Showing 2622 open source projects for "web-based"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    ModSecurity 2.x managament tool. Generate special rule, show logs, create conf.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    What are the packets rejected by your Netfilter based firewall today ? How often this suspicious host try to connect to your box ? What are the most rejected domains ? Who is this strange host which scan your ports ? The responses are in the iptables log
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Trinux is a small ramdisk/floppy based Linux distribution that contains useful tools for mapping and monitoring TCP/IP networks (i.e. intrusion detection and vulnerability scanning)
    Downloads: 7 This Week
    Last Update:
    See Project
  • 4
    FedStage FedSAML is a software aiming to implement security SAML2.0 standard, supporting low ((de)serialization) and higher level (easy way of creating and verifying security-related data, own extension elements,...) of creating SAML-related data for Web
    Downloads: 0 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 5
    Realisierung einer VerwaltungsPKI(V-PKI) mit OpenSource(openCA,openSSL,openLDAP) unter der ROOT CA des BSI. Bereitstellen der notwendigen Benutzeroberflaeche und Dokumente: CP,CPS, Dienstanweisung,Mustervertrag,Benutzeranweisungen,DB-Beschreibung
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A collection of tomcat authentication modules, based on JAAS, so that changing an authentication method is easy
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    SAWS is a Secure Audit Service that cryptographically protects all log messages. It can run as either a standalone web service called SAWS (Secure Audit Web Service) or as a Java Secure Audit Trail Service (JSATS) that is called via a Java API.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A graphical monitoring and control interface to the Snort IDS
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    BarTex is a system designed to create inexpensive tickets for events. It uses a crypto system to verify tickets using barcodes; thus eliminating the cost of expensive, colorful tickets that cannot be photocopied/forged.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10
    Thresh is an application for Snort that manages alert thresholding and suppression. This application was designed to assist the administrator with tuning one or more Snort sensors. This was designed to run under RedHat flavors of Linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Pillager is a set of PHP Scripts that allows you to test the security of your web server permissions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Authentication program to log users into a web application using their Novell credentials.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    WASTE is a mesh-based workgroup tool that allows for encrypted, private communication between distant parties on the internet, independant of local network organization.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 14
    What is a Protocol Debugger? Conditionally break based on BPF filters, modify protocol contents on the fly. Build custom actions that let you manipulate how you speak on the network. Or manually edit protocol fields and send the packets along.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A one-time password system that is simple and can be integrated with most current pages! We are sorry we have no website setup but we are having problems with shell access, we plan to have at least a demo up and running soon!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    phpCA is a PHP-based framework to operate a certificate authority (CA). It uses the openssl functions of PHP to generate CSRs and X.509-certificates as well as mySQL to store these data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Secret Sharp is a wizard based GUI for the Shamir Secret Sharing Algorithm provided by the crypto++ API. Secret Sharp replicates the functionality that 'ssss' provides on unix.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Sting is a simple, host-based approach to detecting arp cache poisoning based man in the middle attacks (such as made by ettercap) on your LAN. It uses SNMP to periodically query the arp cache of your router and make sure its entry for you is correct.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Web vulnerable scan tool ※ SQL injection ※ XSS Cross Site Scripting ※ 404/500 server error ※ Admin/Manage folder search ※ web-base or command-line scanner by PHP ※ Check up collate with HTML FORM and LINK http://wstool.sourceforge.net
    Downloads: 3 This Week
    Last Update:
    See Project
  • 20
    EM stands for enforcement module. It is a security module which create bastion host machine. the process involved reading an XML policy file and translate it into Linux/Unix system call set. the translation process is created by CSG(command set generator
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    home-firewall.sourceforge.net -- Sets up a basic firewall using Linux iptables. Provides a way to add allowed sites dynamically. Home-firewall makes extensive use of shell scripts and Linux's cron utility. Maintain order in your school. ChamTech.net
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    The certificate daemon, certd, is a (X.509) certifcate discovery and validation daemon that can be used by network clients to acquire information concerning issued certificates (e.g., validity, fingerprints etc.)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A fast contractual framework based Monitoring agent for Java with extended support for temporal operators and customizable agents for JVMTI, Javassist and Dynamic Proxy APIs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Computer Breaker is a network testing tool that allows networking administrators to test if a computer is vulnerable to malicious attacks. Using the Nessus scanner, computer-breaker scans the remote host and automaticaly exploits its vulnerabilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The PeerTrust system uses policies to describe trust and security requirements. Such policies are a component of Peertrust run-time system that can negotiate to establish trust among systems on the Semantic Web
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB