Showing 1768 open source projects for "void based linux"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight Icon
    Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight

    Lock Down Any Resource, Anywhere, Anytime

    CLEAR by Quantum Knight is a FIPS-140-3 validated encryption SDK engineered for enterprises requiring top-tier security. Offering robust post-quantum cryptography, CLEAR secures files, streaming media, databases, and networks with ease across over 30 modern platforms. Its compact design, smaller than a single smartphone image, ensures maximum efficiency and low energy consumption.
    Learn More
  • 1
    PHP Project to intercept and stop worms from attacking your Apache server. Offending IP addresses are blocked using iptables/ipchains and the administrator/owner of the source of the attack is notified of the time, date and source IP Address.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    DeSniff is a sniffer detector based on the libnet and the libpcap
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    This is an authentication module for Apache that allows you to authenticate HTTP clients using user entries in an ACE/Server. Users must have a SecurID token and you must have an ACE/Server your Apache Web Server can talk to.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A client/server application designed to let the user monitor a directory tree on a remote machine by creating snapshots of current file status in order to later detect file modification, addition and/or removal.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 5
    Secure local and Network based authentication using pluggable backends which provide authentication and user/groupnames, uidmappings, tokensupport and the lot.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    The htaccess class manages the htaccess functions of Apache Webservers. Without knowing much knowledge of Apache, users can be added or deleted, groups can be created anddeleted, .htaccess files can be created with this class etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    spule stands for "secure practical universal lecture evaluator". spule is a program to automatize the evaluation of lecture polls.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A number of tools to enhance management/coding of NFR (http://www.nfr.net) IDA, and various other admin tools that can be used for both NFR and hand coding other appliance scripts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    rcf is an ipchains-based firewall with support for over 50 protocols, masquerading, portforwarding, IP accounting and various protections. Unlimited public, private, DMZ and MZ interfaces are supported. Rules are defined per interface and DMZ/MZ clusters.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Say goodbye to broken revenue funnels and poor customer experiences Icon
    Say goodbye to broken revenue funnels and poor customer experiences

    Connect and coordinate your data, signals, tools, and people at every step of the customer journey.

    LeanData is a Demand Management solution that supports all go-to-market strategies such as account-based sales development, geo-based territories, and more. LeanData features a visual, intuitive workflow native to Salesforce that enables users to view their entire lead flow in one interface. LeanData allows users to access the drag-and-drop feature to route their leads. LeanData also features an algorithms match that uses multiple fields in Salesforce.
    Learn More
  • 10
    A lightweight (distributed?) network security monitor for TCP/IP+Ethernet LANs. It will capture certain network events and record them in a relational database. The recorded data will be available for analysis through a CGI based interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A console based encryption engine using private key files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Perl Secure Conf (PSC) is a suid C program which reads a protected configuration file (containing passwords, secret data, whatever) and then drops its privilege. Now, in unpriviledged mode PSC execs a perl script, leaving a handle to the protected conf.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    HTTPush aims at providing an easy way to audit HTTP and HTTPS application/server security. It supports on-the-fly request modification, automated decission making and vulnerability detection through the use of plugins and full reporting capabilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    AVirCAP is a system for manual and / or automated detection of CodeRed and Nimda type of hack attempts and virtually all other kinds of "logable" intrusion attempts. It can work stand alone or together with other additional AVirCAP machines in the LAN/W
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    PHP packet2sql is a spawn of xant's packet2sql program. This program provides a PHP frontend to packet2sql and also enables packet2sql to work with both iptables and ipchains network filters (instead of just ipchains).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Copy and paste this address into your browsers URL http://www.anarchyproject.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A web-based, application for storing and retrieving usernames, passwords, and in the future, bookmarks and other useful, commonly used information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Trent is a system designed to handle being a modular authentication server system for a wide variety of resource-managers, so that the manager can worry about resources, and not authentication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    SecureVNC is a development/add-on to the TridiaVNC sourcecode base which provides strong authentication, strong symmetric encryption, and fewer security vulnerabilities than existing VNC implementations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    PyOTP is a simple Python library to handle one-time password generation and checks as specified in RFC2289 (previously RFC1938) and implemented in SKey, OPIE, and a number of other systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    The port scan plug in for snort, or just portscan for short is intended to be used in conjunction with snort and logcheck. The tool will allow you to monitor your snort log file and then do port scans based upon certain keywords.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    DevSecure is a web based log analyser designed for "OpenBSD". It can be installed with most of BSD/Linux systems. The main goal is to provide a web based console for security monitoring, including searching tools through IDS/FireWall/SYSLOG database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    GNotary is an asynchronous peer-to-peer digital notary service based on email. The server polls POP3 mail boxes scanning for specified key words in the subject line. A digital signature of the email body is returned to the sender.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    protect product by test the number printed in it,easy to vist for wap and http.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Immune Security Architecture For your Enterprise -- Host-Based Intrusion detection for UNIX based systems, at the process level. Detect changes in the normal behavior of processes, advanced features to detect Buffer Overflows.
    Downloads: 0 This Week
    Last Update:
    See Project