Security & Utilities Software

OS OS

  • More...

Category Category

License License

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...

User Interface User Interface

  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • WhatsUp® Gold - Start A Free 30-Day Trial WhatsUp® Gold - Start A Free 30-Day Trial Icon
    WhatsUp® Gold - Start A Free 30-Day Trial Icon

    All-in-one monitoring of your entire infrastructure with the industry's most user friendly pricing. Free trial of our award-winning software

    If you are like the rest of our user community, your IT team is busy. With pressure to deliver on-time projects, you don’t have a lot of time to spend making your management tools work. You need network monitoring tools that work for you. You want tools that makes it easy to find performance issues before your users do and resolve them before they impact the business. That’s why tens of thousands of customers around the world love WhatsUp Gold.
    1/2
    How many devices do you monitor on your company's network?
    2/2
    One last question before you visit our site:

    When do you plan to purchase a network performance monitoring solution?
  • Any Platform Anywhere: The Best Workflow Software Any Platform Anywhere: The Best Workflow Software Icon
    Any Platform Anywhere: The Best Workflow Software Icon

    Empower employees to improve their productivity with nocode process automation tools.

    Most people intuitively understand how workflows can streamline and speed up their business processes, integrate systems and route content to the right people. While every business has different needs, requirements and goals, workflow automation can help everyone. Whether you’re a company of 500 or 5,000, based in the cloud or on-premises, workflow automation can help maximize the efficiency of your business processes.
  • Genode OS Framework Icon

    Genode OS Framework

    Tool kit for building highly secure special-purpose operating systems

    The Genode OS Framework is a tool kit for building highly secure special-purpose operating systems. It scales from embedded systems with as little as 4 MB of memory to highly dynamic general-purpose workloads. Genode is based on a recursive system structure. Each program runs in a dedicated sandbox and gets granted only those access rights and resources that are needed for its specific purpose. Programs can create and manage sub-sandboxes out of their own resources, thereby forming hierarchies where policies can be applied at each level. The framework provides mechanisms to let programs communicate with each other and trade their resources, but only in strictly-defined manners. Thanks to this rigid regime, the attack surface of security-critical functions can be reduced by orders of magnitude compared to contemporary operating systems.

  • KeyChest Icon

    KeyChest

    Dashboard and planner for Let's Encrypt and other SSL certificates

    Check, track, and plan your SSL certificates for 100% HTTPS uptime KeyChest is FREE. KeyChest is the tool you need to stay on top of all your certificates. Plan your renewals, get your weekly summary and present your certificate performance indicators (KPIs) to your boss. KeyChest has been designed and developed as a tool to help with minimum effort so it can automatically detect new servers without you doing anything.

    Downloads: 0 This Week Last Update: See Project
  • sanesigner

    sanesigner is a high level digital signature api component. it support generating and verifying digital signatures as well as encryption and decryption using public keys, and lots of other features in between.

    Downloads: 0 This Week Last Update: See Project
  • Papercrypt Icon

    Papercrypt

    This project aims at porting visual cryptography, which only works with transparent slides, to ordinary 80g/m^2 white paper. Please read the documentation before using the program.

  • J.L Antivirus Icon

    J.L Antivirus

    J.L antivirus is a free antivirus with Real-Time protection, powerful scanner and big database. Created in VB.NET +WARNING+ This AV is not for everyday use, so I dont responsible for risks and threats.

  • Microsoft Office 365 monitoring simplified Microsoft Office 365 monitoring simplified Icon
    Microsoft Office 365 monitoring simplified Icon

    Monitor your Office 365® (O365) Exchange™ mailboxes and system applications with the SolarWinds® Server & Application Monitor unified platform.

    SolarWinds Server & Application Monitor allows you to monitor your hybrid IT applications and systems. Monitor Microsoft® Office 365 Exchange side by side on your on-premises Exchange server and other applications. Check, track, and report on O365 user/shared mailbox growth, users over quota, archived mailboxes, inactive mailboxes, mobile device, mailbox groups, and more. You can also monitor Microsoft portal access to help ensure you’re meeting your SLAs.
  • Binary Cyber Cannon

    Binary Cyber Cannon is an open source network attack tool for Windows written in C++ with the interface written in C#.

    Downloads: 3 This Week Last Update: See Project
  • Downloads: 0 This Week Last Update: See Project
  • KarinAV

    Proyecto destinado a la proteccion de codigos maliciosos, virus, spyware, adaware y otros, con escaneo de primer y segundo plano y facil de utilizar.

    Downloads: 0 This Week Last Update: See Project
  • Ultimate Windows Anti Malware

    The ultimate anti-malware application for windows. This open source project includes real time protection as well as automatic updates and scanning/removing capabilities.

  • Knock to Windows Icon

    Knock to Windows

    Knock Code for Windows - While Screen On

    Knock to Windows is a tool who lock your desktop and protect your files. Just set pattern and that's all. No need to remember difficult password. It's a great alternative for stock Windows password lock. Beta Changes: https://sourceforge.net/p/knocktowindows/tickets/2/ If you liked my project you can donate with Bitcoins: http://goo.gl/ZYMTX7

    Downloads: 0 This Week Last Update: See Project
  • Monitor your Cisco ASA like an expert Monitor your Cisco ASA like an expert Icon
    Monitor your Cisco ASA like an expert Icon

    See how Network Insight™ for Cisco® ASA, a feature of SolarWinds Network Performance Monitor and Network Configuration Manager, can help.

    Get visibility into the health and performance of your entire Cisco ASA environment in a single dashboard. View VPN tunnel status and monitor firewall high availability, health, and readiness. Automatically discover and filter within ACLs, show rule hit counts, and detect shadow and redundant rules. Automate the monitoring and management of your ASA infrastructure in a fully integrated solution. Try it free for 30 days!
  • Open eSign

    Open eSign allows software developers and technical parties in a company to create secure, online (web-based) forms and documents that follow a business process flow and enable legally recognized electronic signatures using digital signature technology.

    Downloads: 0 This Week Last Update: See Project
  • Keeper of Secrets

    Keeper of Secrets is a web-based multi-user password safe. It is meant to be used by small to medium sized organizations (or individuals who like to operate their own web server ;)). Of course KoS stores all the passwords in encrypted form.

    Downloads: 0 This Week Last Update: See Project
  • Cryptos

    A very simple encryption tool. Includes: 1. Ability to encrypt files and text using the Blowfish algorithm 2. Encode files and text using Base 64 algorithm, 3. ROT13 4. Calculation of MD5 digests

    Downloads: 0 This Week Last Update: See Project
  • ittru

    Software solution for creation and verification of digitral signatures. Can replace tokens and smart cards with mobile phones. Components included are client and server. Can creates, verifiy and store content and signatures. Offers secure sharing.

  • PHP Login Without MySql

    This simple script is used to make an easy login script without the need for MySql! Perfect for admin accounts, etc.

    Downloads: 9 This Week Last Update: See Project
  • privacyidea Icon

    privacyidea

    two factor authentication management system

    privacyIDEA is a management and authentication system for two factor authentication. You can use OTP tokens, OTP cards, SMS, Smartphone Apps to incorparte the second factor. It can even manage SSH keys and supports Offline OTP. The latest version can manage and enroll user certificates. Its modular design makes it easily enhancable. It runs on Linux. Applications and workflows can be connected to privacyIDEA hence enabling two factor authentication in your system logon, web applications, SSL VPNs, firewalls and many more. A detailed audit log gives you full control of what happens when, where (why? ;-) and by whom. A demo site is available at demo.privacyidea.org.

    Downloads: 0 This Week Last Update: See Project
  • BRST - Border Router Security Tool

    The BRST - Border Router Security Tool is a web based utility for generating secure configuration files for Cisco routers in a border configuration. The administrator fills out a web form, clicks submit, and receives a router config file.

    Downloads: 2 This Week Last Update: See Project
  • MiDicc Icon

    MiDicc

    Generador de diccionarios de ataque multi-plataforma y parametrizable

    Realice su propio diccionario de ataque, usando caracteres personalizables y con longitud de palabra fija, generando todas las combinaciones que puedan existir.

    Downloads: 0 This Week Last Update: See Project
  • Vijner 974 Encryption System

    Vijner 974 E-Sys (2048 bits and unlimited encryption). Enables easy (un-)encryption from text input or .txt file, and to (un-)encrypt raw files, with Vigenère Algorithm + unlimited encryption keys. Simple and powerful. Adapt to fit your needs.

    Downloads: 1 This Week Last Update: See Project
  • PAM Password Escrow

    Linux-PAM module plus PostgreSQL stored procedures to capture and store encrypted passwords. Intended to facilitate migration of credentials to different authentication systems. Use subversion (see 'Code' tab) to download project source code.

    Downloads: 0 This Week Last Update: See Project
  • ciphermail Icon

    ciphermail

    Ciphermail email encryption gateway (S/MIME, OpenPGP, PDF encryption)

    is a standards based centrally managed email server (MTA) that encrypts and decrypts your incoming and outgoing email at the gateway level. Ciphermail Email Encryption Gateway is compatible with any existing email infrastructure like Microsoft Exchange and Lotus Notes and has support for S/MIME, OpenPGP and PDF encryption. Ciphermail Email Encryption Gateway has a built-in CA which can be used to issue X.509 certificates for internal and external users. For additional security, keys can be securely generated and stored in a tamper proof Hardware Security Module (HSM). The built-in Data Leak Prevention (DLP) module can be used to prevent certain information to leave the organization via email. Ciphermail can be installed on most Linux and Unix based systems. Installation packages are available for Ubuntu, Debian, Red Hat/CentOS and OpenSUSE. A ready to run virtual appliance for VMware and Hyper-V is available.

    Downloads: 0 This Week Last Update: See Project
  • Open AS Communication Gateway

    An open, all-in-one SMTP gateway, scanning your email traffic in order to prevent spam and viruses, using several anti-spam technologies. Based on Ubuntu Server.

    Downloads: 0 This Week Last Update: See Project
  • HexaFind Icon

    HexaFind

    HexaFind - The Unix & Linux network attack tool detection project.

    The continued and growing trend of the frequency and severity of network attacks against corporations, private individuals in addition to countries has prompted the development of network attack detection tools. In order to defend against threats – security is not only required in a pre-emptive scenario, but also ex post facto; whereby the criminal/ civil act has been detected and the acquisition of evidence has begun in order to provide a conviction. This project and its scripted application have been created in response to these escalating movements towards network vulnerability enumeration and distributed denial of service attacks (DDoS). There is a clear lack of network attack tool detection products for the Linux/ UNIX operating system, and therefore this project should also address this imbalance. Within society, the UNIX / Linux operating system makes up an extremely minute fraction of operating systems that are in use within the world of today

    Downloads: 1 This Week Last Update: See Project
  • Distributed WPA PSK auditor

    This is a community effort to study and improve security of WPA protected WiFi networks.

    Downloads: 0 This Week Last Update: See Project
  • Digital signing using a Smart Card

    Java code that enables you to sign documents using a smart card.

    With this library, you'll be able to access a smart card and extract its information. If the smart card contains a key store, you can use it to create digital signatures. This library currently implements signing of PDF documents using the Belgian eID.

  • Previous
  • You're on page 1
  • 2
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you