Security & Utilities Software

OS OS

    • More...
  • More...
    • More...
    • More...
    • More...

Category Category

    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...

User Interface User Interface

    • More...
  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • See the Top 5 Processes in each line of business See the Top 5 Processes in each line of business Icon
    See the Top 5 Processes in each line of business Icon

    Improve your workflow by getting familiar with how Intelligent Process Automation eliminates busywork across multiple departments.

    Process inefficiencies are a drain on any business, no matter how big or small, so speeding up your workflow is an absolute essential. Download the FREE Top 5 Process guides to better understand how workflow automation looks within each line of business like IT, Sales, Finance, and Human Resources. Remember, just because you’ve established a process within your organization or department, it doesn’t mean that it’s working as well as it could be.
  • Tor Browser Icon

    Tor Browser

    Browser for using Tor on Windows, Mac OS X or Linux

    Tor Browser enables you to use Tor on Windows, Mac OS X, or Linux without needing to install any software. Tor is a software that bounces your communications around a distributed network of relays run by volunteers. This effectively prevents anyone watching your Internet connection from learning what sites you visit; it prevents the sites you visit from learning your physical location; and allows you access to sites which are blocked. Tor Browser can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained (portable).

  • VeraCrypt Icon

    VeraCrypt

    Open source disk encryption with strong security for the Paranoid

    VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data. All released files are PGP signed with key ID=0x54DDD393, available on key servers and downloadable at https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc VeraCrypt can mount TrueCrypt volumes. It also can convert them to VeraCrypt format. Documentation: https://www.veracrypt.fr/en/Documentation.html FAQ : https://www.veracrypt.fr/en/FAQ.html

  • PortableSigner Icon

    PortableSigner

    PortableSigner is a tool for digital signing (with X.509 certificates) of PDF files

  • RetroShare Icon

    RetroShare

    RetroShare is a cross-platform, secured and decentralized communication system. It lets you to securely chat, share photos, videos, and more with family and friends, using OpenPGP to authenticate peers and OpenSSL to encrypt all communication.

  • WiKID Strong Authentication System Icon

    WiKID Strong Authentication System

    Two-factor authentication system

    The WiKID Strong Authentication System is a public-key based two-factor authentication system. It is a flexible, extensible, and secure alternative to tokens, certs and passwords. Application & API support exists for Java, ASP, PHP, Ruby, OpenVPN, TACACS+, etc. Read our eGuide on how to setup your network with two-factor authentication: http://www.wikidsystems.com/learn-more/two-factor-authentication-white-papers

  • SOMAP.org

    Security Officers Management and Analysis Project (SOMAP) is all about defining security management work methods and supplying Security Officers with tools to do their job more efficient and following standards easily.

    Downloads: 31 This Week Last Update: See Project
  • yaSSL

    yaSSL, or yet another SSL, is an embedded ssl library for programmers building security functionality into their applications and devices. yaSSL is highly portable, and runs on standard as well as embedded platforms(QNX, ThreadX, VxWorks, Tron) yaSSL is still available but no longer being developed. Current development on the same project continues under wolfSSL. Visit yaSSL Home above for the latest stable release.

  • Open StreamSec Tools 2.1.x

    StreamSec Tools 2.1 is collection of cryptographic security related components, classes and routines for the Borland (R) Delphi (TM) development environment. The product includes modular clean room implementations of SSL/TLS, S/MIME and X.509.

    Downloads: 14 This Week Last Update: See Project
  • CryptoPy

    CryptoPy is a pure python implmentation of cryptographic algorithms and applications. The algorithms are developed for readability more than speed. The collection now includes IEEE 802.11i specific algorithms that generated the test vectors for 802.11i.

  • DMZS-Biatchux Bootable CD Distro

    Bootable CD Forensics/Virus Scanning/Recovery/PenTesting platform

    Downloads: 10 This Week Last Update: See Project
  • Caditor

    Caditor is a portable tabbed text editor featuring encryption, syntax highlighting, autocomplete, line numbering and a functional plugin system.

  • Automated Security Tools

    Automated Security Tools (autosec) aims to provide automatic tools which network administrators may use to help check and test the security of their network.

    Downloads: 4 This Week Last Update: See Project
  • GNet Server

    GNet Server - Network compression client/server software. Compresses data over slow networks to save on the cost of bandwidth. Server is developed for Unix and Windows platforms, The client will run on Windows based PCs.

    Downloads: 4 This Week Last Update: See Project
  • libtnc

    OS independent implementation of the Trusted Network Connect (TNC) specification from Trusted Computing Group (TCG). Functions for loading and communicating with TNC plugins, sample IMC and IMV plugins, TNCCS-XML support on Windows, Linux, Mac, *BSD

    Downloads: 3 This Week Last Update: See Project
  • MagNet

    Fully packaged linux distribution to provide internet access and resource management to small and medium companies.

    Downloads: 1 This Week Last Update: See Project
  • Odyssi PKI

    Odyssi PKI aims to be a complete PKI suite written in Java, and designed from the ground up with security in mind. When completed, it will be fully standards compliant with PKIX, XKMS, OCSP, and other PKI standards.

    Downloads: 1 This Week Last Update: See Project
  • Accountis XML Business Document Exchange

    Accountis allows e-invoices and e-orders to be digitally signed and exchanged across a trading network. Using ebXML, UBL, CAM and XSLT, it translates between XML, CSV and EDI formats, with web based workflow, client API and PDF to XML printer driver.

    Downloads: 0 This Week Last Update: See Project
  • CIS Benchmark for OS X

    This is an attempt to port the CIS Benchmark tool (http://cisecurity.org/index.html) to OS X from its Linux implementation. This project is working on taking the source from the Level 1 Linux implementation, written in Perl, and porting it to OS X. The

    Downloads: 0 This Week Last Update: See Project
  • CMS identifier

    CMS identifier (cmsident) attempts to identify the content management system used to generate a given web site (and its version). Future versions will automatically look up found versions in vulnerability databases to alert if updates are necessary.

  • CyaSSL

    The CyaSSL embedded SSL library (Now known as wolfSSL) is a lightweight, portable, C-language-based SSL/TLS library targeted at IoT, embedded, and RTOS environments primarily because of its size, speed, and feature set. It works seamlessly in desktop, enterprise, and cloud environments as well. wolfSSL supports industry standards up to the current TLS 1.2 and DTLS 1.2, is up to 20 times smaller than OpenSSL, offers a simple API, an OpenSSL compatibility layer, OCSP and CRL support, is backed by the robust wolfCrypt cryptography library, and much more. wolfSSL relies on the soon-to-be FIPS 140-2 validated wolfCrypt library for all cryptographic functionality. Visit http://wolfssl.com/wolfSSL/fips.html for more info!

    Downloads: 0 This Week Last Update: See Project
  • DivProtector

    PHP script to protect DIV content (e.g. private data) from indexation by bots, spammers etc...The content is encrypted in the source and decrypted by entering the key in the CAPTCHA.

    Downloads: 0 This Week Last Update: See Project
  • Diverse Developments

    Originally a software partnership between my best friend and myself, Diverse Developments seeks to write "useful stuff", of a very diverse nature... Current projects include a file encoder, and a double-entry accounts package.

    Downloads: 0 This Week Last Update: See Project
  • EAESCrypt

    Extended AES Cryptography

    EAEScrypt is a utility that is designed to protect sensitive data using secure encryption. It uses the Advanced Encryption Standard (AES) as published by the Federal Information Processing Standards Publications (FIPS PUBS) and issued by the National Institute of Standards and Technology (NIST). The official version of AES allows only 128-bit, 192-bit or 256-bit keys, and EAESCrypt is fully compliant with FIPS-197 when using these values. But EAEScrypt can use any key size from 128-bit to 2048-bit. EAESCrypt is a command line utility. The instaler for Windows 7 provides some basic functionality in the context menu for the files in Windows Explorer, to encrypt and decrypt them, as well as to manage the encryption keys. Go to the EAESCrypt Web Site to download the installer and the source code.

    Downloads: 0 This Week Last Update: See Project
  • Endico - Text Encrypt  Icon

    Endico - Text Encrypt

    Fastest way to make secure text.

    Help to convert text into secret codes , so that you can mail,chat and transfer text securely to prevent hacking. How to use : Step one - Open Endico 14 Step two - Decide what to do (Text Encode/Text Decode) Step three - If You Selected Text Encode -> Then Type/Copy/Open .txt file to convert. Step four - Copy the converted text into clipboard to chat,mail,print process etc. Step five - If you want to Decode the code the again follow step two. Step six - Congratulations! you done it . ------------------------------------------------------------------------------------------------- Advantages and Applications 1. Fast and East TEXT encoding. 2. Fast and Easy Code decoding. 3. Easy User Interface & 24x7 Support. 4. Low system requirements. 6. Easy to share outputs. Note : Use same application to decode the data . -------------------------------------------------------------------------------------------------- (C) Logicwoods Ind

  • Engrane3D

    Engrane3D is a fully working LiveCD OS powered by Slackware/Slax with a personalized set of tools to set, configure clusters, tools for hosting serving, a built-in parallel 3D renderer and a nice set of compilers and libs (SDL,MPI, Mesa).

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you