Security & Utilities Software


    • More...
  • More...
    • More...
    • More...
    • More...

Category Category

    • More...
    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

    • More...
    • More...
  • More...

Freshness Freshness

Security & Utilities Software

  • Monitor your Cisco ASA like an expert Monitor your Cisco ASA like an expert Icon
    Monitor your Cisco ASA like an expert Icon

    See how Network Insight™ for Cisco® ASA, a feature of SolarWinds Network Performance Monitor and Network Configuration Manager, can help.

    Get visibility into the health and performance of your entire Cisco ASA environment in a single dashboard. View VPN tunnel status and monitor firewall high availability, health, and readiness. Automatically discover and filter within ACLs, show rule hit counts, and detect shadow and redundant rules. Automate the monitoring and management of your ASA infrastructure in a fully integrated solution. Try it free for 30 days!
  • Reduce Support Costs with TeamSupport’s B2B helpdesk Reduce Support Costs with TeamSupport’s B2B helpdesk Icon
    Reduce Support Costs with TeamSupport’s B2B helpdesk Icon

    Improve customer satisfaction with powerful and easy to use helpdesk software built specifically for business to business customer support.

    We do what you do – business software – so we get it. Customer support is critical to any business and as a B2B provider you not only need to manage contacts and tickets, you need to understand your business relationships at a customer level. TeamSupport is the only helpdesk software built for B2B and made to scale with you as you grow.
    • Easy to Use and Fully Customizable to Your Business
    • Relational Customer Database and Best in Class SLAs
  • ClamAVSuite Icon


    An alternative to ClamWin

    ClamAV-Suite is a gui for ClamAV developed for Windows 10 (x64 only). ClamAV-Suite allows to scan your device in three different ways: -fast scan -full scan -custom scan For other information see documentation. Who wants to contribute write me to: dntpanic[at]users[dot]sourceforge[dot]net

  • PasswordGenerator Icon


    A free Password Generator written in Java

    next version is 2.4.6

  • Protected SCP-ECG files

    This project aims at developing a easy software for the protection of SCP-ECG files and also control the access to the protected files.

  • butterfly

    An open source browser with antivirus, system cleaning, file folder locking, social networking, movie viewing, chatting and parental website block features.

  • Whonix Icon


    Whonix is an Anonymous Operating System.

    THIS IS NOT WHONIX'S HOMEPAGE. Please go to: (This is only Whonix's sourceforge must-have project page.) Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible. Whonix is produced independently of, and carries no guarantee from, The Tor Project. For download:

  • Infrastructure and application monitoring for Azure Infrastructure and application monitoring for Azure Icon
    Infrastructure and application monitoring for Azure Icon

    Monitor your Azure® infrastructure, application, and systems performance side by side in a single enterprise-monitoring tool

    So, you moved your applications and servers to Azure, but are they running any better and are you able to justify the investment? Without proper monitoring, you’re left guessing if application and server performance has improved, and when issues arise, you’re left scrambling to locate the root cause. SolarWinds® Server & Application Monitor (SAM) can monitor your Azure workloads side by side with your on-premises workloads to help ensure optimal application performance.
  • CSVHashCrack Suite Icon

    CSVHashCrack Suite

    Multi hash crack suite

    This script is capable of cracking multiple hashes from a CSV-file like e.g. dumps from sqlmap. Over 17.000 md5-hashes in a CSV-file get cracked with a 14.300.000 lines wordlist in less then 1 min. Lines wich cant get cracked with the wordlist get stored in a .leftToCrack-File to further process with another Wordlist or the bruteforce-tool. In addition to the wordlist-cracker I created also a bruteforce-tool named CSVHashBrutforcer.

    Downloads: 5 This Week Last Update: See Project
  • Domain Analyzer Security Tool

    Finds all the security information for a given domain name

    Domain analyzer is a security analysis tool which automatically discovers and reports information about the given domain. Its main purpose is to analyze domains in an unattended way.

