Security & Utilities Software

OS OS

    • More...
    • More...
  • More...
    • More...

Category Category

License License

Translations Translations

Programming Language Programming Language

  • More...

Status Status

Audience Audience

User Interface User Interface

  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • 2018 Thomson Reuters Top 100 Global Tech Leaders 2018 Thomson Reuters Top 100 Global Tech Leaders Icon
    2018 Thomson Reuters Top 100 Global Tech Leaders Icon

    See how tech-sector leadership is being redefined in today’s complex business environment.

    21st century technology-sector leadership requires not only optimal financial performance but also attention to many other factors, including management and investor confidence, risk and resilience, legal compliance, innovation, environmental impact, social responsibility, and reputation. Successfully managing these areas may determine which tech companies have the fortitude to succeed in the future. Here’s to those that made the list.
    Who are today’s top global tech leaders?
    Read the report
  • mac-robber

    mac-robber is a digital forensics and incident response tool that can be used with The Sleuth Kit to create a timeline of file activity for mounted file systems.

  • Logsurfer

    Logsurfer is a program for monitoring system logs in real-time, and reporting on the occurrence of events. It is capable of grouping information together to enhance loganalysis and create automatic reports.

  • FTimes

    FTimes is a system baselining and evidence collection tool. The primary purpose of ftimes is to gather and/or develop topographical information and attributes about specified directories and files in a manner conducive to intrusion and forensic analysis.

  • Snare Lite (SIEM & Logging Software) Icon

    Snare Lite (SIEM & Logging Software)

    Snare Enterprise: http://bit.ly/premium_snare

    ATTENTION: Snare Lite is unsupported legacy software. While it will remain a part of the SourceForge community, it is no longer secure and compliant. For up to date Snare software check out Snare Enterprise. https://www.intersectalliance.com/why-snare-enterprise/ Snare Enterprise was created to keep up with the fast paced security software market. It started with the desire to create premium logging and SIEM tools that were agnostic by nature so they could be used to boost any SIEM architecture regardless of third party developers. In fact, the agnostic nature allows it to bridge gaps between multiple SIEM implementations across business units. For more on use cases, check out the Intersect Alliance website. https://www.intersectalliance.com/ Snare Enterprise’s premium features include: - Regulatory Compliance - TLS Encryption - Log Simulcasting - TCP – Guaranteed Log Delivery - USB Device Monitoring - And more! For updates follow us on social media!

    Downloads: 22 This Week Last Update: See Project
  • Access Point Utilites for Unix

    Access Point Utilites for Unix - it's a set of utilites to configure and monitor Wireless Access Points under Unix using SNMP protocol. Utilites knownly compiles and run under Linux, FreeBSD, NetBSD, OpenBSD, MacOS-X, AIX, QNX.

    Downloads: 15 This Week Last Update: See Project
  • domainkeys-milter

    dk-milter consists of two parts: A milter-based application (dk-filter) which plugs in to Sendmail to provide DomainKeys service, and a library (libdk) which can be used to build DomainKeys-compliant applications or MTAs. See the home page for details.

  • WebJob

    WebJob downloads a program over HTTP/HTTPS and executes it in one unified operation. Output may be directed to stdout/stderr or a WebJob server. The intended audience includes Incident Response (IR) Handlers and System Administrators.

    Downloads: 8 This Week Last Update: See Project
  • shellcrypt shell obfuscation

    This tool will allow obfuscation of UNIX scripts listing an interpreter as the first line. It is most useful for distributing functionality in a commercial product or a high user volume environment where you wish to hide proprietary information.

    Downloads: 6 This Week Last Update: See Project
  • sudosh

    sudosh is a sudo shell, filter and can be used as a login shell. Sudosh records all keystrokes and output and can play back the session as just like a VCR.

  • yaSSL

    yaSSL, or yet another SSL, is an embedded ssl library for programmers building security functionality into their applications and devices. yaSSL is highly portable, and runs on standard as well as embedded platforms(QNX, ThreadX, VxWorks, Tron) yaSSL is still available but no longer being developed. Current development on the same project continues under wolfSSL. Visit yaSSL Home above for the latest stable release.

  • MAPDAV

    Designed to use what is known about users via the /etc/passwd file on unix/linux systems to generate a dynamic dictionary or csv file of more accurate guesses as to what their possible password may be, to look for bad password protection practices.

    Downloads: 1 This Week Last Update: See Project
  • Advisory Check

    Advisory Check is a tool for monitoring the security of installed software. It gathers security advisories using RSS/RDF/XML feeds, compares them against a list of known software, and alerts you if you're vulnerable. Let advchk read advisories for you!

    Downloads: 0 This Week Last Update: See Project
  • Catnip

    Servlet container extensions that help web developers write full featured Java web applications.

    Downloads: 0 This Week Last Update: See Project
  • Complete Audit Report Center

    Complete Audit Report Center (CARC) is a cross-platform interface to help with the audit of servers, files, and applications.

    Downloads: 0 This Week Last Update: See Project
  • EyeLog

    EyeLog is a flexible and extensible log analyzer for any type of log file. It allows one to define custom regular expressions (perl-style) for pattern matching and custom printf formats for reporting. The goal is to provide a universal log analysis tool.

    Downloads: 0 This Week Last Update: See Project
  • LogReactor

    This is a program that watches your system log files, looking for hack attempts. It instanty reacts to potential security breaches by (for instance) adding firewall rules to cut off the attacker.

    Downloads: 0 This Week Last Update: See Project
  • Pace Check

    Pace Check is a utility that searches through system logs and finds cases where someone has tried to gain access to your server (non-legit), then it saves them to a log, mails them to you, or sends them to stdout. It supports http, ftp, and others.

    Downloads: 0 This Week Last Update: See Project
  • PitBull LX Security Utilities

    Simplifying PitBull LX

    Downloads: 0 This Week Last Update: See Project
  • antigift Icon

    antigift

    antigift is simple cross-platform, files & folders encryption tool

    antigift could be used for encryption files & folders on USB-flash or HDD partition(with ccrypt in background). Works out of box on Linux, Windows, FreeBSD, MacOS X and other on OSes. Do not required installation. Included wipe tool for wiping free space and misskey for recovering partially forgotten key. See documentation at http://sourceforge.net/p/antigift/wiki/Home/ antigift простой и кросс-платформенный инструмент для шифрования файлов и папок(с ccrypt в качестве основы) Подробности см. на страничке с русской документацией http://sourceforge.net/p/antigift/wiki/rus/

  • ircd-immortal

    A resource-conscientious, flexible, modular, platform-independent, scalable and robust server based on ircd-ratbox.

    Downloads: 0 This Week Last Update: See Project
  • phalanx # parallel hash alternative Icon

    phalanx # parallel hash alternative

    parallel hash alternative message digest

    phalanx - parallel hash alternative (PHA) is an initiative to provide a fast and portable, parallel/multithreaded message digest utility and library.

    Downloads: 0 This Week Last Update: See Project
  • webtoken

    WebToken is a cryptographic system to authenticate users through a 2FA (Two-Factor Authentication) using OTP (One Time Password).

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you