Security Software

OS OS

    • More...
  • More...
    • More...
    • More...
    • More...

Category Category

    • More...
    • More...
    • More...
    • More...
      • More...
    • More...
    • More...

License License

    • More...
  • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

    • More...
  • More...
    • More...

Database Environment Database Environment

    • More...
    • More...
    • More...

Freshness Freshness

Security Software

  • 2018 Thomson Reuters Top 100 Global Tech Leaders 2018 Thomson Reuters Top 100 Global Tech Leaders Icon
    2018 Thomson Reuters Top 100 Global Tech Leaders Icon

    See how tech-sector leadership is being redefined in today’s complex business environment.

    21st century technology-sector leadership requires not only optimal financial performance but also attention to many other factors, including management and investor confidence, risk and resilience, legal compliance, innovation, environmental impact, social responsibility, and reputation. Successfully managing these areas may determine which tech companies have the fortitude to succeed in the future. Here’s to those that made the list.
    Who are today’s top global tech leaders?
    Read the report
  • Alfa Autorun Killer Icon

    Alfa Autorun Killer

    Alfa Autorun Killer 3.0 , the latest version of the famous software that helped millions of people around the world protecting their USB flash Memories and their PCs from the dangerous autorun viruses.

  • SSLScan - Fast SSL Scanner

    SSLScan queries SSL services, such as HTTPS, in order to determine the ciphers that are supported. SSLScan is designed to be easy, lean and fast. The output includes prefered ciphers of the SSL service, the certificate and is in Text and XML formats.

  • tcpreplay

    edit and replay captured network traffic

    tcpreplay is a suite of tools to edit and replay captured network traffic.

  • Free Key Generator

    Very small and quick password generator.

  • IPsec Tools

    User-space IPsec tools for various IPsec implementations. A port of KAME's libipsec, setkey, and racoon to the Linux OS. Also works on various BSD systems.

  • Mole Icon

    Mole

    Automatic SQL Injection Exploitation Tool

    Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a boolean query based technique. The Mole uses a command based interface, allowing the user to indicate the action he wants to perform easily. The CLI also provides auto-completion on both commands and command arguments, making the user type as less as possible.

  • cryptsync Icon

    cryptsync

    A folder sync tool with encryption

    Synchronizes multiple folders with each other, keeping them up-to-date. One folder of each pair is kept encrypted. Very useful when using cloud storage tools like SkyDrive, GDrive or Dropbox.

  • sqlmap Icon

    sqlmap

    sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers.

  • opendkim

    Open source DKIM library, MTA filter implementation and associated tools.

  • iDecryptIt Icon

    iDecryptIt

    iOS firmware tools

    When you update your iDevice, iTunes downloads a firmware file. If you open up the firmware, you will find many small files along with one big one. That big one is the (encrypted) filesystem (i.e. the one that is installed on the device). If you use iDecryptIt on the file, iDecryptIt will decrypt it. The decrypted file can then be extracted with (the included) 7-Zip or mounted as a virtual hard drive with certain tools. ** Please do not contact me asking for keys. The keys provided by iDecryptIt are NOT my own work, but the contributors to The iPhone Wiki. ** Support for the other files contained in the firmware is coming.

  • DiskCryptor

    DiskCryptor - fully open solution to encrypt all partitions, including system. The program is a replacement for proprietary DriveCrypt Plus pack and PGP WDE.

  • Cyberoam iView - Open Source SIEM Icon

    Cyberoam iView - Open Source SIEM

    Cyberoam iView; the Intelligent Logging & Reporting solution provides organizations network visibility across multiple devices to achieve higher levels of security, data confidentiality while meeting the requirements of regulatory compliance. To know more about Cyberoam and it’s security solutions visit us at www.cyberoam.com.

  • VPN Lifeguard Icon

    VPN Lifeguard

    To protect yourself when your VPN disconnects. It blocks Internet access and any others specified applications. It prevents unsecured connections after your VPN connection goes down and reload applications when reconnecting the VPN.

  • Keytool

    Keytool is an Eclipse plugin that maintains keystores and certificates. It allows you to create certificates and put them in a keystore. You can from Eclipse, open and inspect certificates that are stored as .cer, or in a given keystore.

  • Yet Another (remote) Process Monitor Icon

    Yet Another (remote) Process Monitor

    Yet Another Process Monitor (YAPM) is a powerful process viewer for Windows that monitors the services & processes, their modules, threads, handles, windows, TCP/UDP connections... etc. running on local system or on any of the computers on your network.

  • steghide

    Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests.

  • BASE

    BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.

  • VisualCodeGrepper V2.1.0

    Code security review tool for C/C++, C#, VB, PHP, Java and PL/SQL.

    VCG is an automated code security review tool for C++, C#, VB, PHP, Java and PL/SQL which is intended to drastically speed up the code review process by identifying bad/insecure code. It has a few features that should make it useful. In addition to performing some more complex checks it also has a config file for each language that basically allows you to add any bad functions (or other text) that you want to search for. It attempts to find phrases within comments that can indicate broken code and it provides stats and a pie chart (for the entire codebase and for individual files) showing relative proportions of code, whitespace, comments, '€˜ToDo'€™ style comments and bad code. I've tried to produce something which searches intelligently for buffer overflows and signed/unsigned comparison in C, violations of OWASP recommendations in Java code, etc. Current version: 2.1.0

  • KPEnhancedEntryView

    An enhanced entry view panel for KeePass

    This is a plugin to KeePass <http://www.KeePass.info> to provide an enhanced entry view. For the rationale and design behind this project, see the forum post linked to as the homepage

  • GnuPG for OSX

    GnuPG 2.2.x Distribution for Mac OS X

    This project provides the toolsets as well as full-featured releases of GnuPG 2.2.x for Mac OS X.

    Downloads: 628 This Week Last Update: See Project
  • ccrypt

    ccrypt is a command-line utility for encrypting and decrypting files and streams. It replaces the old Unix crypt utility. Ccrypt provides strong encryption, based on the Rijndael cipher, the cipher that is also used in the Advanced Encryption Standard.

  • Matriux Icon

    Matriux

    Matriux is a GNU/Linux, Debian based security distribution designed for penetration testing and cyber forensic investigations. It is a distribution designed for security enthusiasts and professionals, can also be used normally as your default OS.

  • Malzilla

    Malzilla is an advanced malware-hunting tool specialized for hunting web-based exploits, decode obfuscated JavaScripts etc.

  • PyLoris

    A protocol agnostic application layer denial of service attack.

    PyLoris is a scriptable tool for testing a server's vulnerability to connection exhaustion denial of service (DoS) attacks. PyLoris can utilize SOCKS proxies and SSL connections, and can target protocols such as HTTP, FTP, SMTP, IMAP, and Telnet.

  • sftp4tc

    A file system plugin Total Commander

    This plugin allows you to combine the power of Total Commander with the security of SFTP (using SSH) and the comfort of PuTTY.

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you