Security & Utilities Software

OS OS

    • More...
  • More...
    • More...
    • More...

Category Category

    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...

User Interface User Interface

  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • Use DigitalOcean to Build, Deploy & Scale Web Apps Use DigitalOcean to Build, Deploy & Scale Web Apps Icon
    Use DigitalOcean to Build, Deploy & Scale Web Apps Icon

    The ease and simplicity of DigitalOcean gives developers more time to build and innovate for their customers.

    Thousands of businesses and developers around the world use DigitalOcean to easily deploy, manage, and scale applications of any size with less infrastructure friction. Go from one to a thousand virtual servers in seconds. Also, we continue to add hundreds of in-depth tutorials to our documentation library and have an active online community to get the support you need to succeed.
  • Monitor your Cisco ASA like an expert Monitor your Cisco ASA like an expert Icon
    Monitor your Cisco ASA like an expert Icon

    See how Network Insight™ for Cisco® ASA, a feature of SolarWinds Network Performance Monitor and Network Configuration Manager, can help.

    Get visibility into the health and performance of your entire Cisco ASA environment in a single dashboard. View VPN tunnel status and monitor firewall high availability, health, and readiness. Automatically discover and filter within ACLs, show rule hit counts, and detect shadow and redundant rules. Automate the monitoring and management of your ASA infrastructure in a fully integrated solution. Try it free for 30 days!
  • ettercap Icon

    ettercap

    Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis. Development has been moved to GitHub, https://github.com/Ettercap/ettercap

  • xca

    X Certificate and Key management is an interface for managing asymetric keys like RSA or DSA. It is intended as a small CA for creation and signing certificates. It uses the OpenSSL library for the cryptographic operations. Please see the XCA homepage http://hohnstaedt.de/xca

  • DAR - Disk ARchive Icon

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing. DAR knows how to perform full, differential, incremental and decremental backups. It provides testing, diffing, merging, listing and of course data extracting from existing archives. Archive internal's catalog, allows very quick restoration of a even a single file from a very large, eventually sliced, compressed and encrypted archive. Dar saves *all* UNIX inode types, takes care of hard links, sparse files as well as Extended Attributes (MacOS X file forks, Linux ACL, SELinux tags, user attributes), it has support for ssh and is suitable for tapes and disks (floppy, CD, DVD, hard disks, ...) more details at: http://dar.linux.free.fr/doc/Features.html

  • The Sleuth Kit

    The Sleuth Kit is a C++ library and collection of open source file system forensics tools that allow you to, among other things, view allocated and deleted data from NTFS, FAT, FFS, EXT2, Ext3, HFS+, and ISO9660 images.

  • Hyenae Icon

    Hyenae

    Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant. Hyenae will be continued here: https://sourceforge.net/projects/jhyenae/

    Downloads: 101 This Week Last Update: See Project
  • SolarWinds is #1 in network monitoring. SolarWinds is #1 in network monitoring. Icon
    SolarWinds is #1 in network monitoring. Icon

    Reduce network outages and improve performance with advanced network monitoring software.

    SolarWinds® Network Performance Monitor (NPM) is the ONLY monitoring solution with NetPath™ for hop-by-hop visibility into your critical paths, on-premises and into the cloud. NPM also features PerfStack™, helping you accelerate identification of root cause by dragging-and-dropping network performance metrics on a common timeline for immediate visual correlation across all of your network data. See why we're the leader. Try it free for 30 days!
  • pam_ssh_agent_auth

    PAM module which permits authentication for arbitrary services via ssh-agent. Written with sudo in mind, but like any auth PAM module, can be used for for many purposes.

  • moscrack

    Moscrack is a perl application designed to facilitate cracking WPA keys on a cluster of computers. This is accomplished with any one of Mosix clustering software, ssh, rsh or Pyrit connectivity to nodes. Cluster nodes can run any Un*x variant (includ

  • cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon-128, SM4, Speck-128, Threefish, Twofish, and Rijndael (AES) with all block and key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. MAC functions: HMAC, Poly1305. Key derivation functions: PBKDF2, scrypt, Argon2 (Argon2i, Argon2d, Argon2id). Includes sample command-line tools: - 'digest' - for calculating and verifying file checksum(s) using any of the supported hash algorithms (similar to md5sum or RHash). - 'cryptor' - for file encryption using Serpent-256 algorithm (CBC mode with HMAC). Check out the cppcrypto web site linked below for programming documentation and performance comparison.

  • Unicornscan

    Unicornscan is an asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.

    Downloads: 60 This Week Last Update: See Project
  • GoldBug - Encrypted Communications Icon

    GoldBug - Encrypted Communications

    Instant Chat Messenger. E-Mail-Client. Websearch. Filetransfer.

    GoldBug is a decentralized & secure communication suite that offers an integrated e-mail client, an instant messenger, and a file transfer utility. Also included is a URL-distribution and search tool. ● English Manual: https://en.wikibooks.org/wiki/Goldbug ● Deutsches Handbuch: https://de.wikibooks.org/wiki/Goldbug ● http://marjorie-wiki.de/wiki/GoldBug_(Instant_Messenger%29 ● Audit: BIG SEVEN Study https://sf.net/projects/goldbug/files/bigseven-crypto-audit.pdf ● Source: https://github.com/textbrowser/spot-on. ● Compiling-Info: https://sourceforge.net/p/goldbug/wiki/compiling/ ● GoldBug has Server-Software included and also works with the Android Chat Server "SmokeStack" under: https://smokeappope.sourceforge.io/ By 2017-09-30 the project test server has been discarded, please learn to set up your own crypto chat server or use the POPTASTIC function (crypto chat over IMAP/POP3 servers)

    Downloads: 58 This Week Last Update: See Project
  • C++Builder: 1 codebase, 1 UI designer, 4 platforms. C++Builder: 1 codebase, 1 UI designer, 4 platforms. Icon
    C++Builder: 1 codebase, 1 UI designer, 4 platforms. Icon

    The best visual IDE for creating fast performance native apps across platforms. Start today a 30-Day trial (no credit card needed).

    Modern C++, standards-compliant with enhanced language extensions, beautiful native UI tools, and cross-compilation to Windows, macOS, iOS and Android. We provide the ‘full stack’ for native app development, from database to native and flexible UI to REST and more. If you want crossplatform C++ done right - choose the Complete App Platform for Multi-Device Native Development - Choose C++Builder.
  • TRUST KEY

    Secure Key is an uncrackable security mechanism that minimizes trust given to stored keys, and obfuscates key data in random noise. The Secure Key itself is a hardware device that plugs into your PC (and the server the other end). The key is sent to user

    Downloads: 34 This Week Last Update: See Project
  • Yet Another File Integrity Checker

    yafic is Yet Another File Integrity Checker, similar to Tripwire. yafic, however, is fast, simple, and yet flexible. Config files are similar to Tripwire's, even supporting flag templates. It uses SHA-1 as its hash function.

    Downloads: 31 This Week Last Update: See Project
  • NSS MySQL Library

    Configure Unix users and groups in a MySQL database. It is system-wide like NIS or LDAP! It features open-ended database design and persistent connections. Works with NSS-compatible systems (Linux, Solaris, FreeBSD).

    Downloads: 25 This Week Last Update: See Project
  • MyPasswords Icon

    MyPasswords

    Personal Password Manager

    What you need for managing your passwords, including the passwords of your online accounts, bank accounts and ... with the corresponding URLs. The passwords are encrypted by AES. Can be used on almost all operating systems including Windows & Linux.

  • Sudoscript - Audited Shells

    Introduction Sudoscriptd/sudoshell are a pair of Perl scripts that provide an audited shell using sudo(8) and script(1).

    Downloads: 23 This Week Last Update: See Project
  • Defa Protect HTML5 Video From Download Icon

    Defa Protect HTML5 Video From Download

    Prevent and Protect Your HTML5 Video, Music , Audio From Download Free

    Defa Protector is A Simple PHP and Wordpress Plugin To Protect and Prevent Video Save As From Browser and Some Video Grabber. There is 100% Guaranteed Protection and There might be some tradeoff but If you care about Digital Rights Management of Your Video and Music Content. This Project is for you. Defa Protector 6.7.1 Revamp Code For Better Performance To The Bone. We almost rewritten this project from scratch.

    Downloads: 22 This Week Last Update: See Project
  • Wellenreiter wireless penetration tool

    Wellenreiter is a GTK/Perl program that makes the discovery, penetration and auditing of 802.11b wireless networks as easy as possible. All three major wireless cards (Prism2 , Lucent, and Cisco) are supported. Usability is one of the main goal.

  • bin64ed Icon

    bin64ed

    Base64 encode (or decode) files of any type with this lightweight tool

    bin64ed is a binary base64 encoder/decoder that allows you to encode/decode binary files (such as images, pdfs, etc) to and from base64.

    Downloads: 15 This Week Last Update: See Project
  • CSVHashCrack Suite Icon

    CSVHashCrack Suite

    Multi hash crack suite

    This script is capable of cracking multiple hashes from a CSV-file like e.g. dumps from sqlmap. Over 17.000 md5-hashes in a CSV-file get cracked with a 14.300.000 lines wordlist in less then 1 min. Lines wich cant get cracked with the wordlist get stored in a .leftToCrack-File to further process with another Wordlist or the bruteforce-tool. In addition to the wordlist-cracker I created also a bruteforce-tool named CSVHashBrutforcer.

    Downloads: 11 This Week Last Update: See Project
  • PortFusion Icon

    PortFusion

    Distributed reverse / forward proxy and tunneling solution for TCP.

    PortFusion is a minimalistic, cross-platform, transport-layer distributed reverse / forward proxy for TCP written in Haskell + LLVM and released under GPLv3. A single package that makes the most of each platform by tapping into their unique capabilities, combining this power with an intuitive interface, beautiful design and Haskell's excellent support for unprecedented levels of concurrency and parallelism. It strives for the smallest source code size (< 500 lines) while delivering maximum throughput with near zero overhead.

    Downloads: 9 This Week Last Update: See Project
  • pam_krb5

    pam_krb5 is designed to allow smooth integration of Kerberos 5 passwordchecking with applications built using PAM. It also supports session-specific ticket files (which are neater), Kerberos IV ticket file grabbing, and AFS token-grabbing.

  • Packet Flood Generator

    Packet Flood Generator as the name stands is a projet to produce a threaded traffic generator program, it has support for generating IP, TCP , UDP, ICMP and IGMP packets, also has as feature to keep the connection up.

    Downloads: 6 This Week Last Update: See Project
  • GoodCrypto private server

    Secure mail + Tor gateway

    Protect your company's email and browsing with your GoodCrypto private server. * Protects email metadata and resists traffic analysis * Automatic encryption, decryption, and key management * All private keys stay on *your* server * Users don't change their email or browser software * Blocks web malware * Runs on your private server * Completely decentralized

    Downloads: 5 This Week Last Update: See Project
  • libnsa

    RSA 4096 C++ library

    Libnsa stands literally for "Library: Non Semper erit Aestas". It is a small C++ library which implements RSA encryption. The current version only creates the 4096 bit public and private keys.

    Downloads: 4 This Week Last Update: See Project
  • Interrogate

    Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material. First and foremost for memory dump analysis and forensics usage. Able to identify AES, Serpent, Twofish and RSA keys as of version 0.0.3.

    Downloads: 3 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you