Showing 755 open source projects for "proxy server windows"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    TC-Wrapper is a Windows service which opens/closes TrueCrypt containers automatically using an USB-Stick with a key file. Containers are even mounted if you are not logged into your system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Open source DRM for MPEG-4 and MPEG-2 adhering to ISO/MPEG IPMP open standards (MPEG IPMP Hooks and IPMP-X), ISMAcryp and OMA DRM 2 specs. Includes CA, PKI, DOI mgmt, ISMA streaming, license server, encoding/encryption, player, plugin architecture, etc
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    A library for accessing a Time Stamp Authority Server using both HTTP and TCP protocols. It implements RFC3161.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    RevolvingProxy is a cross platform HTTP Proxy application that is designed to be installed on a server that has been assigned multiple IP addresses. Each connecting client is assigned a different IP address for security testing or other purposes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    A Spring.NET security framework port of the Java based Spring security framework, Acegi Security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This program allows you to use SSH, TELNET, VNC, FTP and any other Internet application from behind HTTP(HTTPS) and SOCKS(4/5) proxy servers. This "proxifier" provides proxy server support to any app.
    Leader badge
    Downloads: 33 This Week
    Last Update:
    See Project
  • 7
    Bisker is a simple cgi scanner written in C language for GNU/linux platforms. It's an useful tool to find critical or dangerous cgis/folders/files on local and remote machines (also through proxy).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    This program allows you to establish cryptographically secure and decentraliced conversations over untrusted telecommunication links and IRC networks.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    The goal of the project is to develop Role Based Access Control software which can be used in any application. The software can be deployed as a server which can cater to multiple applications. Rules can be written for fine grained access control.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 10
    NetworkTools has 2 components: A protocol analyzer which plays a TCP client or server or pipeline, which sits between a client and server and shows how they communicate. A port scanner can scan a range of IP addresses and ports. See screenshots.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    Secure Addressbook is based on the JavaScript implementation of Wheeler & Needham's Block TEA (Tiny Encryption Algorithm) by Chris Veness. It allows maintaining secure records even the on shared hosting server, as data en/decrypted at browser only.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Distributed rainbow table generating
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Proxy Glue lets users glue together socks5, socks4, connect, http, and cgi proxies into one big field of potential paths, with configuration done right from the browser.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Web-based SiteMinder admin web application that works remotely from the Policy Server. Two versions available which is struts and dwr(ajax) based. Great for integration into other web admins.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A Cisco(c) centric VMPS Server interface. A web based (PHP) interface to manage host registration for Dynamic VLAN policys. Also provides configuration change management for the VMPS configuration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    DNA is an open, flexible and extensible deep network analyzer software server and software architecture for gathering and analyzing network packets, network sessions and applications protocols, passively off enterprise class networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Antispyd is an HTTP/HTTPS threats filtering proxy server written in pure C under Linux. The main goal of the project is to develop a free, secure, fast and extensible solution to fight against current Web threats, anonymize and control web traffic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    RewritingProxyTME is a powerful Perl module intended to be used with Apache + Mod_perl in order to provide a full "Reverse Proxy" implementation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    J2EP is a reverse proxy running on a J2EE engine. The proxy is written in java and was originally designed with Tomcat in mind, but any engine should work fine. A set of basic mapping rules are included but they can easily be extended to your own needs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Java Based Cryptographic P2P Messaging Client, is based on a client-server architecture. The Client is made in SWING. The server is text based. Server keeps tabs on presense and the users public keys. Presentation: http://varun.accosted.net/talks.php
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    WebScarab for Eclipse is an extensible framework for analyzing applications that communicate using the HTTP protocol. It includes an HTTP monitor and an HTTP proxy for recording all messages between your machine and remote servers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A set of security extensions for JavaServer Faces to solve common access control problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Map local drive to remote Windows network share (or Samba server) on the Internet. Connection is secured by using an encrypted SSH connection as transportation.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    TSIC is a comprehensive solution for secure Internet connection against all kinds of threats and harmful programs for Windows platforms and ReactOS. It's features include a built-in FIREWALL,IDS,Parental and privacy Control and also antivirus.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    KINEC Is Not Encrypted Chat is a client/server chat program designed to keep you secure. It uses strong algorithms for encryption and authentication and will not compromise security.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB