Security & Utilities Software

OS OS

  • More...
    • More...

Category Category

License License

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • Want to improve your MSP’s revenue? Price your services right. Want to improve your MSP’s revenue? Price your services right. Icon
    Want to improve your MSP’s revenue? Price your services right. Icon

    Get the ebook, The Managed Services Pricing Guide 2.0 to get industry best practices on pricing managed services.

    You choose software for your IT business so it makes you money. The margins must be good enough to justify the cost. SolarWinds RMM was priced to give you the margins you need to earn a healthy amount of monthly recurring revenue. Download our all-new Managed Services Pricing Guide 2.0 to find what revenue to expect for your services, including light monitoring, web protection, patching management, backup and more.
  • Find out what (or who) is slowing down your network Find out what (or who) is slowing down your network Icon
    Find out what (or who) is slowing down your network Icon

    Get comprehensive network bandwidth analysis and performance monitoring with SolarWinds® Bandwidth Analyzer Pack.

    Network slow, but you don't know the cause? Use Bandwidth Analyzer Pack (BAP) to monitor and analyze network bandwidth performance and traffic patterns. With BAP, you can identify which users, applications, and protocols are consuming the most bandwidth. You can also monitor Wireless LAN Controller traffic to see what applications and clients are using your wireless network. Try it free for 30 days!
  • BleachBit Icon

    BleachBit

    deletes junk files to free disk space and improve privacy

    BleachBit frees disk space and maintains privacy. Cleans cache, Internet history, temporary files, logs, cookies, Firefox, Google Chrome, Flash, Windows, Linux, and more. Downloads are at www.bleachbit.org and source code is at GitHub.

  • Mole Icon

    Mole

    Automatic SQL Injection Exploitation Tool

    Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a boolean query based technique. The Mole uses a command based interface, allowing the user to indicate the action he wants to perform easily. The CLI also provides auto-completion on both commands and command arguments, making the user type as less as possible.

  • ufonet Icon

    ufonet

    UFONet - (DDoS botnet + DoS tool) via Web Abuse

    UFONet - is a tool designed to launch Layer 7 (HTTP/Web Abuse) DDoS & DoS attacks. + FAQ: https://ufonet.03c8.net/FAQ.html -> UFONet-v1.0 "TachY0n!" (.zip) -> md5 = a928524c167238d6a95a8a38ada5c334 --------------------------------------------

    Downloads: 323 This Week Last Update: See Project
  • Tyrant SQL Icon

    Tyrant SQL

    Tyrant SQL is a Havij based cross-platform. It's Sqlmap's gui version.

    It's a poweful Sql Injection Tool. It's a GUI version of SqlMap, saving time and getting better results. Was designed basing on Havij.

    Downloads: 44 This Week Last Update: See Project
  • xsser Icon

    xsser

    XSSer: Cross Site Scripter

    Cross Site "Scripter" is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. XSSer v1.7-2.tar.gz -> md5: 86cfb5f7fa0e0b0bd34f11ea026b474d

  • The First VoIP Communications Cloud in the World The First VoIP Communications Cloud in the World Icon
    The First VoIP Communications Cloud in the World Icon

    The Smarter Business Phone Solution

    • Powerful Unified Communication Features
    • Fast, Easy, Free Setup & Install
    • Trusted by 47,000+ Companies in 100 Countries
  • SIPve Icon

    SIPve

    Videovigilancia, Control de Acceso y Carnetización

    Sistema Integrado de Protección Venezolano con capacidades de Videovigilancia, Control de Acceso y Carnetización para el resguardo físico de instalaciones.

  • cintruder Icon

    cintruder

    CIntruder - OCR Bruteforcing Toolkit

    Captcha Intruder is an automatic pentesting tool to bypass captchas.

  • etherwall Icon

    etherwall

    Etherwall is a free and open source network security tool that prevents Man in The Middle (MITM) through ARP Spoofing/Poisoning attacks. It Also prevent it from various attacks such as Sniffing, Hijacking, Netcut, DHCP Spoofing, DNS Spoofing, WEB Spoofing, and others. Note: For personal computer use only (client security) if you like this program, please give us your vote at http://sourceforge.net/projects/etherwall/reviews/

  • SCardFace

    ScardFace is a python3k library for interfacing with smart cards, which supports Plug-and-Play readers inclusion and threading. It also offers classes for manipulating APDU cmds and resps, and use them in a transport-protocol-independent fashion.

    Downloads: 9 This Week Last Update: See Project
  • Forensic Scripts

    Forensic scripts for evidence acquisitions, analysis and more

    This project contains various scripts and code snippets that can easily be deployed by an incident responder or forensic analyst to aid them in either acquiring or analyzing critical data. You can contact me at: interrupt08@users.sf.net or visit my blog, fork(), at https://forksec.wordpress.com/

    Downloads: 6 This Week Last Update: See Project
  • DigitalOcean - The Total Cloud Computing Platform DigitalOcean - The Total Cloud Computing Platform Icon
    DigitalOcean - The Total Cloud Computing Platform Icon

    Our platform was built with simplicity at the forefront, so developers can build and deploy with ease.

    DigitalOcean's predictable format removes infrastructure friction and allows developers more time to build software customers love. Easily deploy, manage, and scale applications of any size. DigitalOcean also provides the support you need with hundreds of in-depth tutorials and an active online community.
  • dnmap Icon

    dnmap

    distributed nmap framwork

    dnmap is a distributed nmap framwork using a client/server architecture. The server reads the commands from a file and send them to each client. The client execute the nmap command and send the results back. Also see: www.mateslab.com.ar

  • Netflower Icon

    Netflower

    Statistical Netflow Anlaytics for Forensic Use

    The command line tool Pcaprunner is written in pure C using only standard libs to analyze netflow meta data from pcap files. The web-based Netflower provides a handy GUI on top of Pcaprunner to analyze and visualize netflow data. The goal of the project is to create an Open Source tool to investigate large PCAP files / netflow data from e.g. server surveillance by law enforcement or intelligence. While Pcaprunner already works well (use "gcc -o pcaprunner pcaprunner_v0.5.c to create) Netflower is not ready to be used yet. I am working on it but as I am an investigator at first, not a software engineer, you probably have to be patient...

    Downloads: 5 This Week Last Update: See Project
  • Domain Analyzer Security Tool

    Finds all the security information for a given domain name

    Domain analyzer is a security analysis tool which automatically discovers and reports information about the given domain. Its main purpose is to analyze domains in an unattended way.

    Downloads: 4 This Week Last Update: See Project
  • Artemisa Icon

    Artemisa

    Artemisa is a honeypot for VoIP (SIP) networks. It is designed to connect to a VoIP domain as a user-agent backend in order to detect malicious activity at an early stage and also adjust the policies of the enterprise in real-time.

    Downloads: 3 This Week Last Update: See Project
  • BitShade Icon

    BitShade

    AES Cipher and Base64 encoder/decoder in Python

    BitShade is a graphic utility to encrypt/decrypt with AES and/or base64 encode/decode a file, written in Python.

    Downloads: 3 This Week Last Update: See Project
  • CIA Project

    Cia project tries to develop an all-purpose security tool. It's composed by ctools, the security tool; cfs, the app and cfs-server, a file & key server.

    Downloads: 3 This Week Last Update: See Project
  • GoodCrypto private server

    Secure mail + Tor gateway

    Protect your company's email and browsing with your GoodCrypto private server. * Protects email metadata and resists traffic analysis * Automatic encryption, decryption, and key management * All private keys stay on *your* server * Users don't change their email or browser software * Blocks web malware * Runs on your private server * Completely decentralized

    Downloads: 3 This Week Last Update: See Project
  • DetektywKomputerowy

    Odnajdzie i odzyska ukryte, skasowane dane

    Detetktyw Komputerowy to specjalny program komputerowy z zakresu detektywistyki komputerowej oraz informatyki śledczej, który daje pełen dostęp do zabezpieczonego hasłami komputera, a w szczególności: - "obchodzi" wszelkie hasła w systemie Windows, - daje pełny dostęp do systemu oraz danych na dysku - wyszukuje istotne dla użytkownika dane i informacjie, także te ukryte - przegląda znalezione informacje i dane - odzyskuje skasowane dane - odzyskuje zapomnane hasła do systemu Vista / Windows 7 - tworzy raporty i prezentacje z wyników wyszukiwania

    Downloads: 2 This Week Last Update: See Project
  • H.O.P.E. Integrated Systems

    Your friendly neighborhood hackers for hire. We are a group of individuals providing our clients the best support and troubleshooting advice and some of what we believe to be the best open source software and OS. Enjoy!

    Downloads: 1 This Week Last Update: See Project
  • Jack the Stripper Icon

    Jack the Stripper

    Perform automated MITM (Man In The Middle) attacks.

    ENGLISH: Jack the Stripper uses iptables, Ettercap and SSLStrip to intercept data between two connected targets (IP addresses). The victims's ARP tables must be poisoned by Ettercap, that means Jack the Stripper works only on local networks. PORTUGUÊS: Jack The Stripper utiliza iptables, Ettercap e SSLStrip para interceptar dados entre dois alvos (endereços IP) interconectados. As tabelas ARP das vítimas devem ser envenenadas pelo Ettercap, isso significa que Jack The Stripper funciona apenas em redes locais.

    Downloads: 1 This Week Last Update: See Project
  • KillDisk Icon

    KillDisk

    Disk Wiping Software

    KillDisk is a program written in python for Unix based systems for wiping a hard drive. It can wipe a hard drive using all zeroes or random data, and as many times as you want to specify.

    Downloads: 1 This Week Last Update: See Project
  • Malware Analysis Network in Taiwan

    MAN in Taiwan, MiT

    Malware Analysis Network in Taiwan <Man in Taiwan, MiT> Welcome to contact us (TonTon@TWMAN.ORG) if you are interested in collaborating with us. This project is open source and distributed under the GNU General Public License version 3. Please feel free to add to or modify this source and propose changes or new converters. Developer & Copyrighted by : TonTon Hsien-De Huang Prompter: Jazz Yao-Tsung Wang, Figaro Chen-Ho Yang | Logo Desinger:Temaki Guo Community on Google+:http://X.TWMAN.ORG/Community/ SourceForge: https://sourceforge.net/projects/twmanplus/files/ FaceBook: https://www.facebook.com/TWMAN.PLUS

    Downloads: 1 This Week Last Update: See Project
  • WTMParse Icon

    WTMParse

    Python script to parse Unix-like WTMP files

    Python script that was originally intended for use in forensic examinations that parses WTMP files from Unix-like operating systems and generates a CSS-styled HTML report containing login terminal, username, log start date and login time/date in a table. Good for postmortem forensic examinations or as a way of getting "last" like information where you don't have the ability to boot the machine in question but can grab the wtmp.

    Downloads: 1 This Week Last Update: See Project
  • protepad

    Small GUI to encrypt/decrypt texts

    The tool is useful when you want to encrypt and decrypt texts with password. Encrypted text can be posted online, and can only be decrypted back when correct password is entered.

    Downloads: 1 This Week Last Update: See Project
  • APG UI

    APG UI is a simple GTK+ GUI for the "Automated password generator"

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you