Security & Utilities Software

OS OS

    • More...
  • More...
    • More...
    • More...
    • More...

Category Category

    • More...
    • More...
    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

    • More...
  • More...

Database Environment Database Environment

    • More...

Freshness Freshness

Security & Utilities Software

  • Identify and respond to threats before damage is done Identify and respond to threats before damage is done Icon
    Identify and respond to threats before damage is done Icon

    A SIEM that makes it easy to use logs for security, compliance, and troubleshooting.

    SolarWinds® Log & Event Manager (LEM) delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-use, and quick-to-deploy virtual appliance. LEM provides the visibility, security, and control that IT professionals need to alert on and respond to security threats, and assist in meeting the regulatory compliance guidelines of HIPAA, PCI DSS, SOX, and more. Try it free for 30 days!
  • SolarWinds is #1 in network monitoring. SolarWinds is #1 in network monitoring. Icon
    SolarWinds is #1 in network monitoring. Icon

    Reduce network outages and improve performance with advanced network monitoring software.

    SolarWinds® Network Performance Monitor (NPM) is the ONLY monitoring solution with NetPath™ for hop-by-hop visibility into your critical paths, on-premises and into the cloud. NPM also features PerfStack™, helping you accelerate identification of root cause by dragging-and-dropping network performance metrics on a common timeline for immediate visual correlation across all of your network data. See why we're the leader. Try it free for 30 days!
  • .deobfuscate

    Deobscufates .NET assemblies, primarily by rearranging IL code (basic block reordering) and removing junk. Designed to be modular, it is built from reusable pieces.

    Downloads: 4 This Week Last Update: See Project
  • A fine-grained Qt login system

    Grained Login is a fine-grained login system for Qt applications. It uses SHA1 hashed passwords to retrieve user rights from a SQLite database. An administration dialog handles the maintenance of the users, the roles, the rights and the password history.

    Downloads: 0 This Week Last Update: See Project
  • ADiPaRT Icon

    ADiPaRT

    A Web Based Self Service Active Directory Password Reset Tool

  • AES x86 - Algorithms in Assembly

    A package of Rijndael, Twofish and Serpent encryption algorithms implemented in x86 assembly. Meant to learn basics of assembly, learn about the algorithms or to be used in a C program.

    Downloads: 8 This Week Last Update: See Project
  • APing2

    APing2 is an improved (and C rewritten) version of APing. [dev has ceased, we are waiting for the official NPing project to start]

    Downloads: 0 This Week Last Update: See Project
  • ASOPEC Security Framework

    ASOPEC is a framework for dealing with security in a diverse range of environments. It abstracts security from your application with a AOP approach. It is written in Java and works in Spring and EJB3 containers.

    Downloads: 0 This Week Last Update: See Project
  • ASP .Net viewstate decoder / encoder +

    viewstate is a decoder and encoder for ASP .Net viewstate data. It supports the different viewstate data formats and can extract viewstate data direct from web pages. viewstate will also show any hash applied to the viewstate data.

    Downloads: 13 This Week Last Update: See Project
  • AST

    AST is a security platform written in python. It's composed by modules that can be installed and loaded on it.

    Downloads: 0 This Week Last Update: See Project
  • AUM CSPRNG & Stream Cipher Icon

    AUM CSPRNG & Stream Cipher

    A minimal CSPRNG reflecting the Zen of cipher design

    AUM is an extremely fast, small-state, cryptographically secure pseudo-random number generator and stream cipher. AUM exhibits uniform distribution, mixes rapidly, has no detected bias, and comes in three variants: AUM16, with an internal state array of 16+4 32-bit words; AUM32, with an internal state of 32+4 words; and AUM64 with a 64+4-word state. The former permit seeding with a key of up to 512 or 1024 bits, the latter with a 2048-bit key.

    Downloads: 0 This Week Last Update: See Project
  • AleHu Icon

    AleHu

    Encrypting, anonymous, unlimited size message transfer system

    AleHu is an open source encrypted message transfer system that encompasses both server (PHP) and client software (Java). Give it a shot: You can try out AleHu by simply running the client using the preconfigured AleHu test server! For further details and instructions on how to quickly install and run AleHu, have a look at the documentation in the Wiki section.

    Downloads: 0 This Week Last Update: See Project
  • Aleph Access Control List API

    The Aleph project is a simple Web API for using an access control list composed of OpenIDs.

    Downloads: 0 This Week Last Update: See Project
  • Amavisd-new Maintenance

    AmavisAdmin is a tool to maintain SPAMs, Viruses and blocked mails written to an SQL database by Amavisd-new. Mails can be removed automatically or manually, or they can be released to be send to the recipients.

    Downloads: 0 This Week Last Update: See Project
  • Ampare Hide Links Icon

    Ampare Hide Links

    Ampare Hide Link is a script which auto hide real link on your website

    Ampare Hide Link is a script which auto hide link on your website to prevent user from knowing the final destination. Ampare Hide Link is using Defat Technology and other to protect your link on iframe and other tags. If you want to share some content but want to keep the url private. You can use Ampare Hide Link . It is free

    Downloads: 1 This Week Last Update: See Project
  • Ano

    Ano (Anonymous Network Overlay) is a decentralized IP router based on relaying principle. In Ano all IP traffic is anonymized, including TCP, UDP, ICMP and DNS protocols. Each node acts as a relay and NAT for external traffic.

    Downloads: 0 This Week Last Update: See Project
  • Anomos Icon

    Anomos

    Anomos is an anonymous, encrypted multi-P2P file sharing protocol, originally based on BitTorrent. See our homepage for more details.

  • Anti Inference Hub

    Anti Inference Hub is the first dynamic query processing engine that defends against the Inference Problem in Multilevel Databases by integrating smoothly with common DBMSs (Oracle, PostgreSQL, and MySQL), and monitoring queries submitted by users. The project source is hosted at: https://github.com/angyjoe/aih. Post your questions to Anti Inference Hub mailing list at: https://lists.sourceforge.net/lists/listinfo/aih-list.

  • Anti-ImageSpam

    How to detect multimedia spam such as image spam? This project implemented some algorithms to detect and recognize the image spam based on Image Processing, Pattern Recognition incluing Edge-Detection,Region-Grow, ANN, SVM, LLE, ICA, PCA,etc.

    Downloads: 0 This Week Last Update: See Project
  • Anticorps

    Anti net-cut program, programme Anti net-cut, anti netcut, ,netcut , Arcai

    Downloads: 1 This Week Last Update: See Project
  • Auth MemCache Cookie

    This is a apache v2.0 authentication module. Based on html form authentication and cookie authentication session. Cookie session are stored in memcache deamon. Can be used has an simple "Single Signe-On" (SSO). All the code source and the bug tracking has migrated to github: https://github.com/ZenProjects/Apache-Authmemcookie-Module All the documentation are here: https://zenprojects.github.io/Apache-Authmemcookie-Module/

  • Azrar Icon

    Azrar

    Encryption addressing long-term data secrecy

    Most of today's cryptographic standards will be broken with tomorrow's computational power. Azrar is a user-friendly tool for the encryption/decryption of single files - preferably compressed archives - addressing long-term data secrecy. Thus, Azrar provides the possibility to use webspace for secure data transfer between two communication/transfer partners (encryption only, network transfer not yet included in current version). Data in encrypted files are secret/private indefinitely. To achieve long-term data secrecy, Azrar differs from other approaches in terms of not to rely on effective computational deficiencies. It combines a one-time pad with a stream cipher method using the strong cryptographic hash function (family) Skein. Azrar fulfills business requirements for secure data transfer and supports several operating systems natively. It does not use a runtime environment.

    Downloads: 0 This Week Last Update: See Project
  • BARP Binomial Addition Rotation Panmagic

    GPL cryptographic functions using Binomial coefficients, Addition, Rotation, Panmagic squares and cubes.

    Downloads: 0 This Week Last Update: See Project
  • BEDBUG CSPRNG & Stream Cipher Icon

    BEDBUG CSPRNG & Stream Cipher

    A family of FLEA-inspired CSPRNGs and Stream Ciphers

    BEDBUG is a small, fast, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It exhibits uniform distribution, mixes rapidly (with worst-case avalanche better than 16-bits), has no detected bias, and comes in three variants: BEDBUG128, with an internal state array of 128+3 32-bit words; BEDBUG256, with an internal state of 256+3 words; and BEDBUG512 with a 512+3-word state. The former permit seeding with a key of up to 4096 or 8192 bits, the latter with a 16384-bit key. The BEDBUG generator itself is a mere 5 lines of code: Three rotations; two pseudo-random lookups. The default BEDBUG configuration alternates the rotation constants unpredictably. These four sets of three values differ between BEDBUG128, BEDBUG256 and BEDBUG512 and were selected, tuned and tested in each case for optimal avalanche, which is never less than 16.5 bits. BEDBUG has passed stringent industry-standard tests for randomness, including NIST and DIEHARD.

    Downloads: 0 This Week Last Update: See Project
  • Backup P2P - Secured peer-to-peer backup

    Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.

  • Bigram Table Generator Icon

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed. Executing the program with command-line arguments causes bigram to generate a random bigram table to print to screen or save to disk depending on whether the -f filename argument was given. If the -p passphrase argument is given a specific table is generated and is repeatable each time the same passphrase is given. This program was written to supplement the Enigma Simulator by Dirk Rijmenants. http://users.telenet.be/d.rijmenants/en/enigmasim.htm Enigma message procedures: http://users.telenet.be/d.rijmenants/en/enigmaproc.htm

    Downloads: 2 This Week Last Update: See Project
  • Biocentrica Voyager Antivirus

    It moves by itself inside networks like virus infection & plagues, it is being written to solve computer virus problem drastically and responsibly. It is legal, free and open for public domain to improve W3 ICT Security.

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you