Security & Utilities Software

OS OS

    • More...
  • More...

Category Category

License License

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

Audience Audience

    • More...

User Interface User Interface

  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • Monitor your Cisco ASA like an expert Monitor your Cisco ASA like an expert Icon
    Monitor your Cisco ASA like an expert Icon

    See how Network Insight™ for Cisco® ASA, a feature of SolarWinds Network Performance Monitor and Network Configuration Manager, can help.

    Get visibility into the health and performance of your entire Cisco ASA environment in a single dashboard. View VPN tunnel status and monitor firewall high availability, health, and readiness. Automatically discover and filter within ACLs, show rule hit counts, and detect shadow and redundant rules. Automate the monitoring and management of your ASA infrastructure in a fully integrated solution. Try it free for 30 days!
  • Focus on your Business with an integrated Business Cloud Focus on your Business with an integrated Business Cloud Icon
    Focus on your Business with an integrated Business Cloud Icon

    Reliable & Secure Communications Systems

    • 90+ features: video, file management, cloud phones
    • 99.999% financially backed uptime SLA
    • Expert support, certified by J.D. Power 2 years in a row
  • IPCop Firewall Icon

    IPCop Firewall

    Linux firewall distribution geared towards home and SOHO users.

    The IPCop Firewall is a Linux firewall distribution. It is geared towards home and SOHO users. The IPCop web-interface is very user-friendly and makes usage easy.

  • Rootkit Hunter

    Rootkit Hunter, security monitoring and analyzing tool for POSIX compliant systems.

  • Network Security Toolkit (NST) Icon

    Network Security Toolkit (NST)

    A network security analysis and monitoring toolkit Linux distribution.

    Network Security Toolkit (NST) is a bootable ISO image (Live DVD/USB Flash Drive) based on Fedora 26 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available in the toolkit. An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, network monitoring, host geolocation, network analysis and configuration of many network and security applications found within the NST distribution. In the virtual world, NST can be used as a network security analysis, validation and monitoring tool on enterprise virtual servers hosting virtual machines.

  • Robolinux Icon

    Robolinux

    New Robolinux Cinnamon 9.1 LTE (2021) which runs Windows XP, 7 & 10

    Robolinux has been working night and day listening carefully to its User base and is extremely excited to release its brand new Robolinux 64 bit 9 series Cinnamon version which includes automated driver installers, Free Stealth VM, Free C Drive to VM & Free Apps installers, programmable ear candy and much much more built upon the 4.13 Linux kernel sporting the newest Cinnamon version 3.6 This second of five brand new Robolinux 9 series versions focuses on Privacy and was built with a flawless crash free balance of the best current but highly stable Debian & Ubuntu source code, delivering exactly what our Users asked for in a blazing fast Linux OS that runs Windows XP, 7 & 10 natively inside it virus Free. The live version login user name is live then press enter as there is no password. Please see the Readme.txt file for complete Robolinux Cinnamon V9.1 details For all downloads click on the "Files" button above. Thank you John Martinson Founder Robolinux.org

  • Web Security Dojo

    Web Security Dojo is a preconfigured, stand-alone training environment for Web Application Security. Virtualbox and VMware versions for download. See "View all files" for VMware version.

  • Pyramid - The Complete Self-Service Analytics Platform Pyramid - The Complete Self-Service Analytics Platform Icon
    Pyramid - The Complete Self-Service Analytics Platform Icon

    Easily combine data from multiple sources to build dashboards and reports with our scalable solution built for mid-size to enterprise companies.

    Pyramid combines analytic tools often found in separate applications. It features a graphically based ETL to model data and incorporate machine learning algorithms, intuitive data discovery tools that produce simple and advanced visualizations, a presentation builder for creating analytic applications and presentations, and an enterprise-grade report builder—all in a single, integrated platform that can be accessed from any browser or device.
  • duply (simple duplicity) Icon

    duply (simple duplicity)

    Duply is a shell front end for the duplicity backup tool http://duplicity.nongnu.org/. It simplifies the usage by implementing backup job profiles, batch commands and more. Secure backup to non-trusted file spaces made easy.

  • Jacksum Icon

    Jacksum

    a free cross platform checksum utility, supports 58+ hash algorithms

    Jacksum is a platform independent checksum utility (written entirely in Java) for computing and verifying (integrity check) checksums, CRC and hashes (fingerprints). It supports 58 popular hash algorithms and a lot of unique features.

  • Untangle Icon

    Untangle

    Untangle is a Linux-based network gateway with pluggable modules for network applications like spam blocking, web filtering, anti-virus, anti-spyware, intrusion prevention, bandwidth control, captive portal, VPN, firewall, and more. Visit http://untangle.com

  • venom - shellcode generator Icon

    venom - shellcode generator

    msfvenom shellcode generator/compiler/listenner

    The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( c | python | ruby | dll | msi | hta-psh ), injects the shellcode generated into one funtion (example: python) "the python funtion will execute the shellcode in ram" and uses compilers like: gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file, also starts a multi-handler to recibe the remote connection (reverse shell or meterpreter session). -- 'shellcode generator' tool reproduces some of the technics used by Veil-Evasion framework, unicorn.py, powersploit, etc,etc,etc.."P.S. some payloads are undetectable by AV soluctions yes!!!" one of the reazons for that its the use of a funtion to execute the 2º stage of shell/meterpreter directly into targets ram.

  • MailCleaner Icon

    MailCleaner

    Anti Spam SMTP Gateway

    [antispam] MailCleaner is an anti-spam / anti-virus filter SMTP gateway with user and admin web interfaces, quarantine, multi-domains, multi-templates, multi-languages. Using Bayes, RBLs, Spamassassin, MailScanner, ClamAV. Based on Debian. Enterprise ready. MailCleaner is an anti spam gateway installed between your mail infrastructure and the Internet. It includes a complete GNU/Linux OS and a graphical web interface for user and administrative access. It comes in the form of virtual machine templates.. - fully compatible with any SMTP mail server (Exchange, Zimbra,...) You can install now MailCleaner within the following virtual environments: qcow2 (KVM, Proxmox, OpenStack, Xen) vhd (Hyper-V, VirtualPC) vmdk (VMware ESXi, Workstation, VMware Fusion) ova (VM Standard, supported by most hypervisor) Dedicate a server to MailCleaner, and you will have a working professional mail filter in less than an hour.

  • Take Advantage of O365 + Online Backup Bundles Take Advantage of O365 + Online Backup Bundles Icon
    Take Advantage of O365 + Online Backup Bundles Icon

    The Perfect Small Business Offer That Packages Productivity, Disaster Recovery & Security Under One Price Tag. Join SherWeb to Start Reselling.

    Add more value to your Office 365 offers with Online Backup. The program will back up servers, desktops, virtual machines and smart devices, plus popular applications and Office 365 data. Online Backup comes with the Active Protection feature embedded, making it possible to stop any ransomware attack and restore encrypted files in a blink. It also provides a web-based intuitive console that eases backup and disaster recovery management.
    Are you an IT professional looking to profit from reselling Office 365?
    Sign up NOW, it’s FREE
  • iptables-bash_completion

    Programmable completion code (bash) for ip[6]tables (netfilter.org)

    This is the programmable completion specification (compspec) for the iptables program (netfilter.org).

    Downloads: 33 This Week Last Update: See Project
  • Mpge Icon

    Mpge

    Mpge

    Mpge is a wrapper of meterpreter (msfconsole, msfpayload and msfencode) of Metasploit Framework directly integrated with Mac OS X Snow Leopard 10.6.8 and with OS X Mavericks 10.9. With Mpge is possible make trojan horse files for Microsoft Windows, Linux and Mac OS X 10.3 Panther, OS X 10.4 Tiger, OS X 10.5 Leopard and OS X Montain Lion 10.8.1 for all Mac OS X is possible make a trojan horse files contains a reverse shell into files .pkg and files .app. I used three real Mac OS X: Attacker: MacBook with Snow Leopard 10.6.8 Target: Mac iBook PowerPC G4 with Mac OS X10.3.5 Panther and after MacBook and iMac Mac OS X Mountain Lion 10.8.1. All Mac OS X were connected on intranet lan of an italian ISP. The attacker MacBook is in listening and expected the reverse shell from the target Mac iBook PowerPC G4 that receive a package and when user click on file .pkg and insert the user password, the attacker receive a reverse shell of target. For more details read Features and User Reviews.

  • Shoreline Firewall (Shorewall)

    An iptables based firewall for systems running the Linux 2.4 or later kernel. Very flexible configuration allows the firewall to be used in a wide variety of firewall/gateway/router and VPN environments.

  • CleanDNS Appliance Icon

    CleanDNS Appliance

    A DNS based malware protection

    This is a Proof of Concept Technology for protecting End Users from malware, advanced threat and other malicious content by preventing DNS malicious Request/Responses. Considerations: Virtual Hardware Recommended (ALL Back-level Compatibility): - CPU Type: x86_64 (AMD64) - 4vCPUs - 8GB RAM - 40GB On demand Virtual Disk - Intel e1000 Virtual Network Interfaces (Mandatory) Components Used: PFSense 2.4.3 - Suricata Module - Bind Module - Cron Module - Service Watchdog Module - SNORT Community Signature + Emerging Threats for constant update. - - Bring Your Own SNORT OINKCODE to get advanced rules. #CleanDNS Project: Because Detection is Cool but Proactivity is Better!

    Downloads: 11 This Week Last Update: See Project
  • Sagacity Icon

    Sagacity

    Security Assessment Data Management and Analysis Tool

    Sagacity is a vulnerability assessment and STIG compliance data management tool designed to make security testing more efficient, effective and complete. Security assessments, especially those done for DoD and Federal organizations, produce tremendous amounts of scan and compliance data that security engineers must sort through and deconflict, identify untested requirements, and somehow analyze to communicate risk to their employers. Sagacity, originally written to support a government customer, was designed to fill that need. What if an organization could turn massive amounts of irreconcilable vulnerability scan data into true knowledge and insight about their networks? They would be able to make wise decisions resulting in cost-effective actions to improve their security with the best return on investment. Keen insight. Sound judgment. Wise decisions. Sagacity.

    Downloads: 7 This Week Last Update: See Project
  • yasat

    YASAT is a simple stupid audit tool. It try to be as simple as possible with minimum binary dependencies (only sed, grep and cut)

  • FireHOL

    Please see http://firehol.org/ for up-to-date releases and information. FireHOL is a stateful iptables packet filtering firewall configurator. It is abstracted, extensible, easy and powerful. It can handle any kind of firewall, but most importantly, it gives you the means to configure it, the same way you think of it.

  • multiOTP open source Icon

    multiOTP open source

    PHP strong authentication library, web interface & CLI, OATH certified

    multiOTP is a PHP class, a powerful command line utility and a web interface developed by SysCo systèmes de communication sa in order to provide a completely free and easy operating system independent server side implementation for strong two factors authentication solution. multiOTP supports hardware and software tokens with different One-Time Password algorithms like OATH/HOTP, OATH/TOTP and mOTP (Mobile-OTP). QRcode generation is also embedded in order to support provisioning of Google Authenticator software tokens. SMS code sending is currently implemented for several providers (ASPSMS, Clickatell and IntelliSMS). The data storage of the command line utility is by default flat files based in order to simplify deployment in a few minutes, but MySQL backend is supported too. multiOTP can be easily integrated in RADIUS servers like FreeRADIUS under Linux/Windows or TekRADIUS LT under Windows. multiOTP is also the engine of the credential provider multiOTP Credential Provider.

    Downloads: 2 This Week Last Update: See Project
  • X-Itools: Email/Web Log Search Engine

    Strong Email & Apache Log Analysis with Active Security Features

    X-Itools: eXtended Internet Tools. Suite of tools composed of several collaboration modules. Old and initial project born in 1999, 1st published in 2001 on Sourceforge. X-Itools E-mail management module (log analysis) initiated in 2004 with Web 1.0 technologies (private SVN server). X-Itools development restarted since 2011, on the basis of a unique module: E-mail management module (log analysis). Now based on web 2.0 technologies (ExtJS 4.1) and devel restarted because of a particular interest given to it by a world wide Organization (United Nations). Module renamed "X-Itools ELSE", for "X-Itools E-mail Log Search Engine". Some features: Log analysis and correlation of Postfix and Exchange servers, statistics, policy manager, in-deep analysis, automated network graphs for e-mail tracing, CSV export... The Swiss knife of Messaging Admins. In 2015, X-Itools ELSE is no more limited to E-mail logs: Apache logs are also processed and related stats and dashboards will be there!

  • Tiny Applications

    A set of tiny applications, shell scripts and other tools useful in ev

    Tiny Applications Collection (or tinyapps) is a set of small tools which make everyday use of a Unix-based system even more enjoyable. The idea is to allow users to share their own tools that they find useful in their everyday use, and look at what others are doing in case there's something that may be of use. Usually putting out one or two files involves too many steps for anyone to bother, but here, tinyapps is a perfect place for such applications!

    Downloads: 1 This Week Last Update: See Project
  • Lynis Icon

    Lynis

    System/security auditing tool for hardening and securing Linux/Unix

    === Note: this project has been moved to GitHub === Lynis is a system and security auditing tool for Unix/Linux. It is used by security consultants, auditors and system administrators. This tool performs a security audit of the system and determines how well it is hardened. Any detected security issues will be provided in the form of a suggestion or warning at the end of the audit. Beside security related information it will also scan for general system information, installed packages and possible configuration errors. This software aims in assisting automated auditing, hardening, software patch management, vulnerability and malware scanning of Unix/Linux based systems. It can be run without prior installation, so inclusion on read only storage is possible (USB stick, cd/dvd). Lynis assists auditors in performing Basel II, GLBA, HIPAA, PCI DSS and SOx (Sarbanes-Oxley) compliance audits, by automation of control testing. Extended support for companies is available

    Downloads: 0 This Week Last Update: See Project
  • foo crypt

    foo crypt, A Tale of cynical cyclical encryption.

    Downloads: 0 This Week Last Update: See Project
  • ipblock

    Block or allow connections by country address blocks

    Ipblock allows you to select which countries you allow or block connections to and from.

    Downloads: 0 This Week Last Update: See Project
  • keys Icon

    keys

    A gpg-based password manager with ncurses interface

    Keys is a little, but enough powerful, password manager for linux systems with a 'fancy' ncurses interface. It base its security around strong GPG tecnology. Keys is merely a bash script that used internal bash commands and externals ones. Keys permits to store securely your password and credentials in gpg's encrypted files, structured in a multi-level tree. With Xdotool you can also use auto-typing, a must-have feature for this kind of software. Keys currently can open (with autotyping) these types of connections: - Open a website and logon with the provided credentials - Open an ssh/sftp connection with the provided credentials - Open an rdesktop connection with the provided credentials Also, Keys can store generic Account credentials (aka. username+password). Keys refers to every single encrypted file containing credentials as a 'DB key' (key database). Every 'DB key' can be open and view with standard gpg decrypting commands.

    Downloads: 0 This Week Last Update: See Project
  • mktwpol - Tripwire Policy Generator

    Gentoo-centric script to make tripwire policy file from package lists

    The mktwpol package is a companion pair of scripts, useful to automate the installation of tripwire, create plain-text tripwire policy files, and maintain a tripwire database. twsetup.sh is a bash script for completing a first time tripwire set-up with a minimum of fuss and study. It describes what it is going to do (including showing the exact commands that will be run), then calls twadmin, mktwpol.sh and tripwire to make key files, generate tripwire policy, encrypt the policy, and make the tripwire database. mktwpol.sh is a bash script that creates a plain-text tripwire policy file tailored to the packages and files currently installed on a system. The mktwpol-generic.sh script (not included in the release tarballs, but can be found in the "code" section) can be adapted to Linux distributions other than Gentoo.

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you