Security & Utilities Software

OS OS

    • More...
  • More...
    • More...
    • More...
    • More...

Category Category

    • More...
    • More...
    • More...
    • More...
      • More...
    • More...
    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

    • More...
  • More...
    • More...

Database Environment Database Environment

    • More...
    • More...

Freshness Freshness

Security & Utilities Software

  • Microsoft Office 365 monitoring simplified Microsoft Office 365 monitoring simplified Icon
    Microsoft Office 365 monitoring simplified Icon

    Monitor your Office 365® (O365) Exchange™ mailboxes and system applications with the SolarWinds® Server & Application Monitor unified platform.

    SolarWinds Server & Application Monitor allows you to monitor your hybrid IT applications and systems. Monitor Microsoft® Office 365 Exchange side by side on your on-premises Exchange server and other applications. Check, track, and report on O365 user/shared mailbox growth, users over quota, archived mailboxes, inactive mailboxes, mobile device, mailbox groups, and more. You can also monitor Microsoft portal access to help ensure you’re meeting your SLAs.
  • Monitor your Cisco ASA like an expert Monitor your Cisco ASA like an expert Icon
    Monitor your Cisco ASA like an expert Icon

    See how Network Insight™ for Cisco® ASA, a feature of SolarWinds Network Performance Monitor and Network Configuration Manager, can help.

    Get visibility into the health and performance of your entire Cisco ASA environment in a single dashboard. View VPN tunnel status and monitor firewall high availability, health, and readiness. Automatically discover and filter within ACLs, show rule hit counts, and detect shadow and redundant rules. Automate the monitoring and management of your ASA infrastructure in a fully integrated solution. Try it free for 30 days!
  • iAlertU Icon

    iAlertU

    An alarm for your MacBook.

    iAlertU is an alarm system for your Apple MacBook that uses the built in motion detection to trigger the alarm and the iSight to capture the image of the thief. Among many other features, it incorporates the ability for users with iPhone, iPad, or iPod Touch to connect to and control iAlertU remotely.

  • WepCrackGui

    Gui for aircrack-ng that can crack WEP and WPA networks, automatically scans for available networks, provides fake authentication and injection support.

  • wipe - Secure data destruction

    Wipe is a file and block device wiping utility. It is based on work by Peter Gutmann.

  • Peach Fuzzer Community Edition

    Cross-platform smart fuzzer

    Peach Community 3 is a cross-platform fuzzer capable of performing both dumb and smart fuzzing. Peach includes a robust monitoring system allowing for fault detection, data collection, and automation of the fuzzing environment. Peach does not target one specific class of target, making it adaptable to fuzz any form of data consumer. Peach is commonly used to fuzz file formats, network protocols, and APIs. With targets ranging from web browsers and network services through mobile devices, industrial control systems (SCADA) and even down at the silicon level. All features of Peach are designed to be easily extended. This include mutation algorithms, data types, I/O adapters, monitoring modules, etc. Extensions to Peach are typically written in the C# language as assembly modules that are identified through reflection. Peach has been in active development since 2004. The first version of Peach was written while drinking beer at PH-Neutral in Berlin.

    Downloads: 213 This Week Last Update: See Project
  • SIM Card Manager Icon

    SIM Card Manager

    Windows tool to read SIM card information and content

    SIMCardManager is Windows tool that can read a SIM card information (ICCID, IMSI, Pin states) and SIM card content : phone book (ADN), Fixed dialing (FDN) and SMS messages. It also enables you to authenticate with PIN when activated and export SIM card content to text files. You need to have a PC/SC compatible smart card reader or dongle with SIM slot. You can find other useful tools on my website http://www.idrix.fr

    Downloads: 213 This Week Last Update: See Project
  • WhatsUp® Gold - Start A Free 30-Day Trial WhatsUp® Gold - Start A Free 30-Day Trial Icon
    WhatsUp® Gold - Start A Free 30-Day Trial Icon

    All-in-one monitoring of your entire infrastructure with the industry's most user friendly pricing. Free trial of our award-winning software

    If you are like the rest of our user community, your IT team is busy. With pressure to deliver on-time projects, you don’t have a lot of time to spend making your management tools work. You need network monitoring tools that work for you. You want tools that makes it easy to find performance issues before your users do and resolve them before they impact the business. That’s why tens of thousands of customers around the world love WhatsUp Gold.
    1/2
    How many devices do you monitor on your company's network?
    2/2
    One last question before you visit our site:

    When do you plan to purchase a network performance monitoring solution?
  • Mouse Lock Icon

    Mouse Lock

    Locks your computer and see if anyone was trying to guess the password

    Feel like locking your mouse when you are away? Well... you can! Mouse Lock dims your desktop (or set to solid black background) while sucking your mouse cursor to the centre of the screen! The password window also acts like an inescapable mouse trap. Neat! (No mouse is harmed during the production of this software.) If you encounter any bugs, please contact me wongchoonjie (at) gmail (dot) com If you really like Mouse Lock, please consider donating ;) http://www.misc314.com/blog/donation/ Thanks!

  • xboxhdm2

    Port of xboxhdm to support USB booting

  • PuTTY for Symbian OS

    PuTTY SSH client for Symbian OS

  • burpsuite pro version 1.7.31 Icon

    burpsuite pro version 1.7.31

    Burpsuite pro v1.7.31 [Cracked]

    The BurpSuite pro version 1.7.31 cracked and ready for use. Most of web application analyzers use this application to check the security issues of their websites or even the white hat hackers who are looking for a bug to submit on BugBounties so its logical to use this cracked version to gain more tools at your penetration testing.

  • Genode OS Framework Icon

    Genode OS Framework

    Tool kit for building highly secure special-purpose operating systems

    The Genode OS Framework is a tool kit for building highly secure special-purpose operating systems. It scales from embedded systems with as little as 4 MB of memory to highly dynamic general-purpose workloads. Genode is based on a recursive system structure. Each program runs in a dedicated sandbox and gets granted only those access rights and resources that are needed for its specific purpose. Programs can create and manage sub-sandboxes out of their own resources, thereby forming hierarchies where policies can be applied at each level. The framework provides mechanisms to let programs communicate with each other and trade their resources, but only in strictly-defined manners. Thanks to this rigid regime, the attack surface of security-critical functions can be reduced by orders of magnitude compared to contemporary operating systems.

  • Any Platform Anywhere: The Best Workflow Software Any Platform Anywhere: The Best Workflow Software Icon
    Any Platform Anywhere: The Best Workflow Software Icon

    Empower employees to improve their productivity with nocode process automation tools.

    Most people intuitively understand how workflows can streamline and speed up their business processes, integrate systems and route content to the right people. While every business has different needs, requirements and goals, workflow automation can help everyone. Whether you’re a company of 500 or 5,000, based in the cloud or on-premises, workflow automation can help maximize the efficiency of your business processes.
  • JOSSO

    Atricore’s JOSSO is an open source and commercially supported Internet Single Sign-On (FSSO) solution for point-and-click and standards-based (SAML2) Internet-scale SSO implementations. For more information contact us at : http://www.josso.org

  • LAMPSecurity Training

    LAMPSecurity training is designed to be a series of vulnerable virtual machine images along with complementary documentation designed to teach linux,apache,php,mysql security.

  • The Nemesis Project

    The Nemesis Project is designed to be a command line based, portable human IP stack for UNIX-like and Windows systems. The suite is broken down by protocol, and should allow for useful scripting of injected packets from simple shell scripts.

  • Rinzler USB Cleaner Icon

    Rinzler USB Cleaner

    V2.0-Unhides Folder/Files,removes malicious scripts from USB Drive

    V2.0 (30th Dec 2014). It is a USB Malware Cleaner. This is a small tool that removes malicious scripts created by virus or malware, unhides folder and files, deletes all shortcut from selected drive. Also disables autorun completely and provides option to enable registry, folder options and task manager. Visit the project website for more information.

  • LKL Linux KeyLogger

    LKL is a userspace keylogger that runs under Linux on the x86 arch. LKL logs everything that passes through the hardware keyboard port (0x60). It translates keycodes to ASCII with a keymap file.

  • Paros

    A Java based HTTP/HTTPS proxy for assessing web application vulnerability. It supports editing/viewing HTTP messages on-the-fly. Other featuers include spiders, client certificate, proxy-chaining, intelligent scanning for XSS and SQL injections etc.

  • Trusted Boot

    Trusted Boot (tboot) is an open source, pre- kernel/VMM module that uses Intel(R) Trusted Execution Technology (Intel(R) TXT) to perform a measured and verified launch of an OS kernel/VMM. mercurial repo: http://hg.code.sf.net/p/tboot/code.

  • pam-mysql

    This is a module that allows PAM aware applications to authenticate users through a MySQL database. Now configurable in terms of which host the database reside upon, which table and username and password column to interrogate.

  • Fsum frontend

    Fsum Frontend is a files integrity checker. It can calculate 96 hash and checksum algorithms(CRC32, MD5, SHA1, SHA2, ADLER, DHA256, FORK256, ...). You can verify your files using a .sfv/.md5/.sha1/.sha2 file or create your own checksum file.

  • EIDAuthentication

    Allow the use of ALL smart cards (including EID or DoD smart card) to logon on Windows Vista & later on stand alone computer. This solution doesn't need an Active Directory. Please look at the projet homepage to see a list of smart cards tested.

  • Tray TOTP Plugin for KeePass2 Icon

    Tray TOTP Plugin for KeePass2

    Plugin adding TOTP to KeePass2 tray menu, entry list and auto-type.

    Time based One Time Password Plugin to enable 2 step authentification (supports Google and Dropbox) by generating TOTPs from the KeePass tray icon. This plugin also provides a custom column to display and/or generate TOTP's. Auto-Type is also supported when the specified custom field is used in a keystroke sequence. This plugin requires KeePass 2.21 as it uses features that are not available in earlier versions.

  • Libnids - NIDS E-component library

    Libnids - NIDS E-component, based on Linux kernel. This library provides IP defragmentation, TCP reassembly and port scan detection.

  • Untangle Icon

    Untangle

    Untangle is a Linux-based network gateway with pluggable modules for network applications like spam blocking, web filtering, anti-virus, anti-spyware, intrusion prevention, bandwidth control, captive portal, VPN, firewall, and more. Visit http://untangle.com

  • Keynote

    Tabbed notebook with RichText editor, multi-level notes and strong encryption

  • Web Application Protection Icon

    Web Application Protection

    Tool to detect and correct vulnerabilities in PHP web applications

    WAP automatic detects and corrects input validation vulnerabilities in web applications written in PHP Language (version 4.0 or higher) and with a low rate of false positives. WAP detects the following vulnerabilities: - SQL injection using MySQL, PostgreSQL and DB2 DBMS - Reflected cross-site scripting (XSS) - Stored XSS - Remote file inclusion - Local file inclusion - Directory traversal - Source code disclosure - OS command injection - PHP code injection WAP is a static analysis tool that performs taint analysis to detect vulnerabilities, tracking malicious users inputs and checking if they reach calls of sensitive functions. It has a low rate of false positives because has implemented a data mining module to predict false positives when detects vulnerabilities. The output of the tool is: - shows the vulnerabilities found and how they are corrected - new files with the corrections

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you