Showing 53 open source projects for "reference"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 1

    CryptoLibraryRefImpl

    encapsulates secure crypto algorithms for easy use

    This library exposes security functionality to the programmer, such as random number generation, hashing, salted hashing, message authentication code, symmetric encryption, asymmetric encryption, hybrid encryption, digital signature and in-memory protection. The library is accompanied by a sophisticated reference implementation, that demonstrates how to make use of the CryptoLibrary.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Google Authenticator OpenSource

    Google Authenticator OpenSource

    Open source version of Google Authenticator (except the Android app)

    ...The app flow revolves around enrolling secrets via QR codes or manual entry, storing them securely on-device, and rendering rotating codes synchronized by time. Because it uses open standards, it interoperates with virtually any service that supports TOTP/HOTP, not just Google properties. The project also serves as a reference for implementers who want to understand enrollment UX, secret provisioning, and code generation at the application layer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    OpenVPN for Docker

    OpenVPN for Docker

    OpenVPN server in a Docker container complete with an EasyRSA PKI CA

    ...Extensively tested on Digital Ocean $5/mo node and has a corresponding Digital Ocean Community Tutorial. Pick a name for the $OVPN_DATA data volume container. It's recommended to use the ovpn-data- prefix to operate seamlessly with the reference systemd service. Users are encourage to replace example with a descriptive name of their choosing. Initialize the $OVPN_DATA container that will hold the configuration files and certificates. The container will prompt for a passphrase to protect the private key used by the newly generated certificate authority. Miscellaneous write-ups for advanced configurations are available in the docs folder. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    The OVAL Interpreter is a freely available reference implementation that demonstrates the evaluation of OVAL Definitions. Based on a set of OVAL Definitions the interpreter collects system information, evaluates it, and generates a detailed OVAL Results file. Developed to demonstrate the usability of OVAL Definitions and to ensure correct syntax and adherence to the OVAL Schemas by definition writers, it is not a fully functional scanning tool nor an enterprise scanning tool. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    Ampare PHP Encoder

    Ampare PHP Encoder

    Protect and Obfuscate Encode PHP File From reading ( Opensource )

    Protect and Obfuscate Encode PHP File From reading ( Opensource ) Ampare PHP Encoder is a simple and easy to use PHP File Encoder which prevent newbies from reading it automatically. However , Advance and Intermediate able to find way to decode it. FAQ My script doesn't run or terminate Reference : http://php.net/manual/en/function.eval.php When Eval() function run an error code it will automatically terminate so the script doesn't run. Use it only 100% clean code. Please use PHP-Protect Script for better security too . by php protect it first and encode with our software so it second layer protection http://www.phpprotect.info/ I take my free time doing support. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    NinthTest JCA Provider

    A security provider for the Java™ Cryptography Architecture

    The NinthTest JCA Provider is a security provider for the Java™ Cryptography Architecture, focused on supporting candidate, reference, academic, and experimental cryptographic algorithms and security services. Because the services provided by the NinthTest JCA Provider are exploratory/provisional in nature, the NinthTest JCA Provider is not recommended for use in security-critical applications or environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    KeePass Password Counter

    KeePass Plugin to count and show entries sharing a password

    KeePass Plugin to count and show entries sharing a password
    Leader badge
    Downloads: 10 This Week
    Last Update:
    See Project
  • 8
    BTS Pentesting Lab

    BTS Pentesting Lab

    BTS Pentesting Lab - a deliberately vulnerable Web application

    ...Currently, the app contains the following types of vulnerabilities: *SQL Injection *XSS(includes Flash Based xss) *CSRF *Clickjacking *SSRF *File Inclusion * Code Execution *Insecure Direct Object Reference *Unrestricted File Upload vulnerability *Open URL Redirection *Server Side Includes(SSI) Injection and more... Java version of this application can be found here: https://sourceforge.net/p/javavulnerablelab/
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    An open-source Java-based XCCDF reference implementation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 10

    Free Tiger

    Free fast implementation of tiger and the TTH algorithms

    Free Tiger aims to provide a fast C implementation of the tiger and TTH hash algorithms in order to provide a performing hasher. It also aims to provide pure implementations of tiger and when possible TTH in other languages for reference.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    nsrlquery

    Provides tools to interface with NIST's NSRL RDS.

    The National Institutes of Science and Technology maintains the National Software Reference Library. As part of this, they keep track of SHA-1 hashes of millions of known pieces of software (the "Reference Data Set"). Unfortunately, there are very few tools to help users query the NSRL RDS. That's where nsrlquery comes in.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    SkunxTools

    WebApp Pentest Tool

    ...In its current phase it currently scans google dorks and tests for sql vulnerabilities. Once urls are harvested from google dorks they are saved to a log file for future reference. One a sql check is run, the vulnerable URLs are saved to a seperate log file. View the readme in /docs for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The CPE Reference Implementation is a freely available application that demonstrates the naming and matching schemes of the CPE specification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A simple proof of concept brute forcer that depends on weak key systems depending on interest I might add more to make it more useful for things other then a reference
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Rasea
    An acronym for cRoss-plAtform accesS control for Enterprise Applications. Rasea aims to become a reference in access control as a service based on the RBAC model.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 16
    Aimed for web app security with hope of quick reference. WAS papers are scattered among hundreds of resources, some of which are likely to be broken links in some time. All sec pros wish their papers reach the whole world widely for perfect security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ISO18013 Electronic Driving License Java reference implementation. The project implements the host API for reading out ISO compliant electronic driving licenses and a Java Card applet that implements the standard on a smart card.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    opacity
    The Open Protocol for Access Control Identification and Ticketing with privacY, is a standard suite of Key Establishment and Authentication protocols based on ECC and AES, for optimized contactless transactions and simple PKI based Key management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A suite of source and binary programs to test the capabilities of code analysis tools. A reference implementation of x86 binary analysis in C# is also included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The IEEE 1619 Committee open-source reference implementations of encryption algorithms, plus testing and certification suites, for each encryption algorithm included in the standard.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Isolated Execution is a software reference implementation of the security through isolation concept. It brings a contained environment where malware can run without affecting the whole system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    SELinux reference policies
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Knowngoods Report Generator is a set of shell scripts and a Makefile which generate plain text reports about modified files on your system. It does this by the use of checksum reference files which can be found at http://www.knowngoods.org/download.html f
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    grIDS is a management system for Security Engineers. grIDS integrates snort as the IDS, nessus as the vulnerability scanner, a port reference, a host information database, and canned reports into a web-based management system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    ...====>Due to the age of the code, the cryptography should not be used in any new products.<==== This repository may be deleted on or after June 30, 2020. CDSA is a security middleware specification and reference implementation that is open source, cross-platform, interoperable, extensible, and freely exportable
    Downloads: 0 This Week
    Last Update:
    See Project