Security & Utilities Software

OS OS

    • More...
  • More...
    • More...
    • More...
    • More...

Category Category

    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...

User Interface User Interface

  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • Focus on your Business with an integrated Business Cloud Focus on your Business with an integrated Business Cloud Icon
    Focus on your Business with an integrated Business Cloud Icon

    Reliable & Secure Communications Systems

    • 90+ features: video, file management, cloud phones
    • 99.999% financially backed uptime SLA
    • Expert support, certified by J.D. Power 2 years in a row
  • CRM / Lead Management / Marketing Automation CRM / Lead Management / Marketing Automation Icon
    CRM / Lead Management / Marketing Automation Icon

    More than just software – it’s a solution customized specifically for your business. We strive to give customers exactly what they want.

    Don’t sign a long-term contract. At LeadMaster we earn your business every day with a month-to-month agreement. Solutions start at just $500 for the first month and $150/month after that for up to 3 users. Additional users are always available, again month-to-month. For the last 20 years we’ve helped people from virtually every industry increase sales by automating & improving their sales & marketing process and we think we can help you too.
  • ettercap Icon

    ettercap

    Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis. Development has been moved to GitHub, https://github.com/Ettercap/ettercap

  • The Sleuth Kit

    The Sleuth Kit is a C++ library and collection of open source file system forensics tools that allow you to, among other things, view allocated and deleted data from NTFS, FAT, FFS, EXT2, Ext3, HFS+, and ISO9660 images.

  • Hyenae Icon

    Hyenae

    Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant. Hyenae will be continued here: https://sourceforge.net/projects/jhyenae/

    Downloads: 86 This Week Last Update: See Project
  • Defa Protect HTML5 Video From Download Icon

    Defa Protect HTML5 Video From Download

    Prevent and Protect Your HTML5 Video, Music , Audio From Download Free

    Defa Protector is A Simple PHP and Wordpress Plugin To Protect and Prevent Video Save As From Browser and Some Video Grabber. There is 100% Guaranteed Protection and There might be some tradeoff but If you care about Digital Rights Management of Your Video and Music Content. This Project is for you. Defa Protector 6.7.1 Revamp Code For Better Performance To The Bone. We almost rewritten this project from scratch.

    Downloads: 82 This Week Last Update: See Project
  • GoldBug - Encrypted Communications Icon

    GoldBug - Encrypted Communications

    Instant Chat Messenger. E-Mail-Client. Websearch. Filetransfer.

    GoldBug is a decentralized & secure communication suite that offers an integrated e-mail client, an instant messenger, and a file transfer utility. Also included is a URL-distribution and search tool. ● English Manual: https://en.wikibooks.org/wiki/Goldbug ● Deutsches Handbuch: https://de.wikibooks.org/wiki/Goldbug ● http://marjorie-wiki.de/wiki/GoldBug_(Instant_Messenger%29 ● Audit: BIG SEVEN Study https://sf.net/projects/goldbug/files/bigseven-crypto-audit.pdf ● Source: https://github.com/textbrowser/spot-on. ● Compiling-Info: https://sourceforge.net/p/goldbug/wiki/compiling/ ● GoldBug has Server-Software included and also works with the Android Chat Server "SmokeStack" under: https://smokeappope.sourceforge.io/ By 2017-09-30 the project test server has been discarded, please learn to set up your own crypto chat server or use the POPTASTIC function (crypto chat over IMAP/POP3 servers)

    Downloads: 74 This Week Last Update: See Project
  • Monitor your Cisco ASA like an expert Monitor your Cisco ASA like an expert Icon
    Monitor your Cisco ASA like an expert Icon

    See how Network Insight™ for Cisco® ASA, a feature of SolarWinds Network Performance Monitor and Network Configuration Manager, can help.

    Get visibility into the health and performance of your entire Cisco ASA environment in a single dashboard. View VPN tunnel status and monitor firewall high availability, health, and readiness. Automatically discover and filter within ACLs, show rule hit counts, and detect shadow and redundant rules. Automate the monitoring and management of your ASA infrastructure in a fully integrated solution. Try it free for 30 days!
  • pam_ssh_agent_auth

    PAM module which permits authentication for arbitrary services via ssh-agent. Written with sudo in mind, but like any auth PAM module, can be used for for many purposes.

  • yaSSL

    yaSSL, or yet another SSL, is an embedded ssl library for programmers building security functionality into their applications and devices. yaSSL is highly portable, and runs on standard as well as embedded platforms(QNX, ThreadX, VxWorks, Tron) yaSSL is still available but no longer being developed. Current development on the same project continues under wolfSSL. Visit yaSSL Home above for the latest stable release.

  • PortFusion Icon

    PortFusion

    Distributed reverse / forward proxy and tunneling solution for TCP.

    PortFusion is a minimalistic, cross-platform, transport-layer distributed reverse / forward proxy for TCP written in Haskell + LLVM and released under GPLv3. A single package that makes the most of each platform by tapping into their unique capabilities, combining this power with an intuitive interface, beautiful design and Haskell's excellent support for unprecedented levels of concurrency and parallelism. It strives for the smallest source code size (< 500 lines) while delivering maximum throughput with near zero overhead.

    Downloads: 11 This Week Last Update: See Project
  • sqlcake Icon

    sqlcake

    Automatic SQL injection and database information gathering tool.

    Automatic dump database & interactive sql shell tool dumps the current database structure including tables and columns and turns into an interactive mysql prompt with extra features. Written in Ruby.

    Downloads: 9 This Week Last Update: See Project
  • The Gobbler

    Gobbler: A tool to audit DHCP networks Includes DHCP rogue server detection, DHCP DoS, distributed spoofed port scanner using DHCP to obtain many source IP addresses, mulitple arp scans, filtered port detection, spoofed OS detection (nmap + port 0)

    Downloads: 7 This Week Last Update: See Project
  • One Backup & Disaster Recovery Solution for Any Need One Backup & Disaster Recovery Solution for Any Need Icon
    One Backup & Disaster Recovery Solution for Any Need Icon

    SherWeb Online Backup Is Your Easy Solution for Cloud & Local Backups. The App Is Free, Pay Only for the Cloud Data Storage.

    With the diversity of IT solutions used, managing backup and disaster recovery can turn very complex for a business. SherWeb Online Backup simplifies everything. You back up servers, desktops, virtual machines and smart devices, plus popular applications and Office 365 data – all from a single web-based console. Active Protection, the embedded anti-ransomware feature, adds a security layer while the Cloud-to-Cloud feature saves network bandwidth.
    Are you an IT professional looking for a great security solution to resell?
    Try it FREE for 30 days!
  • CSVHashCrack Suite Icon

    CSVHashCrack Suite

    Multi hash crack suite

    This script is capable of cracking multiple hashes from a CSV-file like e.g. dumps from sqlmap. Over 17.000 md5-hashes in a CSV-file get cracked with a 14.300.000 lines wordlist in less then 1 min. Lines wich cant get cracked with the wordlist get stored in a .leftToCrack-File to further process with another Wordlist or the bruteforce-tool. In addition to the wordlist-cracker I created also a bruteforce-tool named CSVHashBrutforcer.

    Downloads: 5 This Week Last Update: See Project
  • GoodCrypto private server

    Secure mail + Tor gateway

    Protect your company's email and browsing with your GoodCrypto private server. * Protects email metadata and resists traffic analysis * Automatic encryption, decryption, and key management * All private keys stay on *your* server * Users don't change their email or browser software * Blocks web malware * Runs on your private server * Completely decentralized

    Downloads: 5 This Week Last Update: See Project
  • Catnip

    Servlet container extensions that help web developers write full featured Java web applications.

    Downloads: 2 This Week Last Update: See Project
  • SYPPS Icon

    SYPPS

    small yet powerful php shell

    SYPPS - small yet powerful php shell is another PHP shell for pentesting

    Downloads: 2 This Week Last Update: See Project
  • Sudoscript - Audited Shells

    Introduction Sudoscriptd/sudoshell are a pair of Perl scripts that provide an audited shell using sudo(8) and script(1).

    Downloads: 2 This Week Last Update: See Project
  • Vulnerability Scanning Cluster

    The VSC is a PHP/MySQL/Apache Interface for Nessus 2.x. It allows users to hierarchically manage hosts, scanning policies, and request automated immediate, future/reccuring scans of a host or group of hosts, view scan reports and generate metrics.

    Downloads: 2 This Week Last Update: See Project
  • single-honeypot

    Single-honeypot is a powerfull tool, for security interest about the estudies of techniques of breaking systems. This is, a singular or little honeypot for test your networks for hostiles visitors. This made in perl script. Simulate different servi

    Downloads: 1 This Week Last Update: See Project
  • CRUSADE

    A Bash script for downloading and installing additional Clamav definition files.

    Downloads: 0 This Week Last Update: See Project
  • CSPN

    CSPN(Cryptanalysis of Substitution-Permutation Networks) is the Crypto(Cryptography) tool that will be used for Linear and differential Cryptanalysis of AES,DES and all the encryption standards that will have the SPN as its skeleton model.

    Downloads: 0 This Week Last Update: See Project
  • Encrypting Safe Icon

    Encrypting Safe

    This is free Java desktop application to keep your note in safe from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source to another in confidential manner.

  • File Encryption Tool

    IMPORTANT -- This is an old project that is no longer supported and should not be relied upon for serious applications. If your looking for encryption software, I suggest OpenSSL or GnuPG which are better equipped.

    Downloads: 0 This Week Last Update: See Project
  • Fileprivacy Icon

    Fileprivacy

    Fileprivacy easily encrypts your files

    Fileprivacy is a small tool which easily encrypts and decrypts files with common algorithms like AES, Blowfish, Triple DES and RSA. You can either use passwords or keyfiles. Since Fileprivacy is coded in Java it should run on all popular operating systems. #######BETA 2####### Bugfix - Beta 1 stopped working if filename was too short or long - added .exe file ####### NOTE ####### This is an early beta implying there are some issues left. The Keygenerator stops working if you change the algorithm after setting the keylength. It has to be restarted for further use. Because there are no start scripts, yet, you have to start Fileprivacy from console by typing: java -jar Fileprivacy-1.0_<version>.jar ####### ALSO NOTE ####### The author of this software is not responsible for the safety of your data. There is no guarantee that one or more of the implemented algorithms cannot be compromised.

    Downloads: 0 This Week Last Update: See Project
  • HINTS

    Hierarchical communications and management system for multiple NIDS and HIDS products.

    Downloads: 0 This Week Last Update: See Project
  • KISS - Kernel Improved Security System

    KISS is a kernel-side host-oriented security tool, which may bring you file integrity checking, file and process hiding and actions handling on special internal events (using a tiny scripting language).

    Downloads: 0 This Week Last Update: See Project
  • OpenInfreno (Open Source RootWars)

    OpenInfreno is an open source root wars toolkit & engine designed to score attackers accessing a network of victims. This project consists of a score server and several tools, as well as documentation and implementation information.

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you