, RSA digital signature and verific...

    Downloads: 156 This Week Last Update: See Project
  • Discover server and application network dependencies Discover server and application network dependencies Icon
    Discover server and application network dependencies Icon

    Discover and troubleshoot application dependencies to determine if it’s an application or network problem with SolarWinds Server & Application Monitor

    Server & Application Monitor helps you discover application dependencies to help identify relationships between application servers. Drill into those connections to view the associated network performance such as latency and packet loss, and application process resource utilization metrics such as CPU and memory usage. Determine if process utilization or network performance is affecting the application and end-user performance.
  • Keynote

    Tabbed notebook with RichText editor, multi-level notes and strong encryption

  • Portable Folder Locker Icon

    Portable Folder Locker

    Quick protect your folder

    Hook Folder Locker is a small tool to lock your folder quickly. Its a portable software easy to use, just 1 file only. Protected by password. How to use: 1. Browse the folder 2. Click Lock 3. Choose your password for the folder How to unlock 1. Browse the folder 2. Click Unlock 3. Enter the password.

  • A.L.A.R.M. A Laptop A/C Removal Monitor

    A.L.A.R.M. is A Laptop A/C Removal Monitor for Windows XP and later. If your workstation is locked and A/C power is being removed, it loudly plays a warning signal for theft protection. Slim, sound file can be specified.

  • Oubliette

    Full-featured password manager for Windows95/98/2K/XP, with strong encryption. Store passwords for internet accounts, PIN numbers, credit cards. Securely encrypts data with Blowfish or IDEA. Easy navigation, search, import/export, clipboard protection.

  • mp3stegz

    mp3stegz is an application that apply steganographic (steganography) algorithm in mp3 files. mp3stegz will maintain original mp3 file's size and sound quality. The hidden message is compressed(zlib) and encrypted(Rijndael).

  • winKeyLock

    winKeyLock utility enables to lock computer access quickly. Disables the Windows keyboard and mouse so a DVD/Movie can be watched by a small child without changing anything! During lock the current screen stays transparent not like during screen server.

  • PEID external signature file editor

    Win32 Delphi applciation allows convienent editing of external signatures database in windows executable packer finder program PEID (http://peid.has.it/). Allows sorting, editing, adding, removal, searching and duplicate signature finding in "userdb.txt".

    Downloads: 31 This Week Last Update: See Project
  • Dont Hijack This Icon

    Dont Hijack This

    DHT is an anti-hacker tool to fix all the damage caused by viruses.

    Dont Hijack This is an anti-hacker tool to fix all the damage caused by malware. It enables the disabled windows components. It completely removes all the bots/viruses/malware infections in 35 seconds. Fixes: registry editing has been disabled by administrator Task Manger has been disabled by your administrator Windows defender is turned off by group policy proxy settings hijack virus (unable to connect proxy server) unable to install antivirus and antivirus killer windows firewall disabled action center or security center disabled. safe mode hijacked and disabled remove fake or rogue antivirus/anti spyware Unknown viruses and worms +more Coming soon: Anti Rootkit Anti Adware (improved) Stealth Process Viewer

    Downloads: 28 This Week Last Update: See Project
  • Open StreamSec Tools 2.1.x

    StreamSec Tools 2.1 is collection of cryptographic security related components, classes and routines for the Borland (R) Delphi (TM) development environment. The product includes modular clean room implementations of SSL/TLS, S/MIME and X.509.

    Downloads: 17 This Week Last Update: See Project
  • OpenVPN GUI Login-Tool Icon

    OpenVPN GUI Login-Tool

    Enters user+pass for you + allows scheduled IP change for OpenVPN GUI

    The OpenVPN client ( https://sourceforge.net/projects/openvpn-gui ) is the standard VPN client for OpenVPN protocol on Windows. Unfortunately you have to enter your username+password each time you're connecting. Since the client does not offer a way to save the users login details, you can now use this OpenVPN GUI Login-Tool. Enter your username and password, save it. Then, as long as the app is running, you don't need to enter your login details ever again. Useful! (don't worry, the login details get saved encrypted and secure) The latest version has this new features: - a scheduled IP change every X seconds/minutes - a manual reconnect with 1 click. - option to run the app with parameters "login" or "reconnect", e.g. to use it in scripts or ext. apps This tool has been made for HideMyAss Pro VPN -> http://www.hidemyass.com If you have any suggestions, questions or if you experience any issues or errors, please contact me @ info@hmastuff.com or post in the discussion page

  • aBLhackPsw Icon

    aBLhackPsw

    aBLhackPsw v6.1 - Password recovery tool

    Now with aBLhackPsw v6.1 you can see the password in x32 and x64 programs !!! aBLhackPsw v6.1 run on Wondows 10 !!! aBLhackPsw is a password recovery tool - utility for recovering forgotten or lost password. With this program you can see asterisks ***** password from ***** fields (Outlook Express, Total Commander (FTP) and other programs). There is no illegal password hacking technique involved, it only reads or uncovers hidden password character that are covered by asterisks. This program don't need to install. You can to write into flash device or the others devices and work with program with the others computers. Multilingual User Interface (English, Lithuanian, Russian) Work on Windows (x32/x64) 98/ME/NT/2000/2003/XP/VISTA/2008/Windows 7/8/10

  • proDETECT

    proDETECT is an open source promiscious mode scanner with a GUI.It uses ARP packet analyzing technique to detect adapters in promiscious mode.This tool can be used by security administrators to detect sniffers in a LAN.

  • Program Killer

    The Program Killer is a Delphi 6 program that monitors the Process List on Windows 95/98/Me and Windows NT4/2000/XP for unauthorized EXE files (User Definable) and if found, those Processes are Terminated via the Windows API.

  • ProxyCryptGUI

    Provides an easy to use 'front-end' to ProxyCrypt

    About ProxyCryptGUI: • ProxyCryptGUI is a free application that provides a Windows GUI (graphical user interface) for ProxyCrypt to manage encrypted virtual disk drives. • The setup file for ProxyCryptGUI includes the required setup of ProxyCrypt and ImDisk. See: https://sourceforge.net/projects/proxycrypt/ and http://www.ltr-data.se/opencode.html/#ImDisk • All files stored in an encrypted virtual drive can be accessed just as any files on regular disk drives but only after the drive is mounted/opened with the associated passphrase. Requirements: • Windows XP, Vista, 7, 8 or 8.1, 10, 32b or 64b • computer administrator privileges • CPU with SSE2 instructions

    Downloads: 10 This Week Last Update: See Project
  • infotec

    The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an

    Downloads: 8 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you