Open Source Security Software - Page 6

  • Fully managed relational database service for MySQL, PostgreSQL, and SQL Server Icon
    Fully managed relational database service for MySQL, PostgreSQL, and SQL Server

    Focus on your application, and leave the database to us

    Cloud SQL manages your databases so you don't have to, so your business can run without disruption. It automates all your backups, replication, patches, encryption, and storage capacity increases to give your applications the reliability, scalability, and security they need.
  • Control remote support software for remote workers and IT teams Icon
    Control remote support software for remote workers and IT teams

    Raise the bar for remote support and reduce customer downtime.

    ConnectWise ScreenConnect, formerly ConnectWise Control, is a remote support solution for Managed Service Providers (MSP), Value Added Resellers (VAR), internal IT teams, and managed security providers. Fast, reliable, secure, and simple to use, ConnectWise ScreenConnect helps businesses solve their customers' issues faster from any location. The platform features remote support, remote access, remote meeting, customization, and integrations with leading business tools.
  • 1
    GMR Digital Signature System

    GMR Digital Signature System

    GMR digital signature system

    Private keys are insecure in cloud server infrastructure. Chrome: right click - translate into English! https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/Spectre-NG_18052018.html System that creates key pairs and digital signatures and is based on the presumed difficulty of prime factorization. Please install on a virtual machine with Linux! Windows is not supported! German: System, das Schlüsselpaare und digitale Signaturen erstellt, und auf der vermuteten Schwierigkeit der Primfaktorzerlegung fußt. Bitte in einer virtuellen Maschine mit Linux installieren! Windows wird nicht unterstützt! Spende einen Cappuccino: Bitcoin: 1HqrdnfQgi9B4LW8UEvLAwh7X5gXPCoQ5B Litecoin: LeCx44jGjHxiVZ8f6MyumLTCxPcp3ePKJT Paypal: paypal.me/GerritLeder
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    GNSA

    GNSA

    Graphical Network Security Advisor : Your way to secure your network.

    Gnsa is an application created with C++ including WinPcap and QT libraries, works in widows, it allows you to test your network security against some known attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    GTCop Professional Security Appliance aims to provide a powerful tool for satellite communications, with enhanced QoS and bandwidth controls. As derived from IPCop Firewall, it is a stable, secure, easy to configure and maintain GNU/Linux firewall box.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Start Gemaad on a computer and it will : - Create or complete a text file containing the computers MAC address - Set the WIFI card to DHCP mode You can now simply copy this MAC address to your admin console for any case of MAC address filtering
    Downloads: 0 This Week
    Last Update:
    See Project
  • Business Texting and Text Message Marketing Solutions - Textellent Icon
    Business Texting and Text Message Marketing Solutions - Textellent

    Textellent's robust business texting services provide SMS and MMS capability for customer service, sales, and marketing texting programs.

    Textellent's business texting solution makes designing, managing, measuring, and integrating SMS and MMS campaigns easy. Whether used for customer service, sales, or marketing, Textellent supports your customer journey with an easy-to-use service that text-enables local business lines and serves businesses of any size. Robust scheduling and appointment reminders are also available, as are keywords and shortcodes for easy opt-in programs with TCPA compliance supported by AI.
  • 5
    Gloster is a secure and decentralized p2p program for small communities working under Linux and Windows
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    * This project is dead. Please see <a href="http://www.winpt.org/">Windows Privacy Tools</a> *<br/><br/> GWP is a multilangual package which eases the installation process of GnuPG and WinPT on Windows based systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Graphical OS fingerprinting
    GraphicalOSfp is a python application which aims to collect random data issued by remote systems in IP and TCP sequences. These data are then displayed in a 3D referencial to highlight an attractor of the random engine of the remote machine.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    HT Utils

    Helps you create and manage .htaccess and .htpasswd files in Windows.

    A VB.NET based program that help you create and edit your .htaccess and .htpasswd for use with the Apache Web Server. -2013 update : Wow, i see that my old school project still has some place for some of you. Feel free to use this program and modify it as you like! This project is officially Abandoned.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    HTML Purifier is a standards-compliant HTML filter library written in PHP. HTML Purifier removes all malicious code (better known as XSS) with a thoroughly audited and secure yet permissive whitelist, and ensure standards compliance.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Automated quote and proposal software for IT solution providers. | ConnectWise CPQ Icon
    Automated quote and proposal software for IT solution providers. | ConnectWise CPQ

    Create IT quote templates, automate workflows, add integrations & price catalogs to save time & reduce errors on manual data entry & updates.

    ConnectWise CPQ, formerly ConnectWise Sell, is a professional quote and proposal automation software for IT solution providers. ConnectWise CPQ offers a wide range of tools that enables IT solution providers to save time, quote more, and win big. Top features include professional quote or proposal templates, product catalog and sourcing, workflow automation, sales reporting, and integrations with best-in-breed solutions like Cisco, Dell, HP, and Salesforce.
  • 10
    An alternative Identification system that is a replacement for Microsoft's Passport and the Liberty Alliance. Its a simple architecture that is setup so anyone can run a server and thereby have control over their online identification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    IMUK

    Solution de logon par clé USB

    IMUK vous permet de vous logger sur votre poste en plugant une simple clé USB. IMUK vous permettra aussi de stocker, de manière crypté, les données utilisateur afin qu'elle n'encombre plus les postes et serveur.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    What are the packets rejected by your Netfilter based firewall today ? How often this suspicious host try to connect to your box ? What are the most rejected domains ? Who is this strange host which scan your ports ? The responses are in the iptables log
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ISECOM is a non-profit research initiative applying open community cooperation to develop methodologies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Data exchange is a core part of all cloud systems so it becomes necessarily important to control access to data that are confidential and whose integrity influences the state of the system at any time.It can be proven that the administrator in a IaaS can easily perform some hidden and malicious task on unsuspecting customer machine. This is attributed to the fact that he/she possesses the root privilege to do so and forms an attack. A cold boot attack can easily be lauched amongst other attacks by the privilege user or system administrator.A simple attack scenario could be that a customer pays a virtual machine at Amazon EC2 (Provider) and the systemadmin (Privilidged User) who is, for instance, threatened to be fired, has access to the same virtual machine state, this priviledged user can easily leak customer’s data. There is a need to secure the computation state during communication and storage and we achieve this through the implementation of a trusted platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    ImpraStorage

    ImpraStorage

    ImpraStorage provided a private imap access to store large files

    ImpraStorage provided a private imap access to store large files. Each file stored on the server is split in severals random parts. Each part also contains random noise data (lenght depends on a crypt key) to ensure privacy and exclude easy merge without the corresponding key. An index of files stored is encrypt (with the symmetric-key algorithm Kirmah) and regularly updated. Once decrypt, it permit to perform search on the server and download each part. transfert process is transparent. Just vizualize locally the index of stored files and simply select files to download or upload. ImpraStorage automatically launch the parts to download, then merge parts in the appropriate way to rebuild the original file. Inversely, a file to upload is split (in several parts with addition of noise data), and ImpraStorage randomly upload each parts then update the index.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    JPassGen is an usefull strong password generator for secure login protection. (GPL / Java Swing / JNLP)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Radius Client coded in java (RFCs 2865 and 2866 compliant).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The John Darm project aims at developping a software that can tests a brute force attack on weak UNIX passwords. It s a multi-client application that dispatches the calculations between the different clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    KISS is a kernel-side host-oriented security tool, which may bring you file integrity checking, file and process hiding and actions handling on special internal events (using a tiny scripting language).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    A tool to hide a file into a image with no affects the size. It uses a steganography techinique that change the least significant bit in the RGB color systems of non compressed images to store the bits of the file to hide.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Kippo-Graph

    Kippo-Graph

    Full featured script to visualize statistics from a Kippo SSH honeypot

    Kippo-Graph is a full featured script to visualize statistics from a Kippo SSH honeypot. It uses “Libchart” PHP chart drawing library by Jean-Marc Trémeaux, “QGoogleVisualizationAPI” PHP Wrapper for Google’s Visualization API by Thomas Schäfer and geoPlugin geolocation technology (geoplugin.com). Kippo-Graph currently shows 24 charts, including top 10 passwords, top 10 usernames, top 10 username/password combos, success ratio, connections per IP, connections per country, probes per day, probes per week, ssh clients, top 10 overall input, top 10 successful input, top 10 failed input and many more. There are also geolocation data extracted and displayed with Google visualization technology using a Google Map, a Intensity Map, etc. Lastly, input-related data and statistics are also presented giving an overview of the action inside the system and there is live playback ability of captured sessions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Kirmah
    Encryption with symmetric-key algorithm Kirmah - generate keys with exotic chars - redefine key length - key mark to ensure decryption capabilities - mix data - fast with multiprocessing - possible compression - gui on gtk3 - cli tool - python3 DEPENDENCIES : ======== python3, python-gobject, gobject-introspection, pygtk 3 modes are available to encrypt : ======== - compression (full / disabled or only final step) - random (simulate a random order - based on crypted key - to randomize data) - mix (mix data according to a generated map - based on crypted key - with addition of noise) Process is as follow : ======== encrypt : file > [ compress > ] encrypt > [randomiz data > mix data > compress > ] file.kmh decrypt: file.kmh > [ uncompress > unmix data > unrandomiz data] > decrypt > [uncompress > ] file ======== for encrypt/decrypt large binary files, use the fastest alternative : split/merge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    This program allow you to extract files from network traffic under HTTP and FTP protocols. It should permit you to see, for instance, using an antivirus on the files, if a machine of your network have downloaded a virus.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Mantra on Chromium

    Mantra on Chromium

    Chromium based portable browser for pentesters

    MoC is a chromium based portable browser with collection of open source extensions meant for penetration testers, web application developers and security professionals etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The Martus (TM) Bulletin System is used by human rights and social justice groups to track violations. This Java program is as easy to use as email. Bulletins can be encrypted or searched, and can be backed up to a remote server. See www.martus.org.
    Downloads: 0 This Week
    Last Update:
    See Project