    Downloads: 5 This Week Last Update: See Project
  • Enhanced SCAP Editor (eSCAPe)

    eSCAPe (Enhanced SCAP Editor) is used to create Security Content Automation Protocol (SCAP) content files, in particular OVAL & XCCDF files. Allows experts to create SCAP content without requiring in-depth knowledge of the protocols themselves.

    Downloads: 5 This Week Last Update: See Project
  • Jack the Stripper Icon

    Jack the Stripper

    Perform automated MITM (Man In The Middle) attacks.

    ENGLISH: Jack the Stripper uses iptables, Ettercap and SSLStrip to intercept data between two connected targets (IP addresses). The victims's ARP tables must be poisoned by Ettercap, that means Jack the Stripper works only on local networks. PORTUGUÊS: Jack The Stripper utiliza iptables, Ettercap e SSLStrip para interceptar dados entre dois alvos (endereços IP) interconectados. As tabelas ARP das vítimas devem ser envenenadas pelo Ettercap, isso significa que Jack The Stripper funciona apenas em redes locais.

    Downloads: 5 This Week Last Update: See Project
  • Qana Icon


    Performs 256-bit symmetric-key encryption using established algorithms

    Qana is a Java application that encrypts files, text and archives (hierarchically structured sets of files) with a symmetric-key cipher based on established cryptographic algorithms: the scrypt key derivation function and the Fortuna cryptographically secure pseudo-random number generator, with a choice of AES-256 or Salsa20 as the underlying cipher. * It has an easy-to-use graphical interface, including a straightforward key-management dialog. * Individual files can be encrypted. * Text can be edited and encrypted. The encrypted text can be optionally wrapped in XML. * A hierarchical set of files can be encrypted as an archive, which is stored as a set of encrypted files with generic names, along with an encrypted file of metadata. * A single file can be split into several encrypted parts. * Files or text can be encrypted and concealed within an image file. * A file, text or image can be generated with the same form as an encrypted output but containing garbage.

    Downloads: 5 This Week Last Update: See Project
  • The First VoIP Communications Cloud in the World The First VoIP Communications Cloud in the World Icon
    The First VoIP Communications Cloud in the World Icon

    The Smarter Business Phone Solution

    • Powerful Unified Communication Features
    • Fast, Easy, Free Setup & Install
    • Trusted by 47,000+ Companies in 100 Countries
  • Rose Crypt

    Rose Crypt provides users with a simplistic application that can be used for encrypting files in your computer using a custom passphrase. With its minimal design, Rose Crypt can be used by both advanced and beginner users. Once the encryption process is finished, you can access the newly created file from the location you previously selected.

    Downloads: 5 This Week Last Update: See Project
  • TorVM

    A VM for using Tor

    Preconfigured Debian Virtual Machine for use with Tor. Features: - Newest available tor version. - Iptables-script for tunneling all traffic through Tor. - Preconfigured MATE desktop environment.

    Downloads: 5 This Week Last Update: See Project
  • ckpass

    An ncurses based password database client that is compatible with KeePass 1.x format databases.

    Downloads: 5 This Week Last Update: See Project
  • ConvertShellCode

    Disassemble Shellcode.

    ConvertShellcode takes Shellcode as input and disassemble it in a list of instructions in assembly language. This is a CLI tool. Supported formats: - "\xEB\x08\xBA\x4D\x11\x86\x7C\xFF\xD2\xCC\xE8\xF3\xFF\xFF\xFF\x63" - "%uc92b%ue983%ud9eb%ud9ee%u2474%u5bf4%u7381%u1313%u2989" - "%40%6E%40%6E%40%6E%40%6E%40%6E%40%6E%40%6E%40%6E%97%6E%40" - "%u9090" - "\u9090" - "&#x9090" Also take a look at: - -

    Downloads: 4 This Week Last Update: See Project
  • PassKey Icon


    Universal password generator. This program generates password for each account you want from hostname, username and one global password (passkey, master password, skeleton key). So you need to remember only one password.

    Downloads: 4 This Week Last Update: See Project
  • Pwn Plug Elite Icon

    Pwn Plug Elite

    Pwnie Express Pwn Plug Elite image for stock Sheevaplugs

  • SteganoImage Icon


    Utility for embedding hidden data into PNG files

    Downloads: 4 This Week Last Update: See Project
  • TinySecuritySuite Icon


    A simple pack of security softwares such as Folder Hidder, Encryption.

    Tiny Security Suite is a simple collection of portable security tools that are essentials. It consist of Clamwin Antivrius, PAPI Firewall, and the developer own Folder Hidder (like IOBit Protected Folder), AES File encryption and a simple file shredder. Note, this release is still under beta version, so use it at your own risk. The goal of this project is to create lightweight, simple to use but useful security softwares. All softwares, except Clamwin antivirus and PAPI Firewall and the icons (from wikimedia), are licensed under GNU LGPL license.

    Downloads: 4 This Week Last Update: See Project
  • codeZ

    A program to en/decrypt texts that are only crackable using bruteforce

    codeZ is a program that can encrypt/decrypt texts that are not crackable without using brute-force attacks. It supports loads of characters, including symbols like brackets.

    Downloads: 4 This Week Last Update: See Project
  • AES256 Password managery Russian version

    Simple password manager in Russian

    Simple password manager that uses encryption AES 256. Translated into Russian. AES256 Password Manager (originally Encrypter) decoder is a text file that stores the passwords or other sensitive data is completely secure manner using encryption algorithm AES 256-bit. Official page http://xn--90abhbolvbbfgb9aje4m.xn--p1ai/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D0%B0%D1%80%D0%BE%D0%BB%D0%B8/aes256-password-manager-%D0%BF%D1%80%D0%BE%D1%81%D1%82%D0%BE%D0%B9-%D0%BC%D0%B5%D0%BD%D0%B5%D0%B4%D0%B6%D0%B5%D1%80-%D0%BF%D0%B0%D1%80%D0%BE%D0%BB%D0%B5%D0%B9.html Autor twitter:

  • DeepDigest Icon


    A file integrity checker. Similar to hashdeep but in a GUI.

    DeepDigest is a file integrity checker. It calculates hash values for selected files and allows the files to be verified against those values. Its GUI interface provides several features not found in similar programs. Roughly speaking, DeepDigest is a GUI version of md5deep/sha1deep/sha256deep. To use DeepDigest, a user first creates a "job". This specifies the directory to be hashed and the hash algorithm to be used (MD5, SHA-1 or SHA-256). The results of a job run are saved to an archive file. Subsequent runs of the job are compared to this archive to determine which files have changed. New, deleted, renamed or moved files are also reported. The results view may be sorted, filtered and searched. Results may be exported in csv format or to another installation of DeepDigest. DeepDigest may be run from the command line and from scripts. The name of the job to be run is passed as a command line argument. DeepDigest is written in C++ and uses the Qt libraries.

  • Pentest Orchestrator Icon

    Pentest Orchestrator

    Sistema de gestión para pruebas de penetración, ofrece una plataforma para ejecutar herramientas de línea de comandos, salvar resultados en una base de datos, realizar búsquedas usando expresiones regulares, impresion de informes y mucho mas.

  • ProcessMemoryDumper

    Process Memory Dumper it's developed for IT Consultants IT Security Consultants that need to dump the entire memory of a process and/or save informations about all running processes and modules. It's developed in C++ using MFC

  • Restrict Application

    Easy to use parental control

    Restrict Application is powerful parental control software that can easily block adult content or any other site, game or software. Restrict Application can be set to update it's configuration from remote server allowing to update configuration simultaneously on large number of computers. This software has also built-in remote control which can be used to pause or turn off this software from other computer.

  • SES Super-Encypherment Scrambler Icon

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to efficiently cipher text of arbitrary length or files of any size or type. Use it with confidence. To achieve complete one-on-one privacy, SES traverses several levels en route to its output. The more words in your key-phrase, the more layers of encipherment SES applies. It is part Vigenere, part onetime pad, part cryptographic hash, not to mention the essential scrambler element, each component driven by ISAAC, with all key-derivation and stretching relying on Keccak in 512-bit configuration.

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you