Security & Utilities Software

OS OS

    • More...
  • More...
    • More...
    • More...
    • More...

Category Category

    • More...
    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

    • More...
  • More...

Database Environment Database Environment

Freshness Freshness

Security & Utilities Software

  • Join us at Talend Connect! Icon
    Join us at Talend Connect! Icon

    Get your tickets to the best data-driven event of the year!

    May 7 – May 9. Use discount code TCCommunity2018 for $200 off.
  • Develop killer analytical applications Icon
    Develop killer analytical applications Icon

    Try the Yellowfin analytics platform, built for developers.

    Yellowfin provides developers with the tools to easily build stunning analytical applications. Connect and blend multiple data sources and deploy onto any environment at scale, with access to hundreds of web services to integrate as you need. Yellowfin offers industry leading capabilities that are trusted by thousands of organizations globally. Try Yellowfin for free to see how easily you can develop killer analytical applications.
  • BleachBit Icon

    BleachBit

    deletes junk files to free disk space and improve privacy

    BleachBit frees disk space and maintains privacy. Cleans cache, Internet history, temporary files, logs, cookies, Firefox, Google Chrome, Flash, Windows, Linux, and more. Downloads are at www.bleachbit.org and source code is at GitHub.

  • ssdeep

    Recursive computing and matching of Context Triggered Piecewise Hashing (aka Fuzzy Hashing). Supports Windows, *nix, BSD, OS X, etc.

  • DAR - Disk ARchive Icon

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing. DAR knows how to perform full, differential, incremental and decremental backups. It provides testing, diffing, merging, listing and of course data extracting from existing archives. Archive internal's catalog, allows very quick restoration of a even a single file from a very large, eventually sliced, compressed and encrypted archive. Dar saves *all* UNIX inode types, takes care of hard links, sparse files as well as Extended Attributes (MacOS X file forks, Linux ACL, SELinux tags, user attributes), it has support for ssh and is suitable for tapes and disks (floppy, CD, DVD, hard disks, ...) more details at: http://dar.linux.free.fr/doc/Features.html

  • Anomos Icon

    Anomos

    Anomos is an anonymous, encrypted multi-P2P file sharing protocol, originally based on BitTorrent. See our homepage for more details.

  • Magstripper

    Magstripper is a magnetic card reader and decoder that takes raw waveform information from a magnetic audio head (soldered directly to a mono audio jack) and processes it via a mic input. It also includes a multi-user door lock access control system.

  • 2018 Network Intelligence Planning Guide Icon
    2018 Network Intelligence Planning Guide Icon

    Get insights on net neutrality, cloud readiness, security and WAN transformation.

    Networking is becoming cloudier, hybrid and more Internet-centric. IT managers now own user experience, whether they own the networks or not. Get our latest ebook to learn how network intelligence will help you adapt to a quickly changing Internet-centric environment.
    Are you involved with your company's network performance/operations team?
    Get Ebook
  • pev Icon

    pev

    The PE file analysis toolkit

    pev is a multiplatform toolkit to work with PE (Portable Executable) binaries. Its main goal is to provide feature-rich tools for proper analyze binaries, specially the suspicious ones. Go to https://github.com/merces/pev for most up to date code!

  • SpiderFoot Icon

    SpiderFoot

    Open Source Intelligence Automation.

    SpiderFoot is an open source intelligence automation tool. Its goal is to automate the process of gathering intelligence about a given target, which may be an IP address, domain name, hostname or network subnet. SpiderFoot can be used offensively, i.e. as part of a black-box penetration test to gather information about the target or defensively to identify what information your organisation is freely providing for attackers to use against you.

  • PHP Anti-Virus

    GPL PHP AntiVirus for webmasters. Scans your web server's file system for dangerous and malicious code in public HTML, PHP, CGI and text files, usually caused by defacement or security holes in shared hosting accounts.

  • ccsrch

    ccsrch is a tool that searches for and identifies unencrypted and contiguous credit card numbers (PAN) and track data on windows and UNIX operating systems. It will also identify the location of the PAN data in the files and record MAC times.

  • Hide & Reveal Icon

    Hide & Reveal

    Composed of a Java steganographic library and GUI to use steganography. Primarily intended for research communities on security and steganography to implement new dissimulation and steganalysis algorithms. More information at www.hidereveal.org

  • Ranked ‘Best App’ Password Manager by Apple and Google Icon
    Ranked ‘Best App’ Password Manager by Apple and Google Icon

    Still writing down passwords? Or rotating between a handful that you can remember? Not safe! Get Dashlane, It’s FREE!

    With all the accounts you have, remembering every single password is impossible. Dashlane protects your passwords and creates an easy, secure way to access all of your accounts on any device you own.
  • Hash Cracker

    Hash Cracker is an application developed in java swings that allows a user to crack MD2, MD5, SHA-1,SHA-256,SHA-384,SHA-512 hashes either using brute force or using wordlists of the user's choice based on the users choice.

  • raw2vmdk

    raw2vmdk is an OS independent Java utility that allows you to mount raw disk images, like images created by "dd", using VMware, VirtualBox or any other virtualization platform supporting the VMDK disk format.

  • Simple HTTP Scanner

    Simple HTTP Scanner is a creation made for web site pen testing. You can check for directories and files on the remote web server and get some server information like the webserver running and other skills.

    Downloads: 30 This Week Last Update: See Project
  • WiKID Strong Authentication System Icon

    WiKID Strong Authentication System

    Two-factor authentication system

    The WiKID Strong Authentication System is a public-key based two-factor authentication system. It is a flexible, extensible, and secure alternative to tokens, certs and passwords. Application & API support exists for Java, ASP, PHP, Ruby, OpenVPN, TACACS+, etc. Read our eGuide on how to setup your network with two-factor authentication: http://www.wikidsystems.com/learn-more/two-factor-authentication-white-papers

  • Quadodo Login Script

    This is a free PHP login script that allows users to log in and sign up for pages on your website. You can have unlimited members, page, groups and permission masks. The administration panel and group panel use AJAX for fast functionality.

  • mendelson OFTP2 Icon

    mendelson OFTP2

    Implementation of the OFTP2 protocol (RFC 5024)

    The mendelson OFTP2 is a JAVA-based open source OFTP2 solution. It contains a logging- and configuration GUI (SWING) and supports encryption, digital signatures, message compression, SSL, certificate exchange, message routing, mail notification

    Downloads: 22 This Week Last Update: See Project
  • Password Cracker Icon

    Password Cracker

    Crack the encrypted passwords (MD5,SHA, etc....)

  • tcpview (aka wirefox) Icon

    tcpview (aka wirefox)

    Common network dump analyzer tool to extract application data and pretty show. It reassembles and shows HTTP/SMTP/POP3/IMAP etc files. Please donate if you want this to be a candy.

  • Easy Triple-DES

    This is a simple ANSI-C implementation of Triple-DES (as described in NIST Special Publication 800-67.) This implementation also includes an 8-bit version that can be used in microcontrollers with memory constraints.

    Downloads: 18 This Week Last Update: See Project
  • Virtual Smart Card Architecture

    We moved to https://github.com/frankmorgner/vsmartcard see you there!

    Downloads: 18 This Week Last Update: See Project
  • ExploitMyUnion Icon

    ExploitMyUnion

    ExploitMyUnion is a tool written in Python with a PyQt user interface made to automate sql injection exploitation.

  • nipper - network infrastructure parser

    Nipper (Network Infrastructure Parser) open source tools to assist IT professionals with the configuration, auditing and managing of computer networks and network infrastructure devices.

    Downloads: 16 This Week Last Update: See Project
  • ASP .Net viewstate decoder / encoder +

    viewstate is a decoder and encoder for ASP .Net viewstate data. It supports the different viewstate data formats and can extract viewstate data direct from web pages. viewstate will also show any hash applied to the viewstate data.

    Downloads: 14 This Week Last Update: See Project
  • CartoReso

    CartoReso intends to facilitate enterprise computer network mapping.

  • PKIF

    The PKI Framework (PKIF) is a cross-platform library for performing PKIX-compliant certificate processing. It includes support for SCVP, OCSP, CMS and Timestamps. It uses Windows CAPI, NSS or Crypto++ for cryptographic services and hardware support.

    Downloads: 9 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you