Security & Utilities Software

OS OS

    • More...
  • More...
    • More...
    • More...

Category Category

    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

    • More...
  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • Monitor your Cisco ASA like an expert with Solarwinds® Network Insight™ for Cisco® ASA, a feature of NPM and NCM. Monitor your Cisco ASA like an expert with Solarwinds® Network Insight™ for Cisco® ASA, a feature of NPM and NCM. Icon
    • Get visibility into the health and performance of your entire Cisco ASA environment in a single dashboard
    • View VPN tunnel status and monitoring firewall high availability, health, and readiness
  • Want to improve your MSP’s revenue? Price your services right. Want to improve your MSP’s revenue? Price your services right. Icon
    Want to improve your MSP’s revenue? Price your services right. Icon

    Get the ebook, The Managed Services Pricing Guide 2.0 to get industry best practices on pricing managed services.

    You choose software for your IT business so it makes you money. The margins must be good enough to justify the cost. SolarWinds RMM was priced to give you the margins you need to earn a healthy amount of monthly recurring revenue. Download our all-new Managed Services Pricing Guide 2.0 to find what revenue to expect for your services, including light monitoring, web protection, patching management, backup and more.
  • ILMP

    Tool that encrypt a password using answers give by the user from pre-defined or user-defined questions and create a binary file that is used to retrieve the encrypted password (or lost password) by answering questions.

    Downloads: 0 This Week Last Update: See Project
  • IMUK

    Solution de logon par clé USB

    IMUK vous permet de vous logger sur votre poste en plugant une simple clé USB. IMUK vous permettra aussi de stocker, de manière crypté, les données utilisateur afin qu'elle n'encombre plus les postes et serveur.

    Downloads: 0 This Week Last Update: See Project
  • ISECOM

    ISECOM is a non-profit research initiative applying open community cooperation to develop methodologies.

    Downloads: 0 This Week Last Update: See Project
  • Implementing TCCP

    Data exchange is a core part of all cloud systems so it becomes necessarily important to control access to data that are confidential and whose integrity influences the state of the system at any time.It can be proven that the administrator in a IaaS can easily perform some hidden and malicious task on unsuspecting customer machine. This is attributed to the fact that he/she possesses the root privilege to do so and forms an attack. A cold boot attack can easily be lauched amongst other attacks by the privilege user or system administrator.A simple attack scenario could be that a customer pays a virtual machine at Amazon EC2 (Provider) and the systemadmin (Privilidged User) who is, for instance, threatened to be fired, has access to the same virtual machine state, this priviledged user can easily leak customer’s data. There is a need to secure the computation state during communication and storage and we achieve this through the implementation of a trusted platform.

    Downloads: 0 This Week Last Update: See Project
  • ImpraStorage Icon

    ImpraStorage

    ImpraStorage provided a private imap access to store large files

    ImpraStorage provided a private imap access to store large files. Each file stored on the server is split in severals random parts. Each part also contains random noise data (lenght depends on a crypt key) to ensure privacy and exclude easy merge without the corresponding key. An index of files stored is encrypt (with the symmetric-key algorithm Kirmah) and regularly updated. Once decrypt, it permit to perform search on the server and download each part. transfert process is transparent. Just vizualize locally the index of stored files and simply select files to download or upload. ImpraStorage automatically launch the parts to download, then merge parts in the appropriate way to rebuild the original file. Inversely, a file to upload is split (in several parts with addition of noise data), and ImpraStorage randomly upload each parts then update the index.

    Downloads: 0 This Week Last Update: See Project
  • Modern Object Pascal coding? Try Delphi Modern Object Pascal coding? Try Delphi Icon
    Modern Object Pascal coding? Try Delphi Icon

    The most powerful Object Pascal IDE and library for cross-platform Native App Development with flexible Cloud services and broad IoT connectivity

    Delphi is the choice for developers wanting the power, readability and flexibility of the Modern Object Pascal language, coupled with native compilers and component libraries for fast single source code development on Windows, macOS, iOS, Android and Linux. Get Started with a FREE, fully functional 30-day license of Delphi.
  • JObfuscator

    the problem these days is that we can't find a powerful obfuscator for free for java or .NET, so this project is an initiative to create an obfuscator powerful enougth compared with the obfuscators existing in the market

    Downloads: 0 This Week Last Update: See Project
  • JPassGen

    JPassGen is an usefull strong password generator for secure login protection. (GPL / Java Swing / JNLP)

    Downloads: 0 This Week Last Update: See Project
  • Downloads: 0 This Week Last Update: See Project
  • Jay's Iptables Firewall

    [not maintained anymore] Jay's Iptables Firewall is a script with support for multiple (external/internal) interfaces, TCP/UDP/ICMP control, masquerading, synflood control, spoofing control, port forwarding, VPNs (vtund), ToS, denying hosts, ZorbIPTraff

  • JohnDarme

    The John Darm project aims at developping a software that can tests a brute force attack on weak UNIX passwords. It s a multi-client application that dispatches the calculations between the different clients.

    Downloads: 0 This Week Last Update: See Project
  • Identify and respond to threats before damage is done Identify and respond to threats before damage is done Icon
    Identify and respond to threats before damage is done Icon

    A SIEM that makes it easy to use logs for security, compliance, and troubleshooting.

    SolarWinds® Log & Event Manager (LEM) delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-use, and quick-to-deploy virtual appliance. LEM provides the visibility, security, and control that IT professionals need to alert on and respond to security threats, and assist in meeting the regulatory compliance guidelines of HIPAA, PCI DSS, SOX, and more. Try it free for 30 days!
  • KISS - Kernel Improved Security System

    KISS is a kernel-side host-oriented security tool, which may bring you file integrity checking, file and process hiding and actions handling on special internal events (using a tiny scripting language).

    Downloads: 0 This Week Last Update: See Project
  • Kaŝludo

    A tool to hide a file into a image with no affects the size. It uses a steganography techinique that change the least significant bit in the RGB color systems of non compressed images to store the bits of the file to hide.

    Downloads: 0 This Week Last Update: See Project
  • Kippo-Graph Icon

    Kippo-Graph

    Full featured script to visualize statistics from a Kippo SSH honeypot

    Kippo-Graph is a full featured script to visualize statistics from a Kippo SSH honeypot. It uses “Libchart” PHP chart drawing library by Jean-Marc Trémeaux, “QGoogleVisualizationAPI” PHP Wrapper for Google’s Visualization API by Thomas Schäfer and geoPlugin geolocation technology (geoplugin.com). Kippo-Graph currently shows 24 charts, including top 10 passwords, top 10 usernames, top 10 username/password combos, success ratio, connections per IP, connections per country, probes per day, probes per week, ssh clients, top 10 overall input, top 10 successful input, top 10 failed input and many more. There are also geolocation data extracted and displayed with Google visualization technology using a Google Map, a Intensity Map, etc. Lastly, input-related data and statistics are also presented giving an overview of the action inside the system and there is live playback ability of captured sessions.

    Downloads: 0 This Week Last Update: See Project
  • Kirmah Icon

    Kirmah

    Encryption with symmetric-key algorithm Kirmah - generate keys with exotic chars - redefine key length - key mark to ensure decryption capabilities - mix data - fast with multiprocessing - possible compression - gui on gtk3 - cli tool - python3 DEPENDENCIES : ======== python3, python-gobject, gobject-introspection, pygtk 3 modes are available to encrypt : ======== - compression (full / disabled or only final step) - random (simulate a random order - based on crypted key - to randomize data) - mix (mix data according to a generated map - based on crypted key - with addition of noise) Process is as follow : ======== encrypt : file > [ compress > ] encrypt > [randomiz data > mix data > compress > ] file.kmh decrypt: file.kmh > [ uncompress > unmix data > unrandomiz data] > decrypt > [uncompress > ] file ======== for encrypt/decrypt large binary files, use the fastest alternative : split/merge

    Downloads: 0 This Week Last Update: See Project
  • LanFileWatcher

    This program allow you to extract files from network traffic under HTTP and FTP protocols. It should permit you to see, for instance, using an antivirus on the files, if a machine of your network have downloaded a virus.

    Downloads: 0 This Week Last Update: See Project
  • MM Server

    The aim of this project is to develop a standalone mobility plateforme, that supply security aspect, network aspect (dialing, QoS, P2P ...), fleet management and which is embedded mobile service such as push (mail, application ...) with an open API.

    Downloads: 0 This Week Last Update: See Project
  • Downloads: 0 This Week Last Update: See Project
  • Martus (TM) Human Rights Bulletin System

    The Martus (TM) Bulletin System is used by human rights and social justice groups to track violations. This Java program is as easy to use as email. Bulletins can be encrypted or searched, and can be backed up to a remote server. See www.martus.org.

  • Master Cipher Icon

    Master Cipher

    Master Cipher offers a suitable solution when you need a protection me

    The Master Cipher software possesses a unique algorithm based on the above symmetric key algorithms. This unique algorithm designed by me is very difficult to exploit using a brute-force attack because of its very complex logic and combination of different algorithms mixed together to develop a strong and an almost unbreakable encryption of a plain text. The software as a whole is of a very small size and has a very easy and basic user interface which makes it very very simple and easy to use. A plain text can be encrypted in many different ways to produce a different encryption each time. As a whole user will be able to carry out the encryption and decryption mechanism without hassle.

    Downloads: 0 This Week Last Update: See Project
  • MiNODLogin

    Mantén actualizado tu software Antivirus!

  • Mon Pfe

    Mon projet est de mettre en place une application de vote sécurisé par une authentification biometriques avec le chiffrement de Paillier

    Downloads: 0 This Week Last Update: See Project
  • My web with Me

    All your web in one place

    MwwM has no new stuff to offer but the biggest thing. Indeed, MwwM only deals in your web directory. But in addition you can see or judge the reliability of the websites in which You are register.

    Downloads: 0 This Week Last Update: See Project
  • NAC

    NAC is a collection of tools for cryptography. The goal is to provide simple-to-use crypto tools (like an OTP, String and number generator, public key algorithm...) you can use under Linux, Windows...

    Downloads: 0 This Week Last Update: See Project
  • NEDLib

    NEDLib is a library that allows detection of advanced network events. It is based on libpcap and designed to be flexible with an intuitive and object oriented API. You can make your program react to any network happenings with only a few lines of code.

    Downloads: 0 This Week Last Update: See Project
  • NFR IDA QuickConfig RAD Tools

    A number of tools to enhance management/coding of NFR (http://www.nfr.net) IDA, and various other admin tools that can be used for both NFR and hand coding other appliance scripts.

    Downloads: 0 This Week Last Update: See Project

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you