Showing 1639 open source projects for "beta"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    Is your server running slowly? Clamav-sniffer could help - it scans for malware such as phishes and viruses and configures your firewall to block the cracker.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    ssh-utils

    ssh-utils

    Support Tools for OpenSSH with multiple agents

    The ssh-utils package provides tools and extensions for the application of SSH. Current contained tools: - ssh-agent-manage.sh The management of the parallel SSH access by multiple agents, sessions, and keys. - ssh-pk-type.sh Displays private key type. - ssh-pk-asn1.sh Displays the private key as ASN.1.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    codeZ

    A program to en/decrypt texts that are only crackable using bruteforce

    codeZ is a program that can encrypt/decrypt texts that are not crackable without using brute-force attacks. It supports loads of characters, including symbols like brackets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    RIPS - PHP Security Analysis

    Free Static Code Analysis Tool for PHP Applications

    RIPS is a static code analysis tool for the automated detection of security vulnerabilities in PHP applications. It was released 2010 during the Month of PHP Security (www.php-security.org). NOTE: RIPS 0.5 development is abandoned. A complete rewrite with OOP support and higher precision is available at https://www.ripstech.com/next-generation/
    Downloads: 25 This Week
    Last Update:
    See Project
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 5
    Eluvium Data Encryption Software

    Eluvium Data Encryption Software

    DATA PROTECTION SOLUTION FOR A SAFER WORLD

    Eluvium is an easy to use encryption software that uses 256-bit military grade encryption to protect your private files and prevent them from being modified, read or even theft. Protect all your sensitive personal and commercial information including your photos, credit card data, tax returns or any other private document. Eluvium, don't require an internet connection. We take our privacy policy very seriously, so we never have any knowledge of your password and no way to retrieve or reset...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Virtual eXecuting Environment
    VXE (Virtual eXecuting Environment) is an Intrusion Prevention System (IPS). It protects Linux servers from hacker attacks from network, etc. It protects software subsystems, such as: SMTP, HTTP and any other subsystem, already installed at the server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    SWF Investigator

    SWF Investigator

    Adobe SWF Investigator enables full analysis of SWF applications.

    Adobe SWF Investigator is a cross-platform, GUI-based, comprehensive set of tools, which enables quality engineers, developers and security researchers to quickly analyze SWF files to improve the quality and security of their applications. From a static perspective, you can disassemble ActionScript 2 (AS2) and ActionScript 3 (AS3) SWFs, view SWF tags and make binary changes to SWF files.  SWF Investigator also lets you view associated information, including local shared objects (LSOs) and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Dont Hijack This

    Dont Hijack This

    DHT is an anti-hacker tool to fix all the damage caused by viruses.

    Dont Hijack This is an anti-hacker tool to fix all the damage caused by malware. It enables the disabled windows components. It completely removes all the bots/viruses/malware infections in 35 seconds. Fixes: registry editing has been disabled by administrator Task Manger has been disabled by your administrator Windows defender is turned off by group policy proxy settings hijack virus (unable to connect proxy server) unable to install antivirus and antivirus killer windows firewall...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    VeraCryptMounter
    VeracryptMounter is a tool to use Veracrypt encrypted drives and containers easier and faster. VeraCrypt is neede. This is only a wrapper for mounting. Changing from TrueCrypt to VeraCrypt. New Version is Released
    Downloads: 3 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10

    passgen

    Passgen - easy to use, simple password generator

    Passgen is easy to use, simple based on hexal and octal digits system password generator.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    TrojanCockroach

    TrojanCockroach

    A Stealthy Trojan Spyware

    This program is a Trojan Virus that steals data (ID, password; every key stroke) from PC (Windows XP or later) and emails it back to the host. It spreads among PCs through USB drives. It is almost undetectable to any antivirus software.
    Downloads: 155 This Week
    Last Update:
    See Project
  • 12
    Syn Flooder is ip disturbing testing tool , you can test this tool over your servers and check for there protection , This is a beta version .
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    OnlyOneSite

    OnlyOneSite

    Program is designed to implement parental controls for viewing sites.

    Program is designed to implement parental controls for viewing sites. Provides access to view authorized content only from the list and clicking links are viewing the resource by the established rules
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    WebShellSearch

    Toolkit to search for malicious shells

    A Python open source toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination, it automates the process of detecting the above.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    CyberCrypt

    .NET Library for Encryption/Decryption

    CyberCrypt: ----------------- .NET Library for Encryption/Decryption Usage: ---------- Encrypting file using AES (256 bits): CyberCrypt._AES256.EncryptFile("C:\example.txt", "YourPassword") Decrypting file using AES (256 bits): CyberCrypt._AES256.DecryptFile("C:\example.txt", "YourPassword") Hashing string using SHA512: CyberCrypt._SHA.SHA512Hash("A string that will be converted to SHA512 hash.")
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    JBrute

    JBrute

    Open Source Security tool to audit hashed passwords.

    JBrute is an open source tool written in Java to audit security and stronghold of stored password for several open source and commercial apps. It is focused to provide multi-platform support and flexible parameters to cover most of the possible password-auditing scenarios. Java Runtime version 1.7 or higher is required for running JBrute. Supported...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    CloudSafe

    CloudSafe

    Smart and safe cloud-based credential manager

    CloudSafe is a credential manager that can store all your access informations (applications, sites, gadgets, ...), in your Google Drive account: all data are encrypted with a master password (AES-128) and all netowork operations are protected by your Google Account and HTTPS connections. The source code is open and you are free to check the security solution.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    [C#] Secure Shredder Console

    A console file shredder that supports many algorithms.

    There are many ways to delete a file, whether you want it to be secure or not, fast or not. Since nowadays, we use computers to store data (including confidential ones), we want to totally delete a file with no traces for any file recovery solution. The program supports Zero Data 1 Pass, British HMG IS5-Baseline 1 Pass, Russian GOST P50739-95 2 Passes, British HMG IS5-Enhanced 3 Passes, US DoD 5220.22-M / Canadian RCMP DSX 3 Passes, German VSITR 7 Passes, Bruce Schneier's 7 Passes,...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19

    otpcrypt

    Linux command line one time pad program

    Linux command line one time pad program. Generates a large one time pad file and tolerates missing messages while keeping pad files in sync. For more information see Wiki tab or source.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    kedi

    kedi şifreleme projesi

    "kedi" şifreleme, veri bütünlüğü ve rastgele sayı üretim algoritmalarını bünyesinde barındıran, tamamen özgün ve açık kaynak kodlu bir kriptoloji projesidir. Proje uygulamayı göstermesi için bir .exe dosyası içeren proje ile birlikte sunulmuştur.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Juggernaut v1000 Beta v1.2

    Juggernaut v1000 Beta v1.2

    Juggernaut v1000 Anti-Cryptography

    Juggernaut v1000 can crack MD4, MD5, MD6, SHA1, SHA256, SHA384, SHA512, HMAC-MD5, HMAC-SHA1 and also all the Base-64 version of them in minutes... but the cracking process depends in your password wordlist/dictionary.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Platform for risk analysis of security critical IT systems using UML, based on the CORAS model-based risk assessment methodology. Contains an XML and UML repository, facilitating management and reuse of analysis results.
    Leader badge
    Downloads: 14 This Week
    Last Update:
    See Project
  • 23
    Moscrack is a perl application designed to facilitate cracking WPA keys on a cluster of computers. This is accomplished with any one of Mosix clustering software, ssh, rsh or Pyrit connectivity to nodes. Cluster nodes can run any Un*x variant (includ
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Passencryption 2016 beta

    Passencryption 2016 beta

    PassEncryption is designed to encrypt files and generate passwords.

    PassEncryption is a software written in python designed to encrypt and decrypt files as well as generating passwords. PassEncryption uses RSA encryption method to generate passwords for each accounts with a personal encryption key. Windows 7 and more only. IMPORTANT: Current release doesn't work with 32 bits architectures, will be fixed in next update
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    JPA Security is an Access Control Solution for the Java Persistence API. JPA Security enables you to configure access control to your JPA Entity Beans based on the currently authenticated user and its roles via XML or Annotations.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB