Showing 7310 open source projects for "security"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 1
    DevHub

    DevHub

    Filter issues, activities and notifications

    DevHub is a mobile and desktop app to help you manage GitHub Notifications and stay on top of repository activities. Save custom searches, apply filters and don't miss anything important. Create columns for the repositories and people that matters to you; receive desktop push notifications; manage notifications, issues, pull requests and activities; bookmark things for later. Choose between two modes, desktop or menubar; enable push notifications only for the columns you want. All columns...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    MyDiary1000

    MyDiary1000

    Its A Diary/TextEditor that encrypts your text data using images

    This is a diary that allows you to digitally write entries and view them. What makes this a masterpiece from its counterparts is how user data is created and abstracted. User data is protected and stored in PNG images, the image it self is not encrypted but the data inside the image is encrypted. If you open any one of the created PNG images, they look like blank images!. These "normal" looking images protect your information from prying eyes. The simplicity and elegance of my program...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Abdal 2-Key Triple DES Builder

    Abdal 2-Key Triple DES Builder

    encrypt / decrypt all your texts with Two-Key Triple DES

    If you need more security to send your messages, we introduce the new tool of Abdal security team called Abdal 2-Key Triple DES Builder. This tool can actually encrypt all your texts that are to be sent as a message between you and any person. Two-Key Triple DES is used to encrypt these messages. This algorithm performs 3 cryptographic processes on each block of information to reduce the penetration rate.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4

    KeeParanoia

    Enforce in-memory protection for KeePass

    This is a plugin to KeePass <http://www.KeePass.info> to force all fields, notes and file attachments to use in-memory protection <https://keepass.info/help/base/security.html#secmemprot>. It should be regarded as highly experimental
    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 5
    Abdal AES Encryption

    Abdal AES Encryption

    AES Message Encryption Tool

    Abdal AES Encryption is a security tool for encrypting messages developed by the Abdal team. This tool uses AES encryption and has high power. AES stands for Advanced Encryption Standard, which was developed in 2001 by the US National Institute of Technology and Standards. The advanced encryption standard is accepted by the US government and is now used worldwide.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Tiny Watcher

    Tiny Watcher

    Monitors system changes on a Windows machine

    Tiny Watcher takes a snapshot of important parts of your Windows system: running processes, files, registry, scheduled tasks. Afterwards, it tracks changes - every time you log in, or whenever you run it. When a change is detected, you are notified.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    spoof

    spoof

    Easily spoof your MAC address in macOS, Windows, & Linux

    spoof is a cross-platform Node.js utility designed to simplify MAC address spoofing and network interface identity manipulation for developers, security researchers, and privacy-conscious users. The project functions as a modern JavaScript implementation inspired by the earlier SpoofMAC tool, providing command-line workflows for randomizing, changing, and restoring MAC addresses on macOS, Linux, and Windows systems. It automates low-level networking commands that would otherwise require manual configuration, making address spoofing more accessible for testing and anonymity workflows. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8
    Shaark

    Shaark

    Self-hosted platform to keep and share your content

    ...All contributions are welcome! Please use the dev branch for your pull requests. If you make changes to JS, don't compile assets in production, I'll manually compile them when merging for security reasons. You're able to active 2-FA (2 factors authentication). By default 2-FA is disabled but you can update it from your app settings. Code length and code expiration are also configurable. Test if you application can send emails before enabling this feature. Since 1.2.9, all chests data are encrypted in your database using AES-256-CBC and your app key. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Naxsi

    Naxsi

    Open-source, high performance, low rules maintenance WAF for NGINX

    Technically, it is a third-party Nginx module, available as a package for many UNIX-like platforms. This module, by default, reads a small subset of simple (and readable) rules containing 99% of known patterns involved in website vulnerabilities. For example, <, | or drop are not supposed to be part of a URI. Being very simple, those patterns may match legitimate queries, it is Naxsi's administrator duty to add specific rules that will whitelist legitimate behaviors. The administrator can...
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10
    Active Directory Exploitation

    Active Directory Exploitation

    A cheat sheet that contains common enumeration and attack methods

    Active-Directory-Exploitation-Cheat-Sheet is a comprehensive, community-curated cheat sheet that collects practical enumeration commands, attack techniques, and quick references for attacking and auditing Windows Active Directory environments. The repository is organized as a stepwise kill-chain: recon, domain enumeration, local privilege escalation, user hunting, BloodHound guidance, lateral movement, persistence, domain-admin takeover, cross-trust attacks, data exfiltration, and a toolbox...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    PiracyChecker

    PiracyChecker

    An Android library that prevents your app from being pirated

    ...This library applies some techniques to help protect your app's users and attempt to thwart reverse engineers and attackers. BUT, this isn't guaranteed to stop your app from getting pirated. There is no such thing as 100% security, and a determined and skilled attacker with enough time, could remove these checks from the code. The real objective here is to raise the bar out of reach of opportunist and automatic attackers. Google Play offers a licensing service that lets you enforce licensing policies for applications that you publish on Google Play. With Google Play Licensing, your application can query Google Play to obtain the licensing status for the current user. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    sWAF

    sWAF

    A simple Web Application Firewall docker image

    ...A lot of people are self-hosting their own cloud infrastructure (using Nextcloud, Synology, QNAP, a cloud lease server or home-made solutions...), but we can never be too much paranoid about web security for a lot of good reasons. Too much time security is left on the background, or only by using some basic - but not sufficient - options and applications are front-faced to the big bad Internet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    WinPwn

    WinPwn

    Automation for internal Windows Penetrationtest / AD-Security

    WinPwn is a PowerShell-based toolkit for automating internal Windows penetration testing and Active Directory reconnaissance. It streamlines many manual steps by integrating reconnaissance modules like Seatbelt, Inveigh, Rubeus, and PrivescCheck. With proxy auto‑detection, endpoint enumeration, and exploitation routines, it's widely used in red team and blue team tool chains.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    CloudBrute

    CloudBrute

    Awesome cloud enumerator

    ...The outcome is useful for bug bounty hunters, red teamers, and penetration testers alike. While working on HunterSuite, and as part of the job, we are always thinking of something we can automate to make black-box security testing easier. We discussed this idea of creating a multiple platform cloud brute-force hunter.mainly to find open buckets, apps, and databases hosted on the clouds and possibly app behind proxy servers. Cloud detection (IPINFO API and Source Code) Supports all major providers. Black-Box (unauthenticated). Fast (concurrent), modular and easily customizable, cross Platform (windows, linux, mac), user-agent randomization, proxy randomization (HTTP, Socks5).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    PNotify

    PNotify

    Beautiful JavaScript notifications with Web Notifications support

    Beautiful notifications and prompts. PNotify works on your phone and tablet. You can swipe notices away to dismiss them. PNotify uses the modalish notification flow to provide unobtrusive support for many notifications at once. PNotify is distributed under the permissive Apache License, Version 2.0. Notifications can display as toast style, snackbar style, banners, dialogs, alerts, or desktop notifications (using the Web Notifications spec) with fall back to an in-browser notice. PNotify...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    bkjaya1952-docker-zoneminder-master

    bkjaya1952-docker-zoneminder-master

    Zoneminder-master , latest. docker image with Mysql 8 & MSMTP

    Based on Isaac Connor's ZoneMinder Master Snapshots at https://launchpad.net/~iconnor/+archive/ubuntu/zoneminder-master This image has been created on ubuntu:focal with zoneminder-master/ubuntu focal main To pull the Repository from the dockerhub please refer the following link https://hub.docker.com/r/bkjaya1952/zoneminder-master-docker-latest
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    phpsploit

    phpsploit

    Full-featured C2 framework which silently persists on webserver

    Full-featured C2 framework which silently persists on webserver via polymorphic PHP oneliner. The obfuscated communication is accomplished using HTTP headers under standard client requests and web server's relative responses, tunneled through a tiny polymorphic backdoor. Detailed help for any option (help command) Cross-platform on both client and server. CLI supports auto-completion & multi-command. Session saving/loading feature & persistent history. Multi-request support for large...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    pico

    pico

    A Git-driven task runner built to facilitate GitOps and Infrastructure

    Pico is a Git-driven task runner built to facilitate GitOps and Infrastructure-as-Code while securely passing secrets to tasks. What once was a place to chat and collaborate with people across the planet is now a platform for the commercialization of products and services. At the seat of the modern web is the browser. The modern browser is very much like an operating system, both in terms of complexity and code size. Only massive corporations can build and maintain it. Further, the web...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    raptor_waf

    raptor_waf

    Raptor - Web application firewall [ Stable version ]

    Web application firewall in C using DFA to block attacks. read Docs ! http://funguscodes.blogspot.com.br/2016/08/steps-to-create-your-wafweb-application.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    knocker

    A simple, portable port scanner

    Knocker is a simple, versatile, and easy-to-use TCP security port scanner written in C, using threads. It is able to analyze hosts and the network services which are running on them. It is available for Linux, FreeBSD, Unix, and Windows95/98/2000.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21

    maskphish

    MaskPhish: First ever URL masking tool for Phishing

    MaskPhish can hide any URL to another URL. We can make https://ngrok.io/4GTJ78C [Example Link] to https://google.com/live-football@is.gd/6hts4 [Example Link] For more Cybersecurity information visit https://www.kalilinux.in
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    SecurePIS

    SecurePIS

    Encrypted Personal Information System

    A fast and lightweight end to end encrypted Personal Information System. It has easy to use check-in/check-out functionality, tracks the history of every updates on each database entry, it supports secure attachments of digital files like images and audio/video, and most of all the database is secured by industry standard encryption technologies. Very intuitive and easy to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    obfusc

    toolchain for obfuscated compilation

    This is a C compiler, assembler, linker and virtual machine for computing based on encrypted working and obfuscated compilation and execution. The idea is that the platform machine `works encrypted' for the user and unencrypted for the operator, running a machine code instruction set in user mode that is provably safe against computational attacks, for code that is generated by a compiler that has introduced random variations into the code at each recompilation so that the attacker has no...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    BlackBelt WASTE - ipv4 / Tor / i2p + AI

    BlackBelt WASTE - ipv4 / Tor / i2p + AI

    A modern, AI-Smart, WASTE p2p for ipv4 and invisible address spaces

    .... *** NEW *** Distributed Autonomic-Performance-Tuning - A Goal-Seeking Swarming-Semiotic AI *** *** Built-in Self-Organising Anti-Spoofing Technology *** *** Medusa - Pure Ephemeral RNG - Routing, Security Extensions *** PLEASE ENSURE YOUR NETWORK USES THE SAME BUILD. FOR BEST RESULTS.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25

    ExRandom

    Sampling exactly from the normal and exponential distributions

    ExRandom is a small header-only C++11 library for exact sampling from the normal, exponential, and discrete normal distributions (provided that the underlying generator is perfect). This library provides an implementation of the algorithms described in C. F. F. Karney, Sampling exactly from the normal distribution, ACM Trans. Math. Software 42(1), 3:1-14 (Jan. 2016), https://doi.org/10.1145/2710016, https://arxiv.org/abs/1303.6257.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB