Security & Utilities Software

OS OS

  • More...

Category Category

License License

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...

User Interface User Interface

  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • Microsoft Office 365 monitoring simplified Microsoft Office 365 monitoring simplified Icon
    Microsoft Office 365 monitoring simplified Icon

    Monitor your Office 365® (O365) Exchange™ mailboxes and system applications with the SolarWinds® Server & Application Monitor unified platform.

    SolarWinds Server & Application Monitor allows you to monitor your hybrid IT applications and systems. Monitor Microsoft® Office 365 Exchange side by side on your on-premises Exchange server and other applications. Check, track, and report on O365 user/shared mailbox growth, users over quota, archived mailboxes, inactive mailboxes, mobile device, mailbox groups, and more. You can also monitor Microsoft portal access to help ensure you’re meeting your SLAs.
  • Monitor your Cisco ASA like an expert Monitor your Cisco ASA like an expert Icon
    Monitor your Cisco ASA like an expert Icon

    See how Network Insight™ for Cisco® ASA, a feature of SolarWinds Network Performance Monitor and Network Configuration Manager, can help.

    Get visibility into the health and performance of your entire Cisco ASA environment in a single dashboard. View VPN tunnel status and monitor firewall high availability, health, and readiness. Automatically discover and filter within ACLs, show rule hit counts, and detect shadow and redundant rules. Automate the monitoring and management of your ASA infrastructure in a fully integrated solution. Try it free for 30 days!
  • Tor Browser Icon

    Tor Browser

    Browser for using Tor on Windows, Mac OS X or Linux

    Tor Browser enables you to use Tor on Windows, Mac OS X, or Linux without needing to install any software. Tor is a software that bounces your communications around a distributed network of relays run by volunteers. This effectively prevents anyone watching your Internet connection from learning what sites you visit; it prevents the sites you visit from learning your physical location; and allows you access to sites which are blocked. Tor Browser can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained (portable).

  • VeraCrypt Icon

    VeraCrypt

    Open source disk encryption with strong security for the Paranoid

    VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data. All released files are PGP signed with key ID=0x54DDD393, available on key servers and downloadable at https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc VeraCrypt can mount TrueCrypt volumes. It also can convert them to VeraCrypt format. Documentation: https://www.veracrypt.fr/en/Documentation.html FAQ : https://www.veracrypt.fr/en/FAQ.html

  • waircut Icon

    waircut

    WPS wireless protocol audit software for Windows

    Wireless Air Cut is a WPS wireless, portable and free network audit software for Ms Windows. It is used to check the security of our wps wireless networks and to detect possible security breaches. You can check if the router has a generic and known wps pin set, if it is vulnerable to a brute-force attack or is vulnerable to a Pixie-Dust attack. You can see the Installation instructions on Wiki. ------- Wireless Air Cut es un software de auditoria del protocolo WPS en redes wireless, portable, libre y gratuito para Ms Windows. Sirve para comprobar la seguridad WPS de nuestras redes wireless y detectar posibles brechas de seguridad. Puede comprobar si el router tiene establecido un pin wps genérico y conocido, si es vulnerable a un ataque por fuerza bruta o si es vulnerable a un ataque Pixie-Dust. Ver Instrucciones de instalación en la wiki. ------- Waircut is distributed under license: Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)

  • Network Grep

    ngrep strives to provide most of GNU grep's common features,applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular expressions to match against data payloads of packets. SUPPORT/REPORTING BUGS: please use https://github.com/jpr5/ngrep/issues Thank you!

  • Base64encoder Icon

    Base64encoder

    Convert files to Base64!

    Simple way to encode files and images in base64... Tutorial: http://www.youtube.com/watch?v=G1cQXnzOwcs

  • WhatsUp® Gold - Start A Free 30-Day Trial WhatsUp® Gold - Start A Free 30-Day Trial Icon
    WhatsUp® Gold - Start A Free 30-Day Trial Icon

    All-in-one monitoring of your entire infrastructure with the industry's most user friendly pricing. Free trial of our award-winning software

    If you are like the rest of our user community, your IT team is busy. With pressure to deliver on-time projects, you don’t have a lot of time to spend making your management tools work. You need network monitoring tools that work for you. You want tools that makes it easy to find performance issues before your users do and resolve them before they impact the business. That’s why tens of thousands of customers around the world love WhatsUp Gold.
    1/2
    How many devices do you monitor on your company's network?
    2/2
    One last question before you visit our site:

    When do you plan to purchase a network performance monitoring solution?
  • RetroShare Icon

    RetroShare

    RetroShare is a cross-platform, secured and decentralized communication system. It lets you to securely chat, share photos, videos, and more with family and friends, using OpenPGP to authenticate peers and OpenSSL to encrypt all communication.

  • CyberGod KSGMPRH Icon

    CyberGod KSGMPRH

    Open-Source antivirus for Windows

    This is an effective tool which is capable of detecting thousands and thousands of malware in your PC, including the shortcut virus to nasty ransomware, The database is regularly updated. See the video for how to use this tool. Version: 1.3 MD5: 707D4BE2AA4547A542A7EEFDB7BC4C4D SHA-1: 899B80928DF59C5745B56480DAA6A51E7F65CB18A4 Source code MD5: 38B3A08D62E7ADD2EE30FCA375207499 IMPORTANT: =========== FULL VERSION : https://sourceforge.net/projects/cybergod-ksgmprh/ NOTE: ===== If this tool has helped you consider supporting it please http://bit.ly/supportCyberGodKSGMPRH via paypal http://bit.ly/CyberGodSecurityDonate

  • Juggernaut v1000 Beta v1.2 Icon

    Juggernaut v1000 Beta v1.2

    Juggernaut v1000 Anti-Cryptography

    Juggernaut v1000 can crack MD4, MD5, MD6, SHA1, SHA256, SHA384, SHA512, HMAC-MD5, HMAC-SHA1 and also all the Base-64 version of them in minutes... but the cracking process depends in your password wordlist/dictionary.

    Downloads: 26 This Week Last Update: See Project
  • Password Keeper + Generator Icon

    Password Keeper + Generator

    Free portable cross-platform multi-user password manager

    Free portable cross-platform multi-user password manager, 100%-pure Java. DB for each pkg-user is encrypted and protected by pkg-user hash. In addition - passwords in DB are stored in encrypted form. In result - stored passwords are double encrypted ! Passwords of pkg-users are not stored in program - stored and compared only hashes. Support md2, md5, sha1, sha256, sha384 and sha512 hash. Support export DB to CSV, HTML, XLS or XML and import from CSV, XLS or XML. Simple and intuitive GUI - Graphical User Interface. PKG use crypto security random generator. Developed with Java Spring Framework. Tested in Windows/Linux. Need Jre-1.8 - http://www.oracle.com/technetwork/java/javase/downloads/jre8-downloads-2133155.html

  • aBLhackPsw Icon

    aBLhackPsw

    aBLhackPsw v6.1 - Password recovery tool

    Now with aBLhackPsw v6.1 you can see the password in x32 and x64 programs !!! aBLhackPsw v6.1 run on Wondows 10 !!! aBLhackPsw is a password recovery tool - utility for recovering forgotten or lost password. With this program you can see asterisks ***** password from ***** fields (Outlook Express, Total Commander (FTP) and other programs). There is no illegal password hacking technique involved, it only reads or uncovers hidden password character that are covered by asterisks. This program don't need to install. You can to write into flash device or the others devices and work with program with the others computers. Multilingual User Interface (English, Lithuanian, Russian) Work on Windows (x32/x64) 98/ME/NT/2000/2003/XP/VISTA/2008/Windows 7/8/10

  • Any Platform Anywhere: The Best Workflow Software Any Platform Anywhere: The Best Workflow Software Icon
    Any Platform Anywhere: The Best Workflow Software Icon

    Empower employees to improve their productivity with nocode process automation tools.

    Most people intuitively understand how workflows can streamline and speed up their business processes, integrate systems and route content to the right people. While every business has different needs, requirements and goals, workflow automation can help everyone. Whether you’re a company of 500 or 5,000, based in the cloud or on-premises, workflow automation can help maximize the efficiency of your business processes.
  • QR-CERT. Free PKI Certificate Authority Icon

    QR-CERT. Free PKI Certificate Authority

    PKI & Card Management System to issue and manage tokens & certificates

    The QR-CERT software is a specialized package of applications dedicated for the development of a Public Key Infrastructure system as well as the cards personalization and management system. The software contains a number of functional modules, enabling a flexible selection of functionalities for implementation. The software is dedicated for large organizations and corporate environments, with a PKI infrastructure and microprocessor cards. The QR-CERT is a solution both for the companies which plan to build their own PKI infrastructure and entities planning to provide services in this respect. This software enables the implementation of advanced security mechanisms, such as: secure e-mail (S/MIME), electronic signature (PKCS#7, XAdES), network transmission protection (IPSEC, SSL/TLS) and strong authentication for service portals (HTTPS) or strong authentication of users for the Windows ActiveDirectory domain.

    Downloads: 5 This Week Last Update: See Project
  • foo crypt

    foo crypt, A Tale of cynical cyclical encryption.

    Downloads: 3 This Week Last Update: See Project
  • G Security Icon

    G Security

    A smart, secure, advance and easy to use desktop locker for Windows.

    G Security is an easy to use Desktop locker/Screen locker developed for Microsoft Windows. It allows a user to securely lock down Windows in such a way that it cannot be accessed by an unauthorized user. G Security is light weight and easy to use with a highly user friendly interface. It prevents anyone from accessing your computer when its locked down so that your private data stored on the computer cannot be accessed by anyone. It completely locks down your computer so that even if someone gets a hold of your computer, he or she can do nothing on it. It can lock down your computer on start up as well as any time you want just by pressing some keys. Once the computer is locked down shortcut keys will not work at all. The Ctrl+Alt+Del screen will also be secured in such a way that no one can unlock you computer without correct password. Any running application will also be prevented from messing up with the locked computer. It can be used by multiple users at a time. #Malik Usman Aura

    Downloads: 2 This Week Last Update: See Project
  • PCNetMonitor Icon

    PCNetMonitor

    Computer performance display and logging program

    Local and remote computer performance display and logging program with Excel plotting interface and many other powerful features.

    Downloads: 1 This Week Last Update: See Project
  • Downloads: 0 This Week Last Update: See Project
  • IPRARU Icon

    IPRARU

    Computer security tool for the information gathering stage

    Computer security tool for the information gathering stage, obtaining the IP address through redirection and social engineering.

    Downloads: 0 This Week Last Update: See Project
  • Inscribe | Data Security and Privacy Icon

    Inscribe | Data Security and Privacy

    Inscribe is a easiest tool to encrypt your valuble data from everyone

    Make your data encrypted in a few clicks! Inscribe by Crypto Ststems helps you cut down development time by providing you with a flexible data encryptor interface. Inscribe is one of the easiest data encryptor tools available today. It also gives you the freedom to encrypt as much data as you like given the fact that it is a desktop app.

  • Luigi Usai Process exTerminator Icon

    Luigi Usai Process exTerminator

    Process exTerminator in vbs to terminate bad processes

    Process exTerminator in vbs to terminate bad processes. Just substitute the exe names with those you need to remove. "Process exTerminator" (è il sistema che uso per poter accedere alla macchina e ripulire dal virus installando avg 2012) per ripulire i computers infetti dal virus della "GDF" e della "PDS": ultimamente girano virus che chiedono il pagamento di 100 euro in cambio dello sblocco del computer. Fingono che il computer sia stato bloccato dalla Guardia di Finanza o dalla Polizia di Stato. Per far questo aprono Internet Explorer a tutto schermo ed avviano uno sniffer dell'input della tastiera. Questo file l'ho creato per mio uso e consumo, per ripulire i computer infetti da questo ultimo tipo di virus: AVG 2011 infatti non riconosce questo virus nemmeno con le ultime definizioni, ma solo nella versione 2012 patchata. Il file, immesso nell'esecuzione automatica, permette di accedere alla macchina terminando i processi infetti e/o bloccanti. Espandibile.

  • Pcsafer Icon

    Pcsafer

    PC Security software

    PCsafer is an antivirus,antispyware and firewall

  • The Encode

    Encode your text files

    This software is intended to encode your text files efficiently. You can decode them later using the same algorithm you used to encode it. Encode is professionalism packed simply and freely. You can use Encode for any non-illegal purposes. You can make any number of copies and redistribute Encode as it is.

    Downloads: 0 This Week Last Update: See Project
  • rftfun Icon

    rftfun

    reliable filetransfer for unreliable networks

    A Java client/server application for filetransfer over unreliable networks. This project started as a diploma-project and after its release, we are proud to make it publicy available.

  • TitanLock File/Folder Locker Icon

    TitanLock File/Folder Locker

    A file & folder locker app for Windows, Mac & Linux. Download now

    Simple. Ridiculously secure; our mantra. TitanLock is a file & folder locker application for Windows, Mac & Linux. No installation needed. Just download and run.

  • Previous
  • You're on page 1
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you