Showing 7309 open source projects for "security"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1

    HiraPassword

    HiraPassword is a tool used to generate passwords and save them in a .txt file.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    KeyGuard

    KeyGuard

    A simple, secure and offline Password Manager App

    This is a simple, secure and offline Password Manager App made in C# & .NET Maui. Your passwords are safely stored with AES encryption. You can add, edit, delete and export your passwords. The project makes use of the MVVM (Models, Views, View Models) architecture.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    RandomPass

    RandomPass

    A random password generator that is highly customizable.

    RandomPass by LuciaSoft is a random password generator that is highly customizable. You can generate passwords of fixed or random length, given a minimum and maximum length. You can control the types of characters and the propensity of each type of character. All crucial information that is used to generate passwords can be hidden from view. The newly generated passwords can be manually or automatically copied to the clipboard.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Sobelow

    Sobelow

    Security-focused static analysis for the Phoenix Framework

    Sobelow is a security-focused static analysis tool for the Phoenix framework. For security researchers, it is a useful tool for getting a quick view of points-of-interest. For project maintainers, it can be used to prevent the introduction of a number of common vulnerabilities. Potential vulnerabilities are flagged in different colors according to confidence in their insecurity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    Unshackle

    Unshackle

    Tool to bypass windows and linux passwords from bootable USB

    Unshackle is an open-source tool to bypass Windows and Linux user passwords from a bootable USB based on Linux. Open-source tool to bypass windows and Linux passwords from bootable USB.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    boundman

    boundman

    Add rule to windows firewall to block inbound and outbound traffic

    Boundman is an advanced, user-friendly, and sleek application designed to take control over your network connections. It allows you to efficiently manage and block incoming and outgoing traffic for specific .exe files contained within a chosen folder and its subfolders. With its intuitive PyQt5 graphical interface and robust PowerShell scripts, Boundman provides seamless integration with the Windows Firewall for a powerful network management experience.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    KhadashPay-Firebase-Edition

    KhadashPay-Firebase-Edition

    KhadashPay is my attempt to build a payment system from scratch.

    KhadashPay is my attempt to build a payment system from scratch. KhadashPay Firebase Edition also incorporates the capabilities of https://sourceforge.net/projects/midbar-firebase-edition/ The official GitHub repository: https://github.com/Northstrix/KhadashPay-Firebase-Edition You can find the tutorial on https://www.instructables.com/DIY-IoT-Payment-System-With-Google-Firebase/ Version of KhadashPay with local storage of data is available on https://sourceforge.net/projects/khadashpay/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Complete autoclicker

    Complete autoclicker

    Autoclicker Keylogger Set and reload scripts, random delay + overlayer

    HardWorkingBruh is a powerful and versatile tool designed to streamline your repetitive tasks and actions on your computer. Say hello to your new bruh for automating tasks and making your life easier! HardWorkingBruh is here to boost your productivity and take care of your repetitive tasks . Perfect for gamers , coders , or anyone looking to save time on everyday tasks . With its powerful tables, flexible recording, and handy overlay features, this autoclicker is the ultimate companion for...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    MATTA

    MATTA

    Morse Code Utilitiies to convert text messages to & from sound files.

    This is a commandline utility that converts a WAV sound file containing morse code to English text. Pre-built binaries run on OSX, MsWindows, & GNU/linux. It is written in Ada, so can be rebuilt on any platform with an Ada compiler. The input wav file must be monaural, with a 16-bit signed integer encoding, and a sample rate of 8000 Hz. Either sox or audacity can easily transform to this format. The wav file is expected to be international morse code, preferrably clean and properly...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 10
    traceroute

    traceroute

    perform traceroute operations to diagnose network paths with GUI.

    Traceroute Tool is a simple graphical utility built using Go and the Fyne framework. It allows users to perform traceroute operations to diagnose network paths. Thanks to Anthony Eden for his library.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    Linux Notification Center

    Linux Notification Center

    A notification daemon/center for linux

    A haskell-written notification center for users that like a desktop with style. The notification center receives notifications via DBUS (like any notification daemon) and shows them in the upper right corner of the screen. The notification (if not specified in the notification otherwise) will also be shown in the notification center even after the notification disappeared by itself. The notifications can be clicked to make them disappear. Notifications can be replaced by the use of the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    DetectDee

    DetectDee

    Hunt down social media accounts by username, email or phone

    DetectDee: Hunt down social media accounts by username, email or phone across social networks example.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13

    Password manager by Risehack

    Application for save your password

    This application on a PC allows you to store passwords locally in encrypted form. The interface uses the Russian language. All information in Video
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Junkware Removal Tool (JRT)

    Junkware Removal Tool (JRT)

    Remove junkware from your PC

    Junkware Removal Tool (JRT) is a free security utility for Microsoft Windows. It scans for and removes unwanted programs, including adware, toolbars, and potentially unwanted programs (PUPs). JRT also removes any traces of these programs from your registry and other places where debris accumulates. JRT is a stand-alone tool that doesn't require installation. To remove JRT, you can manually delete the icon on your desktop by right-clicking on it and choosing delete.
    Downloads: 41 This Week
    Last Update:
    See Project
  • 15
    ComboFix

    ComboFix

    Scan for and remove malware and spyware

    Combofix is a freeware program that scans and removes malware and spyware from computers running Windows XP, Vista, 7, and 8. It was created by sUBs and is designed for advanced users. Combofix can remove malware that other products cannot. It backs up your registry hives, quarantines files, and creates a log of its actions.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 16
    RogueKiller

    RogueKiller

    The next generation virus killer. Remove unknown malware

    The next generation virus killer. Remove unknown malware, stay protected. Free virus cleaner for everyone. Thanks to its powerful engine RogueKiller is able to find known and unknown malware, of all kind. Search and clean viruses, ransomware, trojans and other malware. Powered with innovative Artificial Intelligence and Cloud signatures engine, RogueKiller is the best virus removal tool. Try our free virus cleaner now for free ! RogueKiller antimalware software is shipped with...
    Downloads: 49 This Week
    Last Update:
    See Project
  • 17
    Ubuntu Mate + Hacking Tools

    Ubuntu Mate + Hacking Tools

    Ubuntu Mate Hacking Distro

    Ubuntu Mate + FSociety Hacking Tools is a distro with hacking tools which can be downloaded in the following link: https://www.mediafire.com/file/6jo2ln3xjqrk5jn/custom-dist.iso/file FSociety integrates tools used for Information Gathering, Password Attacks, Wireless Testing, Exploitation tools, Sniffing & Spoofing, Web Hacking, Private Web Hacking, Post Exploitation. These tools are integrated in just one command. The distro is useful for those who want a Ubuntu Mate with tools like...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Credit Card Vault

    Credit Card Vault

    Just an app I developed for my university course

    Credit Card Vault is a simple app that allows you to store the credit card information encrypted with the 3DES encryption algorithm in CBC mode on an Android device. I originally developed this app for my university course, but I also decided to post it on GitHub on Sourceforge. This application is made for educational purposes only. Despite having well-functioning cryptographic features, it may not be reliable. This application is provided with no warranty or guarantees of any kind. Use...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    DeepBlueCLI

    DeepBlueCLI

    PowerShell Module for Threat Hunting via Windows Event Logs

    DeepBlueCLI is a PowerShell-centric threat-hunting toolkit built to extract, normalize, and flag suspicious activity from Windows event logs and Sysmon telemetry. It parses common sources—including Windows Security, System, Application, PowerShell logs, and Sysmon event ID 1—then applies a rich set of detection heuristics for things like suspicious account changes, password guessing and spraying, service tampering, PowerShell obfuscation and download-string usage, long or unusual command lines, and credential dumping attempts. Output is emitted as native PowerShell objects so analysts can pipe results to CSV, JSON, HTML, GridView, or custom pipelines for further triage and reporting. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    CrossLinked

    CrossLinked

    LinkedIn employee enumeration tool using search engine scraping

    ...Instead of accessing LinkedIn directly or relying on its API, it performs search engine scraping using services such as Google and Bing to discover public LinkedIn profile results. By analyzing these search results, CrossLinked extracts employee names and processes them into usable formats for security assessments or reconnaissance activities. This approach allows the tool to operate without credentials, authentication tokens, or LinkedIn account access. CrossLinked is commonly used by penetration testers and security professionals during the reconnaissance phase to identify potential usernames or email address formats for a target organization. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    KubiScan

    KubiScan

    A tool to scan Kubernetes cluster for risky permissions

    A tool for scanning Kubernetes cluster for risky permissions in Kubernetes's Role-based access control (RBAC) authorization model. KubiScan helps cluster administrators identify permissions that attackers could potentially exploit to compromise the clusters. This can be especially helpful on large environments where there are lots of permissions that can be challenging to track. KubiScan gathers information about risky roles\clusterroles, rolebindings\clusterrolebindings, users and pods,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    imgp

    imgp

    Multi-core image resizer and rotator. Go crunch 'em!

    imgp is a command line image resizer and rotator for JPEG and PNG images. If you have tons of images you want to resize adaptively to a screen resolution or rotate by an angle using a single command, imgp is the utility for you. It can save a lot on storage too. Powered by multiprocessing, an intelligent adaptive algorithm, recursive operations, shell completion scripts, EXIF preservation (and more), imgp is a very flexible utility with well-documented easy to use options. imgp intends...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23

    Orca AntiVirus

    Orca antivirus for Windows PC, virus and malware cleaner

    Free antivirus for Windows PC, speeds up Windows PC and laptop. Orca antivirus is made to work on all versions of windows above Windows Vista and is capable of detecting viruses and malware. Orca antivirus does not offer any premium and is 100% free
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    BloodHound Legacy

    BloodHound Legacy

    Six Degrees of Domain Admin

    BloodHound Legacy is the deprecated open‑source version of the BloodHound Active Directory attack path analysis tool. It uses graph theory to model and visualize privileged relationships in AD, Entra ID, and Azure environments. Security professionals use it to enumerate domain privilege escalation paths, misconfigurations, and attack surfaces in corporate networks
    Downloads: 19 This Week
    Last Update:
    See Project
  • 25
    C-Total

    C-Total

    Control Total sobre las conecciones de RED

    Administra reglas del Firewall de Windows de forma transparente sin ocultar información, muestra reglas creadas por el sistema y cualquier programa que utilice internet. NOTA: Para crear reglas y/o eliminarlas debe ejecutar C-Total como administrador.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB