Security & Utilities Software

OS OS

  • More...

Category Category

License License

Translations Translations

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

User Interface User Interface

Database Environment Database Environment

Security & Utilities Software

  • SolarWinds is #1 in network monitoring. SolarWinds is #1 in network monitoring. Icon
    SolarWinds is #1 in network monitoring. Icon

    Reduce network outages and improve performance with advanced network monitoring software.

    SolarWinds® Network Performance Monitor (NPM) is the ONLY monitoring solution with NetPath™ for hop-by-hop visibility into your critical paths, on-premises and into the cloud. NPM also features PerfStack™, helping you accelerate identification of root cause by dragging-and-dropping network performance metrics on a common timeline for immediate visual correlation across all of your network data. See why we're the leader. Try it free for 30 days!
  • Find out what (or who) is slowing down your network Find out what (or who) is slowing down your network Icon
    Find out what (or who) is slowing down your network Icon

    Get comprehensive network bandwidth analysis and performance monitoring with SolarWinds® Bandwidth Analyzer Pack.

    Network slow, but you don't know the cause? Use Bandwidth Analyzer Pack (BAP) to monitor and analyze network bandwidth performance and traffic patterns. With BAP, you can identify which users, applications, and protocols are consuming the most bandwidth. You can also monitor Wireless LAN Controller traffic to see what applications and clients are using your wireless network. Try it free for 30 days!
  • Shiela USB Shield Icon

    Shiela USB Shield

    The Powerful Protection for PC Against Viruses from Removable Drives

    Shiela USB Shield is a powerful first line defense against virus from infected removable drives. * It locks autorun.inf and associate executable files in multiple instance * Delete/Freeze the shortcut file or clone file, and restores the original automatically. * It is free and open source. System Requirements 1) Windows 2000 or later 2) 256Mb RAM or higher 3) 1GHz Processor or faster 4) .NET Framework 2.0 or later must be installed

  • Java Vulnerable Lab - Pentesting Lab Icon

    Java Vulnerable Lab - Pentesting Lab

    a deliberately vulnerable Web application

    This is Vulnerable Web Application developed for course by Cyber Security and Privacy Foundation (www.cysecurity.org) for Java programmers The full course on Hacking and Securing Web Java Programs is available in https://www.udemy.com/hacking-securing-java-web-programming/ WAR file: ---------- https://sourceforge.net/projects/javavulnerablelab/files/latest/JavaVulnerableLab.war/download Virtualbox VM file: -------------------------- http://sourceforge.net/projects/javavulnerablelab/files/v0.1/JavaVulnerableLab.ova/download Credentials for the VM: ------------------------ Username: root Password: cspf Stand-alone file: (Run the Jar file directly) -------------- http://sourceforge.net/projects/javavulnerablelab/files/v0.2/JavaVulnerableLab.jar/download

    Downloads: 30 This Week Last Update: See Project
  • XOR encrypt

    Encrypt your text files with XOR cipher

    This is a windows standalone application. Encrypt your text(.txt) files with XOR cipher . A new version with a better UI and bug fixes is available http://sourceforge.net/projects/xorencrypt2/

    Downloads: 9 This Week Last Update: See Project
  • IT security resources  Icon

    IT security resources

    IT security resources for ethical hacking & penetration testing

    this collection of most used resources that will help you in ethical hacking and penetration testing. Collection of hacking tools and materials and all major type of attacks and tutorials.

  • Aes Edition hacker  Icon

    Aes Edition hacker

    Paranoia Text Encryption mantiene SMS, correos, mensajes de redes sociales, notas y cualquier otro texto a salvo de ladrones, hackers y fisgones. Basta con pegar texto copiado desde cualquier aplicación, o guardarlo en un archivo para usarlo más adelante. Paranoia Text Encryption keeps SMS, mails, messages from social networks, notes and any other text safe from thieves, hackers and snoopers. Simply paste text copied from any application, or save it in a file, use it more later

  • Get the Edge; Toad Edge Get the Edge; Toad Edge Icon
    Get the Edge; Toad Edge Icon

    Your next-gen toolset for MySQL database environments

    If your organization takes advantage of the cost-effective, flexible MySQL open source database platform, then you need a toolset that supports your commitment to open source relational databases.  Toad Edge for MySQL has what you need and helps you ramp up on MySQL quickly, ensuring faster time to value.
  • Astercertifications®. Icon

    Astercertifications®.

    Head of five afficertificates for astercertifications and repairs.

    _Astercertifications1212 personal registry, 03April2015 at: SourceForge.net; it is a communicant project type, on english language which, built-in Pass Over, for hypertransport connectivity. The objectives from this project are, the core astercertifications from six documents versus a identity theft11 by the Insurdaerrorism666; assisting online under Cordenated Application about. Astercertificate6-00-1212 and the Five Afficertificates5468 are ready logos and registered trade mark from: F. C. C. name integrity 2015; all rights reserved. Security issues from this project are the Sure Socked Liability applied to Cordined Application; all weather anywhere with non 'against parties' but, with his respective priorities. This project is addressed temporary under claims at: http://Astercertificate6251212.sf.net {Trusted Origens} ©Frank A. Nassau III; Apr.03/2015; all rights reserved. |Privacy Policy6251212|, |Warning DC VAP|

    Downloads: 0 This Week Last Update: See Project
  • MBar Shutdown Manager

    MBar Shutdown Manager is a free and opensource shutdown software.

    MBar Shutdown Manager is a free and opensource shutdown software. If you are downloading a torrent or a big file and need to shutdown your PC at a specific time, MBar Shutdown Manager is your best pick! It doesn't require high level computer knowledge and is very easy to use. REQUIRES .NET FRAMEWORK 2.0 or HIGHER!

    Downloads: 0 This Week Last Update: See Project
  • SkunxTools

    WebApp Pentest Tool

    This is an Alpha version of what is to become an all in one tool for pentesting of web applications. In its current phase it currently scans google dorks and tests for sql vulnerabilities. Once urls are harvested from google dorks they are saved to a log file for future reference. One a sql check is run, the vulnerable URLs are saved to a seperate log file. View the readme in /docs for more information.

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you