Showing 2622 open source projects for "web-based"

View related business solutions
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 1
    Ungoliant is a system utilizing open-sourced backends to isolate problematic (virus-infected or otherwise) hosts from a network. Focuses on vpmsd, snort, and nmap for detection and containment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    GTK frontend for motion http web interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    SenseType is an authentication tool which gives you access by recognizing you by your typing style. You no longer have to keep your passwords in mind.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Dark/sk sources are kernel patchset projects created by predatorfreak (Brett G.), focused on maintaining stablity and scalabliy. Everything that goes into these patchsets is selected based on these goals.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    OPIAM stands for Open Identity and Access Management. This Suite will provide modules for user & right centralized management: user profile management, ldap content consultation, access control based on RBAC & provisioning policies, and Web SSO.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Libdejector is a database tool which defeats SQL injection attacks by performing context-free validation of queries. While written in C, SWIG wrappers exist for Python and other languages will be following soon.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Cryptographically secure your files with asymmetric and symmetric keys, as well as password based encryptions and file/text checksums. Use upto 6 different keys to encrypt/decrypt and get checksums using MD2, MD5, SHA1, CRC32, etc..
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    InsecureWebApp is a web app that includes common web application vulnerabilities including SQL&Html Injection- see owasp.org. It is a target for automated and manual penetration testing, source code analysis, vulnerability assessments and threat modeling.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 9
    This PAM module provides the ability for users to have encrypted directories which are mounted automatically on login and unmounted after logout. The Device Mapper's CRYPT target provides the encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Streamline Azure Security with Palo Alto Networks VM-Series Icon
    Streamline Azure Security with Palo Alto Networks VM-Series

    Centrally manage physical and virtualized firewalls with Panorama

    Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
    Learn more
  • 10
    Ce module en PHP permet de gérer les accčs ŕ des pages web de maničre trčs simple. Il repose sur une base de données MySQL et est livré avec une interface de gestion accessible via un navigateur internet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Proxmox Firewall (Proxwall) is a flexible Linux firewall based on Shorewall and many other open source tools. It is designed to install on commodity hardware within minutes. It can handle complex and fast changing network environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A low cost software and hardware KVM over IP and remote Console monitoring solution running on Linux. Secure administration and access to remote keyboard/video/mouse and serial console output. Easily configured and customised to suit user needs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Uberviewer is a java/swt log processor for Uberlogger (a kernel-based observatory). It allows real-time analysis of a remote OS, including process and I/O monitoring. This tool is intended to be helpful for security researchers and malware analysts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    SecretBox is an open-source, high-safety password manager for Windows/Linux/J2ME devices. You can build the passwords list conveniently in PC side, encrypt it by a master password, and upload to your mobile phone.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Win32 Delphi applciation allows convienent editing of external signatures database in windows executable packer finder program PEID (http://peid.has.it/). Allows sorting, editing, adding, removal, searching and duplicate signature finding in "userdb.txt".
    Downloads: 5 This Week
    Last Update:
    See Project
  • 16
    Proxy Glue lets users glue together socks5, socks4, connect, http, and cgi proxies into one big field of potential paths, with configuration done right from the browser.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Ascii based Encryption/Decrypt Software. Allows you to Encrypt/Decrypt Ascii and Ascii based files. Passwords can be of any length. Simple and easy User Interface. Allows other VB6 developers to encrypt in thier programs. (v2 only)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A threat modeling tool based on FreeMind
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    iDVR (formerly Devolution Security System) is a video surveillance system which can handle up to 16 cameras with motion detection, notification and record on motion to mp4. Stream over the LAN (Multicast) or Over the Net (Unicast).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The MACA objective is to provide user authentication, session management and authorization services independently of platform. Authorization servive is based on a contextual role-based access control model that extends NIST RBAC
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Multispoof exploits weak authentication method based on IP-MAC pairs checking, implemented frequently in Ethernet networks by ISPs. This program allows to multiply user's throughput and serves as a demonstration of spoofing effectiveness.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Moria is a central http-based authentication service to be used by web services. Moria support both authentication and transfer of user attributes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Java Based Cryptographic P2P Messaging Client, is based on a client-server architecture. The Client is made in SWING. The server is text based. Server keeps tabs on presense and the users public keys. Presentation: http://varun.accosted.net/talks.php
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A set of security extensions for JavaServer Faces to solve common access control problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Ethereal Network Traffic Session Reconstruction for Internet Protocols. Management Console to reconstruct emails, web sessions, VOIP sessions, FTP, and all known supported Internet Protocols for Network Forensics. ***UPDATE*** Project release scheduled.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB