Security & Utilities Software

OS OS

  • More...
    • More...
    • More...

Category Category

License License

    • More...

Translations Translations

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

User Interface User Interface

  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • Identify and respond to threats before damage is done Identify and respond to threats before damage is done Icon
    Identify and respond to threats before damage is done Icon

    A SIEM that makes it easy to use logs for security, compliance, and troubleshooting.

    SolarWinds® Log & Event Manager (LEM) delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-use, and quick-to-deploy virtual appliance. LEM provides the visibility, security, and control that IT professionals need to alert on and respond to security threats, and assist in meeting the regulatory compliance guidelines of HIPAA, PCI DSS, SOX, and more. Try it free for 30 days!
  • Multi-vendor storage monitoring simplified Multi-vendor storage monitoring simplified Icon
    Multi-vendor storage monitoring simplified Icon

    Monitor your multi-vendor storage to help ensure your applications get the performance and capacity they need with SolarWinds® Storage Resource Monito

    SolarWinds Storage Resource Monitor (SRM) gives you multi-vendor storage performance monitoring and alerting to help ensure peak storage performance. Automated capacity planning helps you predict storage shortages, reclaim space, and prevent application outages. SRM integrates with other Orion® Platform products to provide end-to-end visibility into the application stack, and lets you easily troubleshoot performance issues from application to storage.
  • ophcrack Icon

    ophcrack

    A Windows password cracker based on rainbow tables

    Ophcrack is a Windows password cracker based on a time-memory trade-off using rainbow tables. This is a new variant of Hellman's original trade-off, with better performance. It recovers 99.9% of alphanumeric passwords in seconds.

  • Autopsy

    Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.

  • encrypt Icon

    encrypt

    cross-platform, encryption application

    encrypt is a multi-platform, file encryption application. Binary packages are currently provided for Arch, Debian, Fedora, MS Windows, Android and OS X. For further details, including the latest source code, visit https://albinoloverats.net/projects/encrypt

  • CILogon Icon

    CILogon

    The CILogon project facilitates secure access to Cyberinfrastructure (CI) via the community-driven development and support of the MyProxy, GridShib, and GSI-OpenSSH software.

    Downloads: 31 This Week Last Update: See Project
  • FW1-Loggrabber

    FW1-Loggrabber is a command-line tool to grab logfiles from Checkpoint FW-1 remotely using Checkpoints LEA (Log Export Api), which is one part of Checkpoints OPSEC API.

  • Alt-N Technologies DKIM Project

    This project is a C++ library which allows incorporating DKIM into an existing MTA or other application. It provides full support for signing, verifying, and SSP. It is compliant with RFC 4871.

  • OpenXPKI

    The project aims at creating an enterprise-grade PKI/Trustcenter software supporting well established components like RDBMS and Hardware Security Modules. The core components are written in Perl. OpenXPKI is released under the Apache License v2. NOTE: Development resources have moved to https://github.com/openxpki/openxpki SF Mailing Lists are still active.

  • Text Encryption and Decryption Icon

    Text Encryption and Decryption

    Anoncrypt-Text Encryption and Decryption Website in Java(Struts2)

    Anoncrypt by HTCoders is a web based Text Encryption and Decryption Project using Java Technology following Struts2 Framwork . It Consist of two modules > Password based Encryption (Symmetric Encryption) > Self-Destructible Message Service (Once the message is read , it is destroyed and cant be decrypted again .)

    Downloads: 2 This Week Last Update: See Project
  • mod_gnutls Icon

    mod_gnutls

    mod_gnutls apache module

    mod_gnutls uses the GnuTLS library to provide SSL 3.0, TLS 1.0, TLS 1.1 and 1.2 encryption for Apache HTTPD. It is similar to mod_ssl in purpose, but does not use OpenSSL.

    Downloads: 2 This Week Last Update: See Project
  • Is My Download Broken? Icon

    Is My Download Broken?

    a powerful multipurpose checksum utility

    It's a cross platform utility designed for performing various checksumming activities. It supports verity of standards including ADLER-32, CRC-32, MD2, MD5, MURMUR-32, MURMUR-128, SHA-1, SHA-256, SHA-384, SHA-512 and SIPHASH24. Also generated results can be validated within the application. Results can be saved to a text file format. It can batch process folders as well. This tool requires Java Run-time Environment 7 or higher to use.

  • LAIKA: EHR Testing Framework

    Laika analyzes and reports on the interoperability capabilities of EHR systems. This includes the testing for certification of EHR software products and networks.

    Downloads: 1 This Week Last Update: See Project
  • The Digest Software Project

    Three software packages to work with RFC2617 digests: libdigest (C library to compute digests), libcppdigest (C++ library to manage /etc/passwd-like files) and libpam-digestfile (PAM module allowing authentication via an /etc/passwd-like file)

    Downloads: 1 This Week Last Update: See Project
  • ANNFiD

    A forensic file identification tool using neural networks

    Just carved a bunch of bytes and have no idea what they could be? Maybe ANNFiD can help. ANNFiD uses neural network to identify byte patterns. It can be trained and has a GUI to help in the process. The tool is still on a very early stage, but could improve exponentially with the help of the developer community

    Downloads: 0 This Week Last Update: See Project
  • Anomaly Based Reverse Proxy For Web Appl

    The project attempts to avoid the problem of false positives and provide added application level security and service by seperating secure and non secure data in a database at application level.

    Downloads: 0 This Week Last Update: See Project
  • Auth MemCache Cookie

    This is a apache v2.0 authentication module. Based on html form authentication and cookie authentication session. Cookie session are stored in memcache deamon. Can be used has an simple "Single Signe-On" (SSO). All the code source and the bug tracking has migrated to github: https://github.com/ZenProjects/Apache-Authmemcookie-Module All the documentation are here: https://zenprojects.github.io/Apache-Authmemcookie-Module/

  • Big Freakin' Haystack Initiative

    This project seeks nothing less than a total change in perimeter defense. This project will provide applications to create millions of virtual hosts (aka honeyhet) tied to an IDS/IPS system(s), permitting dynamic network camouflage and defense.

    Downloads: 0 This Week Last Update: See Project
  • Catnip

    Servlet container extensions that help web developers write full featured Java web applications.

    Downloads: 0 This Week Last Update: See Project
  • Cibet Icon

    Cibet

    The cibet framework provides developers with functionality of the following topics: - Dual Control (4-Eyes Principle ...) - Extended Authorisation (Enhance Spring Security, Apache Shiro ...) - Extended Logging (Archiving, tracking, Redo, Restore ...)

    Downloads: 0 This Week Last Update: See Project
  • EGADS OSS Enterprise Archival Solution

    EGADS - Enterprise Grade Automated Data Storage The primary purpose of EGADS is to create secure backup solution using commonly available tools and protocols, that can scale from 1 computer to several thousand.

    Downloads: 0 This Week Last Update: See Project
  • Grid delegation

    A certificate delegation system for Grid computing.

    Downloads: 0 This Week Last Update: See Project
  • Gryptonite Icon

    Gryptonite

    Cross-platform encrypted password and file database

    A user-friendly, cross-platform utility for managing and accessing your most secret data. It stores passwords and whole files, so it can literally store any information you want to keep secret. Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. It's not just easy to use, it's also highly secure. Security experts will be happy to know that it uses AES with CCM and has a solid security concept.

  • OLPACS

    OLPACS - Open Logical and Physical Access Control System is a open source software and open hardware system that supports the integration of the physical and logical security of an organization.

    Downloads: 0 This Week Last Update: See Project
  • Open Portal Guard

    OpenPortalGuard is a flexible, extensible, and massively scalable access control system for portals. It provides single-sign-on features for username/pw and smartcards as well as declarative access control.

    Downloads: 0 This Week Last Update: See Project
  • Proxy Pal For Networks

    PPFN, it is also a tool to be hidden from any server log, these developers know what they have to do. Do you? If you download this ultimate package you will be able to enjoy the web knowing that you would be safe. So be safe, learn to surf right - PPFN

    Downloads: 0 This Week Last Update: See Project
  • RDonasco Security

    A security application that can be used as a shared service

    For full details of this application, please visit https://bitbucket.org/rdonasco/rdonasco-lib/wiki/Home The source codes for this project can be downloaded by cloning its repository which uses mercurial. ** Use the following clone command: ** hg clone https://bitbucket.org/rdonasco/rdonasco-lib

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you