Security & Utilities Software

OS OS

    • More...
  • More...
    • More...
    • More...

Category Category

    • More...
    • More...
    • More...
    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

    • More...
  • More...

Database Environment Database Environment

    • More...

Freshness Freshness

Security & Utilities Software

  • Develop killer analytical applications Icon
    Develop killer analytical applications Icon

    Try the Yellowfin analytics platform, built for developers.

    Yellowfin provides developers with the tools to easily build stunning analytical applications. Connect and blend multiple data sources and deploy onto any environment at scale, with access to hundreds of web services to integrate as you need. Yellowfin offers industry leading capabilities that are trusted by thousands of organizations globally. Try Yellowfin for free to see how easily you can develop killer analytical applications.
  • Discover Server and Application Network Dependencies Icon
    Discover Server and Application Network Dependencies Icon

    Discover and troubleshoot application dependencies to determine if it’s an application or network problem with SolarWinds Server & Application Monitor

    Server and Application Monitor helps you discover application dependencies to help identify relationships between application servers. Drill into those connections to view the associated network performance such as latency and packet loss, and application process resource utilization metrics such as CPU and memory usage. Determine if process utilization or network performance is affecting the application and end-user performance.
  • Network Keylogger Icon

    Network Keylogger

    Network Keylogger is a program that sends every key pressed in a computer to another computer, via TCP/IP.

  • BitShade Icon

    BitShade

    AES Cipher and Base64 encoder/decoder in Python

    BitShade is a graphic utility to encrypt/decrypt with AES and/or base64 encode/decode a file, written in Python.

    Downloads: 6 This Week Last Update: See Project
  • Facebook fake login's creator

    Un software per creare rapidamente fake login di facebook. Scritto in python, necessita di python 3 per funzionare.

    Downloads: 6 This Week Last Update: See Project
  • Intrusion Detection Exchange Arch.

    A Java-based client-server architecture for processing network intrusion detection data. The server receives XML alerts from Snort sensors buffers them for review by clients. The console provides a real-time view of IDS activity.

    Downloads: 6 This Week Last Update: See Project
  • Novosec - Bouncy Castle - Extensions

    This package provides the following pure Java extensions to the Bouncy Castle framework www.bouncycastle.org and was made freely available by www.novosec.com: 1. OCSP (RFC 2560) server and client / 2. CMP (RFC 2510, RFC 2511) generator and parser

    Downloads: 6 This Week Last Update: See Project
  • DigitalOcean - The Total Cloud Computing Platform Icon
    DigitalOcean - The Total Cloud Computing Platform Icon

    Our platform was built with simplicity at the forefront, so developers can build and deploy with ease.

    DigitalOcean's predictable format removes infrastructure friction and allows developers more time to build software customers love. Easily deploy, manage, and scale applications of any size. DigitalOcean also provides the support you need with hundreds of in-depth tutorials and an active online community.
  • Secure Data Manager Icon

    Secure Data Manager

    Password Manager - Manage your passwords and private information in one secure application for web sites, computers, programs. Search, add, edit, delete, print, etc. Java app, runs everywhere. Uses SunJCE crypto.

    Downloads: 6 This Week Last Update: See Project
  • WFuzzFE (WFuzz FrontEnd/UI)

    WFuzz FrontEnd (WFuzz UI) is what we just wrap GUI to the all-time famous wfuzz.py by edge-security.com which got its fame thanks to its multi-threading and flexibility to show desired results based on HTTP response codes/no. of lines/words.

    Downloads: 6 This Week Last Update: See Project
  • multiOTP open source Icon

    multiOTP open source

    PHP strong authentication library, web interface & CLI, OATH certified

    multiOTP is a PHP class, a powerful command line utility and a web interface developed by SysCo systèmes de communication sa in order to provide a completely free and easy operating system independent server side implementation for strong two factors authentication solution. multiOTP supports hardware and software tokens with different One-Time Password algorithms like OATH/HOTP, OATH/TOTP and mOTP (Mobile-OTP). QRcode generation is also embedded in order to support provisioning of Google Authenticator software tokens. SMS code sending is currently implemented for several providers (ASPSMS, Clickatell and IntelliSMS). The data storage of the command line utility is by default flat files based in order to simplify deployment in a few minutes, but MySQL backend is supported too. multiOTP can be easily integrated in RADIUS servers like FreeRADIUS under Linux/Windows or TekRADIUS LT under Windows. multiOTP is also the engine of the credential provider multiOTP Credential Provider.

    Downloads: 6 This Week Last Update: See Project
  • unity-idm

    Identity management and federations integration

    This project is used to host the mailing list and downloads of the Open Source Unity system - versatile identity management solution.

    Downloads: 6 This Week Last Update: See Project
  • Chi-Square & LSB Enhancement attack Icon

    Chi-Square & LSB Enhancement attack

    Java implementation of Chi-Square Attack and LSB Enhancement Attack

    Chi-square attack is the most commonly known and used statistical attack in steganalysis. LSB enhancement attack is also the most widely known visual attack in this area. This project includes implementation of these two methods in java.

  • Join us at Talend Connect! Icon
    Join us at Talend Connect! Icon

    Get your tickets to the best data-driven event of the year!

    May 7 – May 9. Use discount code TCCommunity2018 for $200 off.
  • Gateway Anti-Virus

    Gateway Anti-Virus allows applications across the enterprise to check files for viruses by providing a SOAP-based virus scanning web service. The system uses clamav for virus definitions and detection.

  • HOFAT - Hash Of File And Text calculator Icon

    HOFAT - Hash Of File And Text calculator

    HOFAT - graphical Hash Of File And Text calculator, 100%-pure Java

    HOFAT - graphical Hash Of File And Text calculator utility, 100%-pure Java, portable and cross-platform. Support md2, md5, sha1, sha256, sha384 and sha512 hashes. Simple and intuitive GUI - Graphical User Interface. Developed with Java Spring Framework. Tested in Windows/Linux. Need Jre-1.8 - http://www.oracle.com/technetwork/java/javase/downloads/jre8-downloads-2133155.html

  • Penny Post Icon

    Penny Post

    Penny Post is a system to combat spam emails by making the sender "pay for email" by spending a few seconds of computing time. Outgoing mail is marked with postage stamps that convince the receiver that the sender is genuine.

  • Spondulas

    Spondulas is browser emulator designed to retrieve web pages for hunti

    Spondulas is browser emulator and parser designed to retrieve web pages for hunting malware. It supports generation of browser user agents, GET/POST requests, and SOCKS5 proxy. It can be used to parse HTML files sent via e-mail. Monitor mode allows a website to be monitored at intervals to discover changes in DNS or content over time. Autolog mode creates an investigation file that documents redirection chains. The retrieved web pages are parsed for links and reported to an output file. More information is available on the wiki.

  • UMU-XACML-Editor

    The main purpose of this project is to develop a Graphic policy definition editor implemented in Java language and based on the XACML standard which manages access control policies

  • Ganza

    Ganzúa is a cryptanalysis tool for classical ciphers (mono and polyalphabetic) that lets the user define almost completely arbitrary cipher and plain alphabets, allowing for the proper cryptanalysis of cryptograms obtained from non-English texts.

    Downloads: 5 This Week Last Update: See Project
  • Kojoney (Koret SSH Honeypot)

    Kojoney is an easy of use, secure, robust and powerfull Honeypot for the SSH Service written in Python. With the kojoney daemon are distributeds other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log fi

    Downloads: 5 This Week Last Update: See Project
  • PortableCrypt

    platform independent solution to encrypt files on a portable Device. Files will be encrypted with TripleDES and hold in an XML-File. No local Installation needed.

    Downloads: 5 This Week Last Update: See Project
  • Ultima On-Line Tools

    An attempt to collect (read rewrite) a set of tools for Ultima Online game playing. Many tools are closed source or discontinued: no way to enhance them with no sources. Here there will be such tools and sources.

    Downloads: 5 This Week Last Update: See Project
  • jEasy Extensible Proxy

    J2EP is a reverse proxy running on a J2EE engine. The proxy is written in java and was originally designed with Tomcat in mind, but any engine should work fine. A set of basic mapping rules are included but they can easily be extended to your own needs.

    Downloads: 5 This Week Last Update: See Project
  • jGuard

    jGuard is written in java. his goal is to provide a security framework based on jaas (java authentication and authorization security) . this framework is written for web and standalone applications, to resolve simply, access control problems.

    Downloads: 5 This Week Last Update: See Project
  • CSV Data Mix

    The csvdatamix project aims to randomize CSV input data files in order to conceal the original state of the data. Similar to data masking or data transformation. Also has mapping abilities to translate back to the original state of the data.

    Downloads: 4 This Week Last Update: See Project
  • Cisco torch

    Cisco Torch mass scanning, application layer fingerprinting, and exploitation tool to discover and attack remote Cisco hosts running Telnet, SSH, Web, TFTP, NTP and SNMP services. Useful in auditing large networks for misconfigured/un-updated Ciscos.

    Downloads: 4 This Week Last Update: See Project
  • Commons-SSH

    Commons-SSH is a thin bridge between different Java SSH implementations libraries. It doesn't contain any crypto-related code and created to be used by projects who doesn't want to care about export control regulations (let client to decide)

    Downloads: 4 This Week Last Update: See Project
  • Deep Network Analyzer (DNA)

    DNA is an open, flexible and extensible deep network analyzer software server and software architecture for gathering and analyzing network packets, network sessions and applications protocols, passively off enterprise class networks.

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you