Showing 84 open source projects for "tiny core linux"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    ESSPEE - Penetration Testing & Forensics

    ESSPEE - Penetration Testing & Forensics

    (Android Forensics & Malware Analysis Included)

    ESSPEE - Extreme Security Scanning Penetration testing & Exploitation Environment Ubuntu 12.04 LTS (Precise Pangolin) is purposefully selected as the base Operating System to obtain supports from Ubuntu for a long duration (till Apr 2017). It is packed with featured security tools with very less resource consumption and higher degree of stability. Thanks to Back Track, Blackbuntu, CAINE and DEFT and many others for inspiration. Being a sole developer to this distro, I wish it...
    Leader badge
    Downloads: 6 This Week
    Last Update:
    See Project
  • 3

    Crypto

    A powerful data encrypting tool.Encrypt data inside files.

    Crypto encrypts data inside any file.Not only the data is encrypted but also hidden.You can choose any type of file and hide your valuable data inside it.But the host file's size does not increase.So none can notice that you have Gigabytes of secret data inside a tiny 10kb text file.Try it now.Totally free.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Winlock - Portable

    Winlock - Portable

    Portable Windows 8 Screen Lock and Powerful Security Solution

    ... don’t like something tell us and we will immediately fix it for you Core features - Replaces your old windows lock screen with a more secure and reliable one Windows 8 resemblance Quick and responsive Very tiny application and has a quick setup process View login attempts that have occurred Sends you an email if many failed attempts occur Shuts down the computer if multiple failed attempts occur Charms bar imported from windows 8 for easy access to settings
    Downloads: 0 This Week
    Last Update:
    See Project
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
    Learn More
  • 5
    The project aims at creating an enterprise-grade PKI/Trustcenter software supporting well established components like RDBMS and Hardware Security Modules. The core components are written in Perl. OpenXPKI is released under the Apache License v2. NOTE: Development resources have moved to https://github.com/openxpki/openxpki SF Mailing Lists are still active.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Solution to the classic riddle suppossedly proposed by Einstein. This solution is for the variant proposed by http://www.2ddepot.com/games/whoownsthefish/ (Spanish, no smoking references) Method is simple brute force for every permutation. In a intel core i5 M 560 @ 2.67GHz, program terminates in 2 minutes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    w3af
    w3af, is a Web Application Attack and Audit Framework. The w3af core and it's plugins are fully written in python. The project has more than 130 plugins, which check for SQL injection, cross site scripting (xss), local and remote file inclusion and much more. This project has been migrated to github! See details in our project site: http://w3af.org/
    Downloads: 48 This Week
    Last Update:
    See Project
  • 8
    The sandbox libraries (libsandbox & pysandbox) are an open-source suite of software components for C/C++ and Python developers to create automated profiling tools and watchdog programs. The API's are designed for executing and instrumenting simple (single process) tasks, featuring policy-based behavioral auditing, resource quota, and statistics collecting. The sandbox libraries were originally designed and utilized as the core security module of a full-fledged online judge system for ACM...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Data exchange is a core part of all cloud systems so it becomes necessarily important to control access to data that are confidential and whose integrity influences the state of the system at any time.It can be proven that the administrator in a IaaS can easily perform some hidden and malicious task on unsuspecting customer machine. This is attributed to the fact that he/she possesses the root privilege to do so and forms an attack. A cold boot attack can easily be lauched amongst other...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Free CRM Software With Something for Everyone Icon
    Free CRM Software With Something for Everyone

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    Think CRM software is just about contact management? Think again. HubSpot CRM has free tools for everyone on your team, and it’s 100% free. Here’s how our free CRM solution makes your job easier.
    Get free CRM
  • 10

    tickets

    pythonic kerberosish ticket system: easy to use, easy to subclass

    ...: provides core implementation of state-less Cross Site Request Forgery protection. Other use cases include ticketing object param values pointing at URL:s or services in HTML-objects such as Flash or Java Applets. This adds server-side choises to be made while preventing users from using arbitrary values. Severe testing is done and will be mandatory for core and every specific implementation. Every single bit is flipped and various ticket contents and flag combinations are permutated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    TinyCrypt is a simple secure program for encrypting files. The core encryption code is only 76 lines of C code, based on the well known ARC4-D(768) algorithm.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 12
    REAPER Forensics
    Rapid Evidence Acquisition Project for Event Reconstruction (REAPER) - Open Source forensic environment for the complete automation of the digital investigation process. At its core is Debian Live and the Open Computer Forensics Architecture (OCFA).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    sktrap (script kiddies trap) is a tiny intrusion detection system. Installed on the monitor server, it runs tests via ssh on its clients. Cracks very visible (files,open ports). Built in reply to and very succesful in finding real-world break-ins.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14
    OpenIKEv2 is an open source IKEv2 implementation written in C++. It is based in three core components: libopenikev2, libopenikev2_impl and openikev2
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    XTEA (eXtended Tiny Encryption Algorithm) support for db4o open source object database. XTEA is a block cipher that operates on a 64-bit block size with a 128-bit key. An extremely tiny but very fast encryption algorithm (with cycles less than 32 rounds)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    OhPass Password Generator
    Tiny but powerful java-based password generator, with different options for password length, use of numeric, alphanumeric or special characters randomly chosen. OhPass automatically copies the generated password to the clipboard.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Anoubis is a Security Suite which implements a secured environment for applications. The core of the suite is an Application Firewall alongside with a Sandbox. Mechanisms to assure the authenticity of files, directories and applications are provided.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A hardware supported hypervisor originally built for malware analysis. Features: Linux VM introspection, minimal detectability, small (~150KB), simple, and well documented. Can be used for other purposes. Support for Intel-VT & Windows coming soon.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    This project aims at full implementation of RFC4306 and associated RFCs. It is implemented as daemon process, as is custom for this type of software for Unix-like operating systems. Main target for daemon is Linux environment, specifically Fedora Core 5.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 20
    Sun's XACML Implementation is an access control policy evaluation engine written entirely in the Java(tm) programming language. It supports XACML 1.x and 2.0 core features, and provides a number of powerful extensions and extensibility points.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    TclTrf is an extension library to the script language tcl, as created by John Ousterhout. It extends the language at the C-and Tcl-with ``transformer''-commands to encode and compress data. Based on the stacked channels of the tcl core (ability inter
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22
    A procmail based antivirus filter for incoming mail servers on Unix. It is efficient and tiny. Supports UUE, Zip and Rar attachments, Base64 and Quoted-Printable encodings. Identifies viruses, PUAs and phishings using the ClamAV clamscan virus scanner
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    0 byte, is a SLAX modification to security. Download order: Boot directory: -slax.cfg -vmlinuz -initrd.gz -dban.bzi Slax directory: +base directory: -001-core -002-xorg -003-desktop -004-kdeapps -005-devel -008-0byte +modules directory -driverrak -segurt
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Tiny program to make a memory snapshot of a running process and also to print out some meta information like open file descriptors and used sockets. Useful for dumping malicious programs or live forensic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    BlowfishVHDL - free fully synthesizable Blowfish encryption algorithm hardware implementation.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project