Showing 1639 open source projects for "beta"

View related business solutions
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 1
    Win7 Log0n Changer

    Win7 Log0n Changer

    Change Your Windows 7 Logon Background And More With A Swift..

    Win7 Log0n Changer Is Most Secure And Efficient Program Designed To Change Your Windows 7 Logon Background Without Much Works. The Simple User Interface Will Make It Quicker And Less Boring To Change Your Login Screen Background In A Swift. With The Help Of Some Tools Win7 Log0n Changer Not Only Changes Logon Background, But Also It Could Change The Logon Screens Default Windows 7 Logo Into Any Logo You May Have Desire And So Could Capture The Logon Screen As An Image. FOR Win7...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 2
    IOS6 and recent iTunes updates have broken a few features. We have made some partial fixes, but they are not complete. If you'd like to help support our development, or take over the development please let us know. Explore the internal file structure of your iphone (or of a seized phone in the case of forensic teams) using either the iphone's own backup files or (for jail broken iphones) ssh. Viewing of plist, sqlite, and hex are supported. IOS 5 is now supported iOS 6 only partially...
    Downloads: 28 This Week
    Last Update:
    See Project
  • 3
    Hash Calculator

    Hash Calculator

    MD5/SHA1 file and string hash calculator

    Hash Calculator is a small tool to calculate hash values from files and string input. Only md5 and sha1 supported at the moment. Option to export hash results to a text file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    VMI Honeymon

    IDS/Honeypot monitor based on LibVMI and Volatility

    IDS/Honeypot monitor based on LibVMI and Volatility
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    AUKS is an utility designed to ease kerberos V credential support addition to non-interactive applications, like batch systems (LSF,Torque,...) or resource managers (Slurm,...). It includes a plugin for SLURM resource manager.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Password Manager+

    Password Manager+

    Password manager program that helps manage passwords.

    This is a very efficient password management program that makes managing your passwords very easy and flexible with groups and a database where all your passwords are securely stored. Features include efficient random password generator, with passwords generated from user choices (uppercase, digits...), view/close columns, copy username/password, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    WAPI
    WAPI, or WOMBAT API, is a SOAP-based API built in the context of the WOMBAT FP7 project (http://www.wombat-project.eu) to facilitate the remote access and exploration of security-related datasets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    SMPPS

    SMPPS

    Simple Multi Protocol Packet Sniffer - SMPPS

    SMPPS Project already in its Beta version to 0.9.9 almost in the final version be in the documentation and material help that missing as well as the necessary translations of such material. However, with great joy that I come to the dicer SMPPS this now rather towards what the expectations of the project believed that he would be able: Capture and log packages generate the following protocols without using libpcap, but just using BSD Sockets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Software library for development of Swedish Medical administrative applications involving secure communication and document handling. Implementation supports standards as CMS/SMIME and modern XML security standards from W3c, Oasis etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 10
    IdMUnit is an xUnit automated testing framework for Identity Management solutions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Sudoku Solver

    A simple sudoku solver !

    This program solves sudoku grids, using human techniques and brute force. It is written in c++ using Qt.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Certificate Helper
    Certificate-helper is a utility desktop application written in Java designed and created to assist (mainly developers) in creating and viewing keystores and digital certificates. This is done via a user interfaces implemented in Swing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Secret Keeper allows you to store the user names and passwords to the many websites and applications that you need them for. This information is protected with a password that you choose. Includes a manual on how to use it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    OhCrypt Encryption Tool
    OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Serpent. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. It demonstrates state of the art of cryptology techniques, such as password hashing and salt. Ohcrypt also features self-extractable and self-destructive encrypted files
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15

    SBH Software

    SBH Software Project's webpage.

    SBH Software Project's webpage. Here we upload our software, ALPHA versions, BETA versions and FULLY-FUNCTIONAL versions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Sguil's (pronounced sgweel) main component is an intuitive GUI that receives realtime events from snort/barnyard. It includes other components which facilitate the practice of Network Security Monitoring (NSM) and event driven analysis of IDS alerts.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17

    Keylogger BETA version

    A small application , like a keylogger (save in .txt)

    Put this app on the victim PC and this software will be save all words in a .txt file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Itilect FTP Proxy

    Itilect FTP Proxy

    Provide users with a managed temporary access to arbitary FTP

    This tool allows you to set proxied access for your users, using predefined FTP accounts. System works like this: Users connects to FTP proxy just like they do with a regular FTP, but using specially formed string as a username (string, that includes their internal profile name and desired target FTP) and their internal password. If they are allowed to access this host, proxy will establish connection with a target FTP and authenticate using real credentials. After that, server will act...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    pam_duration

    Set limits on per-day total usage for Linux/Unix users

    pam_duration provides a module for the Pluggable Authentication Module (PAM) authorization framework that sets per-day limits on total usage by particular Linux/Unix users on a single system. Limits can be configured by day of the week, so, for example, weekend limits can be different from weekdays. It also provides a service to ensure logout when the specified time limit expires.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    SAMSON - Secure Authentication Modules

    SAMSON - Secure Authentication Modules

    Modules for remote attestation.

    The Secure Authentication Modules (SAMSON) are a set of modules designed to work together to provide a mechanism for doing remote authentication of a Linux system. It utilizes the IMA logic (introduced to the Linux kernel in 2.6.30) to perform a SHA-1 measurement of all executables prior to their being placed in execution, either as a program or as a memory mapped file mapped for execution. Utilizing the QUOTE feature of the TPM, it is possible to generate an Integrity measurement Report...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Averia Keylogger(Beta) v0.5

    Averia Keylogger(Beta) v0.5

    Keylogger made in C++

    this is a keylogger made in C++ by watching tuts on how to do this, this is in the beta version and more updates will come up!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    BlackBSD

    BlackBSD

    BlackBSD Is a NetBSD based LiveCD, with security tools on it, and fluxbox as a window manager. Beta Version 1.0 coming on soon. Packages on it. Nmap - port scanner http://nmap.org/ Nessus - Vulnerability detector http://www.tenable.com/products/nessus Air-Crack - Wireless Cracker http://www.aircrack-ng.org/ Ettercap - port sniffer http://ettercap.github.com/ettercap/ Iptraf - Network Monitor http://iptraf.seul.org/ Medusa - Login brute-forcer http://www.foofus.net/~jmk/medusa/medusa.html Snort - Intrucion Detection http://www.snort.org/ W3af - Web Application Attack http://w3af.org/ NetCat - networking utility http://netcat.sourceforge.net/ THC-Hydra - network logon cracker http://thc.org/thc-hydra/ Wapiti - Web application vulnerability scanner http://wapiti.sourceforge.net/ Rapid7 - http://www.rapid7.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    textcrypter

    textcrypter

    textcrypter is an encryption tool using vigenere cipher algorithm

    Textcrypter is an encryption tool using vigenere cipher algorithm. Vigenere use the same key/password to encrypt and decrypt a file (symmetric key cryptosystem). Result of the encryption process is a ciphertext in hexa number.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    egrsa

    egrsa

    rsa-elgamal comparison

    compare time of process between rsa and elgamal algorithm used to encryption and digital signature.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    VPNCHAINS

    VPNCHAINS is bash script which chains vpn connections

    VPNCHAINS is bash script which chains openvpn connections. You don't need to use virtual machine for this anymore. After chain is completed you can use internet in more secure and private way with all openvpn benefits. Completed chain looks like this: PC <-> OPENVPN1 <-> OPENVPN2 <-> OPENVPN# <-> INTERNET
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB