Security & Utilities Software


  • More...
    • More...

Category Category

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

User Interface User Interface

  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • Want to improve your MSP’s revenue? Price your services right. Want to improve your MSP’s revenue? Price your services right. Icon
    Want to improve your MSP’s revenue? Price your services right. Icon

    Get the ebook, The Managed Services Pricing Guide 2.0 to get industry best practices on pricing managed services.

    You choose software for your IT business so it makes you money. The margins must be good enough to justify the cost. SolarWinds® RMM was priced to give you the margins you need to earn a healthy amount of monthly recurring revenue. Download our all-new Managed Services Pricing Guide 2.0 to find what revenue to expect for your services, including light monitoring, web protection, patching management, backup and more.
  • Monitor Your Most Critical Cloud & SaaS Applications Monitor Your Most Critical Cloud & SaaS Applications Icon
    Monitor Your Most Critical Cloud & SaaS Applications Icon

    Get insights into the performance of applications and services such as AWS, Salesforce, Office 365 and WebEx.

    With a view into both web and network health, you'll be able to pinpoint the cause of an outage instantly, whether it's within your network, a provider's network or the SaaS application. Save time, track SLAs and clear tickets faster.
    Are you involved with your company's network performance/operations team?
    Try It FREE!
  • BleachBit Icon


    deletes junk files to free disk space and improve privacy

    BleachBit frees disk space and maintains privacy. Cleans cache, Internet history, temporary files, logs, cookies, Firefox, Google Chrome, Flash, Windows, Linux, and more. Downloads are at and source code is at GitHub.

  • DAR - Disk ARchive Icon

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing. DAR knows how to perform full, differential, incremental and decremental backups. It provides testing, diffing, merging, listing and of course data extracting from existing archives. Archive internal's catalog, allows very quick restoration of a even a single file from a very large, eventually sliced, compressed and encrypted archive. Dar saves *all* UNIX inode types, takes care of hard links, sparse files as well as Extended Attributes (MacOS X file forks, Linux ACL, SELinux tags, user attributes), it has support for ssh and is suitable for tapes and disks (floppy, CD, DVD, hard disks, ...) more details at:

  • OWASP Mutillidae II Icon

    OWASP Mutillidae II

    OWASP Mutillidae II Web Pen-Test Practice Application

    OWASP Mutillidae II is a free, open source, deliberately vulnerable web-application providing a target for web-security enthusiast. Mutillidae can be installed on Linux and Windows using LAMP, WAMP, and XAMMP. It is pre-installed on SamuraiWTF and OWASP BWA. The existing version can be updated on these platforms. With dozens of vulnerabilities and hints to help the user; this is an easy-to-use web hacking environment designed for labs, security enthusiast, classrooms, CTF, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, corporate web sec training courses, and as an "assess the assessor" target for vulnerability assessment software.

    Downloads: 941 This Week Last Update: See Project
  • Crypto++

    Crypto++ is a free C++ class library of cryptographic schemes originally written by Wei Dai. The library is now maintained by a community of volunteers. The Crypto++ website is located at, and the source code is located at The repository was moved in response to developer requests for Git access. The SourceForge site will remain in "read only" mode for historical purposes. You should visit the Crypto++ website at or GitHub at to view the latest news, download the latest source code, file bugs and request features. We thank SourceForge for hosting us through the years.

  • Msieve

    Msieve is a C library implementing a suite of algorithms to factor large integers. It contains an implementation of the SIQS and GNFS algorithms; the latter has helped complete some of the largest public factorizations known

  • Communicate & Connect with Ring Central's VoIP Solution Communicate & Connect with Ring Central's VoIP Solution Icon
    Communicate & Connect with Ring Central's VoIP Solution Icon

    Cloud Powered Business Phone System

    • Unrivaled value & reliability in one solution
    • Unlimited Calls/SMS/Conferencing/Fax
    • Trusted by 350,000+ Businesses
  • ssdeep

    Recursive computing and matching of Context Triggered Piecewise Hashing (aka Fuzzy Hashing). Supports Windows, *nix, BSD, OS X, etc.

  • RetroShare Icon


    RetroShare is a cross-platform, secured and decentralized communication system. It lets you to securely chat, share photos, videos, and more with family and friends, using OpenPGP to authenticate peers and OpenSSL to encrypt all communication.

  • Dark Fantasy - hack tool Icon

    Dark Fantasy - hack tool

    A port scanner, password cracker, DDOS tool, Web spider, for hacking.

    DDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking information. Email scraper: To get all emails related to a webpage IMDB Rating: Easy way to access the movie database. Both .exe(compressed as zip) and .py versions are available in files. The video above is unofficial and not in English. If some one wants to support the development please make a youtube video for Dark fantasy - hack tool. Post link in review or email me at I will add facebook hacking(phishing method) to the tool if you guys help me.

    Downloads: 199 This Week Last Update: See Project
  • SpiderFoot Icon


    Open Source Intelligence Automation.

    SpiderFoot is an open source intelligence automation tool. Its goal is to automate the process of gathering intelligence about a given target, which may be an IP address, domain name, hostname or network subnet. SpiderFoot can be used offensively, i.e. as part of a black-box penetration test to gather information about the target or defensively to identify what information your organisation is freely providing for attackers to use against you.

  • pev Icon


    The PE file analysis toolkit

    pev is a multiplatform toolkit to work with PE (Portable Executable) binaries. Its main goal is to provide feature-rich tools for proper analyze binaries, specially the suspicious ones. Go to for most up to date code!

  • Microsoft Office 365 monitoring simplified Microsoft Office 365 monitoring simplified Icon
    Microsoft Office 365 monitoring simplified Icon

    Monitor your Office 365® (O365) Exchange™ mailboxes and system applications with the SolarWinds® Server & Application Monitor unified platform.

    SolarWinds Server & Application Monitor allows you to monitor your hybrid IT applications and systems. Monitor Microsoft® Office 365 Exchange side by side on your on-premises Exchange server and other applications. Check, track, and report on O365 user/shared mailbox growth, users over quota, archived mailboxes, inactive mailboxes, mobile device, mailbox groups, and more. You can also monitor Microsoft portal access to help ensure you’re meeting your SLAs.
  • Virtual Smart Card Architecture

    We moved to see you there!

    Downloads: 102 This Week Last Update: See Project
  • pam_ssh_agent_auth

    PAM module which permits authentication for arbitrary services via ssh-agent. Written with sudo in mind, but like any auth PAM module, can be used for for many purposes.

  • encrypt Icon


    cross-platform, encryption application

    encrypt is a multi-platform, file encryption application. Binary packages are currently provided for Arch, Debian, Fedora, MS Windows, Android and OS X. For further details, including the latest source code, visit

  • mendelson OFTP2 Icon

    mendelson OFTP2

    Implementation of the OFTP2 protocol (RFC 5024)

    The mendelson OFTP2 is a JAVA-based open source OFTP2 solution. It contains a logging- and configuration GUI (SWING) and supports encryption, digital signatures, message compression, SSL, certificate exchange, message routing, mail notification

    Downloads: 33 This Week Last Update: See Project
  • mod_csrf Icon


    Apache module to prevent cross-site request forgery.

    mod_csrf is a module for the Apache Web server. It prevents cross-site request forgery attacks to vulnerable HTML forms.

  • Password Keeper + Generator Icon

    Password Keeper + Generator

    Free portable cross-platform multi-user password manager

    Free portable cross-platform multi-user password manager, 100%-pure Java. DB for each pkg-user is encrypted and protected by pkg-user hash. In addition - passwords in DB are stored in encrypted form. In result - stored passwords are double encrypted ! Passwords of pkg-users are not stored in program - stored and compared only hashes. Support md2, md5, sha1, sha256, sha384 and sha512 hash. Support export DB to CSV, HTML, XLS or XML and import from CSV, XLS or XML. Simple and intuitive GUI - Graphical User Interface. PKG use crypto security random generator. Developed with Java Spring Framework. Tested in Windows/Linux. Need Jre-1.8 -

  • ClamSAP

    ClamSAP exists of two 'C' shared libraries which link between ClamAV and the Virus Scan Interface (VSI) of SAP (offical name: NW-VSI). A SAP application can use the ClamAV engine to scan for malicious uploads in HTTP uploads for example.

    Downloads: 16 This Week Last Update: See Project
  • SecretManager Icon


    FR : Outil de partage des mots de passe, EN : Sharing tool passwords

    FR : Cet outil permet de stocker (AES 256) et de partager des mots de passe. Les mots de passe sont placés dans des Groupes de Secrets. Les Groupes de Secrets sont associés à des Profils utilisateurs. Enfin, on associe les Profils utilisateurs à des Utilisateurs. Ainsi les utilisateurs ont accès aux mots de passe pour lesquels ils sont autorisés. Tous les accès aux secrets sont tracés et il est possible de mettre sous alarme l'accès aux secrets. *** Virtual machine available on : EN : This tool allows you to store (AES 256) and share passwords. Passwords are placed in groups. Groups are associated with user profiles. Finally, we associate user porfiles with users. So users have access to passwords for which they are authorized. In addition, it is possible to supervise the access to secrets (alarm and all access).

  • PKCS#11 Wrapper for Python

    PyKCS11: a complete PKCS#11 wrapper for Python, created using the SWIG compiler. API documentation:

    Downloads: 7 This Week Last Update: See Project
  • mod_sslcrl Icon


    Automatically updates and applies certificate revocation lists

    mod_sslcrl is a module for the Apache Web server implementing CRL (Certificate Revocation Lists) verification automatically downloading new CRL files from the corresponding CA.

    Downloads: 6 This Week Last Update: See Project
  • smartIDS

    Lightweight intrusion detection for IoT and embedded devices.

    The aim of the project is a lightweight intrusion detection library for embedded devices which supports MSP430 and ARM Cortex based devices. Features include DSP/SIMD support, IoT and embedded protocols, distributed operation, event and history management, tool supported configuration and visualization. There is a Java port that supports less features.

    Downloads: 6 This Week Last Update: See Project
  • truecrypt-wxGTK3

    Truecrypt Ported to wxGTK3

    This is the final release of truecrypt (7.1a) ported to use wxGTK3 instead of 2.8. None of the underlying code has changed, instead the compile errors due to modern distros using and updated version of wxGTK have been resolved (for now).

    Downloads: 5 This Week Last Update: See Project
  • Vulnerawa Icon


    Vulnerawa stands for vulnerable web application, though I think it should be renamed Vulnerable website. Unlike other vulnerable web apps, this application strives to be close to reality as possible. To know more about Vulnerawa, go here See how to setup vulnerawa in Wamp server. To see how to set up a web app pentest lab with Vulnerawa.

    Downloads: 4 This Week Last Update: See Project
  • HOFAT - Hash Of File And Text calculator Icon

    HOFAT - Hash Of File And Text calculator

    HOFAT - graphical Hash Of File And Text calculator, 100%-pure Java

    HOFAT - graphical Hash Of File And Text calculator utility, 100%-pure Java, portable and cross-platform. Support md2, md5, sha1, sha256, sha384 and sha512 hashes. Simple and intuitive GUI - Graphical User Interface. Developed with Java Spring Framework. Tested in Windows/Linux. Need Jre-1.8 -

  • OpenPACE Icon


    Cryptographic library for EAC version 2

    We moved to see you there!

    Downloads: 2 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you