Security & Utilities Software

OS OS

    • More...
    • More...
  • More...
    • More...

Category Category

    • More...
    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

    • More...
  • More...

Freshness Freshness

Security & Utilities Software

  • The Sight of Sound The Sight of Sound Icon
    The Sight of Sound Icon

    ­ Improve VoIP Visibility from SIP to RTP

    Cloudbased voice solutions are common in enterprise networks and frustrating for operations teams to manage. Simplify VoIP monitoring by having a proactive analysis of on-prem, hybrid and UCaaS voice services. Try the ThousandEyes VoIP monitoring solution today, free.
  • Infrastructure and application monitoring for Azure Infrastructure and application monitoring for Azure Icon
    Infrastructure and application monitoring for Azure Icon

    Monitor your Azure® infrastructure, application, and systems performance side by side in a single enterprise-monitoring tool

    So, you moved your applications and servers to Azure, but are they running any better and are you able to justify the investment? Without proper monitoring, you’re left guessing if application and server performance has improved, and when issues arise, you’re left scrambling to locate the root cause. SolarWinds® Server & Application Monitor (SAM) can monitor your Azure workloads side by side with your on-premises workloads to help ensure optimal application performance.
  • Tor Browser Icon

    Tor Browser

    Browser for using Tor on Windows, Mac OS X or Linux

    Tor Browser enables you to use Tor on Windows, Mac OS X, or Linux without needing to install any software. Tor is a software that bounces your communications around a distributed network of relays run by volunteers. This effectively prevents anyone watching your Internet connection from learning what sites you visit; it prevents the sites you visit from learning your physical location; and allows you access to sites which are blocked. Tor Browser can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained (portable).

  • TrouSerS

    TrouSerS - An open-source TCG Software Stack implementation.

  • Safe Exam Browser Icon

    Safe Exam Browser

    Safe Exam Browser is a webbrowser-environment to carry out online-exams safely. The software changes any computer into a secure workstation. It regulates the access to any utilities and prevents students from using unauthorised resources.

  • xca

    X Certificate and Key management is an interface for managing asymetric keys like RSA or DSA. It is intended as a small CA for creation and signing certificates. It uses the OpenSSL library for the cryptographic operations.

  • Fugu SSH Icon

    Fugu SSH

    Mac OS X frontend for OpenSSH's sftp/scp tools

  • Communicate & Connect with Ring Central's VoIP Solution Communicate & Connect with Ring Central's VoIP Solution Icon
    Communicate & Connect with Ring Central's VoIP Solution Icon

    Cloud Powered Business Phone System

    • Unrivaled value & reliability in one solution
    • Unlimited Calls/SMS/Conferencing/Fax
    • Trusted by 350,000+ Businesses
  • Netdisco

    Full-featured enterprise network management tool

    Netdisco is an SNMP-based L2/L3 network management tool designed for moderate to large networks. Routers and switches are polled to log IP and MAC addresses and map them to switch ports. Automatic L2 network topology discovery, display, and inventory.

  • IBM's TPM 2.0 TSS

    IBM's TPM 2.0 TSS

    This is a user space TSS for TPM 2.0. It implements the functionality equivalent to (but not API compatible with) the TCG TSS working group's ESAPI, SAPI, and TCTI API's (and perhaps more) but with a hopefully simpler interface. It comes with over 110 "TPM tools" samples that can be used for scripted apps, rapid prototyping, education, and debugging. It also comes with a web based TPM interface, suitable for a demo to an audience that is unfamiliar with TCG technology. It is also useful for basic TPM management. See the below link for operating system, platform, and hardware support. See the companion IBM TPM 2.0 at https://sourceforge.net/projects/ibmswtpm2/ and attestation at projects/ibmtpm2acs I welcome (1) bug reports, (2) documentation requests, (3) suggestions for ECC tests, and (4) requests for features for which you have an immediate need. See the wiki for additional support - additions to the documentation.

  • IPsec Tools

    User-space IPsec tools for various IPsec implementations. A port of KAME's libipsec, setkey, and racoon to the Linux OS. Also works on various BSD systems.

  • Hcon Security Testing Framework Icon

    Hcon Security Testing Framework

    Open Source Penetration Testing / Ethical Hacking Framework

    HconSTF is Open Source Penetration Testing Framework based on different browser technologies, Which helps any security professional to assists in the Penetration testing or vulnerability scanning assessments.contains webtools which are powerful in doing xss(cross site scripting), Sql injection, siXSS, CSRF, Trace XSS, RFI, LFI, etc. Even useful to anybody interested in information security domain - students, Security Professionals,web developers, manual vulnerability assessments and much more.

  • sftp4tc

    A file system plugin Total Commander

    This plugin allows you to combine the power of Total Commander with the security of SFTP (using SSH) and the comfort of PuTTY.

  • IBM's Software TPM 2.0

    This project is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 source code donated by Microsoft, with additional files to complete the implementation. See the wiki for additional support - additions to the documentation. See the companion IBM TSS at https://sourceforge.net/projects/ibmtpm20tss/

    Downloads: 481 This Week Last Update: See Project
  • Open Cryptographic Framework for Linux

    A Linux port of the OpenBSD/FreeBSD Cryptographic Framework (OCF). This port aims to bring full asynchronous HW/SW crypto acceleration to the Linux kernel, OpenSwan, OpenSSL and applications using DES, 3DES, AES, MD5, SHA, PublicKey, RNGs and more.

  • encrypt Icon

    encrypt

    cross-platform, encryption application

    encrypt is a multi-platform, file encryption application. Binary packages are currently provided for Arch, Debian, Fedora, MS Windows, Android and OS X. For further details, including the latest source code, visit https://albinoloverats.net/projects/encrypt

  • GoldBug - Encrypted Communications Icon

    GoldBug - Encrypted Communications

    Instant Chat Messenger. E-Mail-Client. Websearch. Filetransfer.

    GoldBug is a decentralized & secure communication suite that offers an integrated e-mail client, an instant messenger, and a file transfer utility. Also included is a URL-distribution and search tool. ● English Manual: https://en.wikibooks.org/wiki/Goldbug ● Deutsches Handbuch: https://de.wikibooks.org/wiki/Goldbug ● http://marjorie-wiki.de/wiki/GoldBug_(Instant_Messenger%29 ● Audit: BIG SEVEN Study https://sf.net/projects/goldbug/files/bigseven-crypto-audit.pdf ● Source: https://github.com/textbrowser/spot-on. ● Compiling-Info: https://sourceforge.net/p/goldbug/wiki/compiling/ ● GoldBug has Server-Software included and also works with the Android Chat Server "SmokeStack" under: https://smokeappope.sourceforge.io/ By 2017-09-30 the project test server has been discarded, please learn to set up your own crypto chat server or use the POPTASTIC function (crypto chat over IMAP/POP3 servers)

    Downloads: 158 This Week Last Update: See Project
  • The Nemesis Project

    The Nemesis Project is designed to be a command line based, portable human IP stack for UNIX-like and Windows systems. The suite is broken down by protocol, and should allow for useful scripting of injected packets from simple shell scripts.

  • xpy Icon

    xpy

    xpy is a small software, securing your Windows 2000/XP/2003 installation and protecting your privacy. In addition to so-called Antispy features, it disables common security threats (RPC/DCOM, LMHash) and increases your Windows performance.

  • Open1X

    Open1X is an open source implementation of the IEEE 802.1X protocol. This project includes support for the supplicant, while other projects (e.g., FreeRADIUS) provide support for the authentication server.

  • pam_ssh_agent_auth

    PAM module which permits authentication for arbitrary services via ssh-agent. Written with sudo in mind, but like any auth PAM module, can be used for for many purposes.

  • ArpON Icon

    ArpON

    ARP handler inspection

    ArpON (ARP handler inspection) is a Host-based solution that make the ARP standardized protocol secure in order to avoid the Man In The Middle (MITM) attack through the ARP spoofing, ARP cache poisoning or ARP poison routing attack.

  • WAPI Icon

    WAPI

    WAPI, or WOMBAT API, is a SOAP-based API built in the context of the WOMBAT FP7 project (http://www.wombat-project.eu) to facilitate the remote access and exploration of security-related datasets.

  • OVAL Interpreter

    The OVAL Interpreter is a freely available reference implementation that demonstrates the evaluation of OVAL Definitions. Based on a set of OVAL Definitions the interpreter collects system information, evaluates it, and generates a detailed OVAL Results file. Developed to demonstrate the usability of OVAL Definitions and to ensure correct syntax and adherence to the OVAL Schemas by definition writers, it is not a fully functional scanning tool nor an enterprise scanning tool. It is a simplistic, command-line application that has the ability to execute OVAL Content on an end system. To learn more about organizations that provide OVAL content and tools or otherwise support the OVAL Language, please see the OVAL Adoption Program (http://oval.mitre.org/adoption/).

  • cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon-128, SM4, Speck-128, Threefish, Twofish, and Rijndael (AES) with all block and key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. MAC functions: HMAC, Poly1305. Key derivation functions: PBKDF2, scrypt, Argon2 (Argon2i, Argon2d, Argon2id). Includes sample command-line tools: - 'digest' - for calculating and verifying file checksum(s) using any of the supported hash algorithms (similar to md5sum or RHash). - 'cryptor' - for file encryption using Serpent-256 algorithm (CBC mode with HMAC). Check out the cppcrypto web site linked below for programming documentation and performance comparison.

  • Harbour MiniGUI Extended Edition. Icon

    Harbour MiniGUI Extended Edition.

    Harbour MiniGUI Extended Edition. HARBOUR MINIGUI SOURCE WITH HMGS-IDE (IDE VISUAL TO MAKE WIN32 APLICATIONS WITH HARBOUR) UNNOFICIAL BUILD WITH EXTENDED NEW FEATURES.

  • The ASN.1 Compiler

    Go to github.com/vlm/asn1c for the latest version.

    This ASN.1 compiler turns ASN.1 specifications into C code. The asn1c is shipped together with conformant BER/DER/XER/PER codecs. The X.509, GSM TAP3, MEGACO, RRC and LDAP encoding and decoding examples are part of the source code distribution. NOTE: THE asn1c PROJECT HAS LARGELY MOVED TO GITHUB: http://github.com/vlm/asn1c

  • hexinject Icon

    hexinject

    Hexadecimal and raw packet injector and sniffer.

    Hexadecimal and raw packet injector and sniffer. Can be easily combined with other tools to provide a powerful cmdline framework for raw network access.

  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you