Showing 5378 open source projects for "vx-linux"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 1

    strobe

    STROBE cryptographic protocol framework

    Note: this is alpha-quality software, and isn't ready for production use. STROBE is a lightweight framework for cryptographic protocols. It supports encryption/decryption, hashing, pseudorandom generation and message authentication. It integrates these components in an innovative way that makes secure protocol design relatively simple. With the included elliptic curve code, STROBE additionally supports asymmetric key exchange and digital signature creation and verification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    OP Fingerprinting Script (OPFS)

    OP Fingerprinting Script (OPFS)

    An overpowered JavaScript browser fingerprinting library

    OPFS is a browser fingerprinting library for creating persistent, unique and long-lasting digital fingerprints without depending on ever-changing variables such as the user agent string commonly used in other browser fingerprinting libraries. As such, the fingerprint does not change most of the time when a user upgrades their browser to the current version. OPFS uses some novel methods not well known before the publishing of this repo that allow the creation of a likely completely unique...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Fast Wipe

    Fast Wipe

    Fast Wipe

    - Fast Wipe: wipe files and/or free hd space FAST! - Fast wipe has also secure deletion! wipe&fswipe now supports up to 12 different wipe standards. - It works from command line: windows and linux os available. - Works on any mounted partition. - Added windows installer - Completely Rewritten and Improved - Fixed windows execution usn
    Downloads: 8 This Week
    Last Update:
    See Project
  • 4
    yubikey-agent

    yubikey-agent

    yubikey-agent is a seamless ssh-agent for YubiKeys

    yubikey-agent is a seamless SSH agent specifically built for secure hardware tokens such as YubiKey (and other PIV tokens). It aims to replace the standard SSH agent with a version tailored for these security devices; the key is generated on the hardware token (so it can’t be extracted), every session requires a PIN and a physical touch, and the agent is resilient to unplugging, sleep/suspend, and restarts. Setup is simple, one command and one environment variable, and then the agent just...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 5

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes:...
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    StarHackIt

    StarHackIt

    StarHackIt: React/Native/Node fullstack starter kit

    StarHackIt: React/Native/Node full-stack starter kit with authentication and authorization, data backed by SQL, the infrastructure deployed with GruCloud.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    The_Deck_Linux

    Portable Penetration Testing Operating System

    It is an Portable Penetration Testing Operating System designed for Beagle Bone AI. It is an debian based operating system fully packed with all latest Hacking Tools. The Root file system used in this Deck Linux is Ubuntu 20.04 LTS. It can be installed in Beagle Board AI and can use as a replacement for Laptop, Desktop. It can be placed on a drone too. It has a pre-installed MeshDeck (written by Philip Polstra) so it can be runned in a ZigBee network. We can attacks from up to a mile away using multiple devices connected via 802.15.4 networking (MeshDeck).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Pentest-Tools

    Pentest-Tools

    A collection of custom security tools for quick needs.

    Pentest-Tools is a collection of penetration testing scripts and utilities designed to help security professionals and ethical hackers perform vulnerability assessments. It includes a wide range of tools for tasks like web scraping, reconnaissance, data extraction, and network analysis. The suite is modular, allowing users to choose the tools that best fit their specific pentesting needs, from web application analysis to network penetration testing.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    OpenSC

    OpenSC

    OpenSC - tools and libraries for smart cards

    The OpenSC project allows the use of PKCS #15 compatible SmartCards and other cryptographic tokens (e.g. the Aladdin eToken) in UNIX compatible operating systems. OpenSC can use PC/SC Lite or CT-API as its reader backend. https://github.com/OpenSC/OpenSC/wiki/OpenSC-Services
    Leader badge
    Downloads: 94 This Week
    Last Update:
    See Project
  • Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure Icon
    Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure

    Native application identity and user-based security for your Azure cloud

    Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
    Get a free trial
  • 10

    Virus-Scan-And-More-VSAM-

    A short batch script that allows a user to scan their pc!

    This is a batch script that allows the user to scan their pc for may different things and much much more! I don't remember a lot about this but it should be able for the user to scan for viruses! (this uses windows defender to work)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Offensive Reverse Shell

    Offensive Reverse Shell

    Collection of reverse shells for red team operations

    The Offensive Reverse Shell Cheat Sheet is a compilation of reverse shell payloads useful for red team operations and penetration testing. It provides ready-to-use code snippets in various programming languages, facilitating the establishment of reverse shells during security assessments.​
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12

    TeamPass

    Collaborative Passwords Manager

    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Shield GraphQL

    Shield GraphQL

    A GraphQL tool to ease the creation of permission layer

    GraphQL Shield helps you create a permission layer for your application. Using an intuitive rule-API, you'll gain the power of the shield engine on every request and reduce the load time of every request with smart caching. This way you can make sure your application will remain quick, and no internal data will be exposed. Implement your server permissions in a clear and deterministic way and let it guard access to your schema. Shield lets you create a handful of rules and compose them into...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    ArkID

    ArkID

    Enterprise IDaaS/IAM platform system

    Rich plug-in, quickly builds an exclusive IDaaS/IAM platform. Easy integration into all your applications. Unified identity, certification, and authority management system. Extendable bottom application architecture based on Plug-in interpolation. You can flexibly and quickly add new functions to the main program without changing the main program. Achieve centralized and safe storage of corporate organizational structure and identity information of massive personnel. Establish a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    SHA256-in-C

    SHA-256 Algorithm Implementation in C

    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    Angry IP Scanner

    Angry IP Scanner

    A cross-platform network scanner that is fast and simple to use

    Angry IP scanner is fast and friendly network scanner for Windows, Linux, and Mac. It is very extensible, allowing it to be used for very wide range of purposes, with the primary goal of being useful to network administrators.
    Leader badge
    Downloads: 2,484 This Week
    Last Update:
    See Project
  • 17
    Shennina

    Shennina

    Automating Host Exploitation with AI

    Shennina is an automated host exploitation framework. The mission of the project is to fully automate the scanning, vulnerability scanning/analysis, and exploitation using Artificial Intelligence. Shennina is integrated with Metasploit and Nmap for performing the attacks, as well as being integrated with an in-house Command-and-Control Server for exfiltrating data from compromised machines automatically. Shennina scans a set of input targets for available network services, uses its AI engine...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    bitcrypt

    bitcrypt

    BitCrypt is a free ultra-strong encryption that hides text in bitmaps.

    BitCrypt is an elegant encryption that allows for the storage and transmission of information in an undetectable manner. The program processes a user-supplied text encrypting it with the Rijndael cipher and storing it in a user-selected bitmap image. This later step is called steganography, which means "to hide invisibly". If you intend to store sensitive information invisibly, you may encrypt it with BitCrypt and keep it in a picture image. Alternatively, if you intend to pass...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Confused

    Confused

    Tool to check for dependency confusion vulnerabilities

    A tool for checking for lingering free namespaces for private package names referenced in dependency configuration for Python (pypi) requirements.txt, JavaScript (npm) package.json, PHP (composer) composer.json or MVN (maven) pom.xml. confused simply reads through a dependency definition file of an application and checks the public package repositories for each dependency entry in that file. It will proceed to report all the package names that are not found in the public repositories - a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    cryptmount

    Linux encrypted filesystem management tool

    cryptmount allows management and user-mode mounting of encrypted filing systems on GNU/Linux systems. Filesystems & crypto-swap can be on either raw block devices or ordinary files, with device-mapper (dm-crypt) and loopback devices setup automatically.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 21
    Sureness

    Sureness

    A simple and efficient security framework

    Sureness allows you to security any server written with jvm modern frameworks such as Spring, Spring Boot, Spring WebFlux, Javalin, Quarkus, Micronaut, Solon, Jfinal or Ktor as well as frameworks for Kotlin. The essence of Sureness is to use an interceptor (like a servlet filter or Spring interceptor) to intercept all rest requests for authenticating and authorizing. So no matter any framework, as long as it has an interceptor, it can integrate with sureness. Sureness uses Exception Handling...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Compare Backup Drive Hashes

    A spreadsheet to aid in detecting ransomware-corrupted files

    This project offers an Excel spreadsheet, available for download through the Files tab (above). The spreadsheet allows the user to compare two sets of file hashes, such as the hashes for files on two different data drives. The spreadsheet's Instructions tab provides step-by-step guidance through that comparison process. The purpose of the file hash comparison is to identify files whose contents have changed. For example, the files on an up-to-date data drive may be compared against the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    dirsearch

    dirsearch

    Web path scanner

    An advanced command-line tool designed to brute force directories and files in webservers, AKA web path scanner. Wordlist is a text file, each line is a path. About extensions, unlike other tools, dirsearch only replaces the %EXT% keyword with extensions from -e flag. For wordlists without %EXT% (like SecLists), -f | --force-extensions switch is required to append extensions to every word in wordlist, as well as the /. To use multiple wordlists, you can separate your wordlists with commas....
    Downloads: 12 This Week
    Last Update:
    See Project
  • 24
    Gophish

    Gophish

    Open-Source Phishing Framework

    ...Designed for businesses and penetration testers, Gophish lets you quickly and easily set up and launch phishing campaigns, track results and set up security awareness training. Gophish works on most platforms, including Windows, Mac OS X and Linux.
    Downloads: 25 This Week
    Last Update:
    See Project
  • 25
    KeyHolder password manager

    KeyHolder password manager

    Store your passwords in an offline encrypted file!

    Need a JDK to run, download it here: https://www.oracle.com/java/technologies/downloads/
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB