Showing 7311 open source projects for "security"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 1

    NCrypted

    NCrypted - simple file encryption software with GPU support

    NCrypted is a simple file encryption software. It is implemented on top of AES 128-bit algorithm. This software was designed to be as simple as possible, so you won't find any fancy, flashy gui elements or complicated advanced options. You can also use it directly from command line. NCrypted can automatically detect and take advantage of your NVidia graphics card to speed up the file processing.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Oryon C Portable (moved)

    Oryon C Portable (moved)

    Open Source Intelligence Framework

    NEW PROJECT PAGE: https://sourceforge.net/projects/oryon-osint-browser/ Oryon C Portable is a web browser designed to assist researchers in conducting Open Source Intelligence investigations. Oryon comes with dozens of pre-installed tools and a select set of links cataloged by category – including those that can be found in the OI Shared Resources. ▪ Based on SRWare Iron version 31.0.1700.0 (Chromium) ▪ More than 70 pre-installed tools to support investigators in their everyday...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    zcahttpproxy

    TV proxy with cas descrambler.

    Multicast UDP to HTTP proxy with Interzet CAS Descrambler. 10.10.2019 New epg map file: http://github.com/ViPetroFF/zcahttpproxy/blob/master/TVGMapNames.ini EPG resource: http://www.teleguide.info/ To update epg map run: "setupM3U.cmd". Obsolete support page: http://code.google.com/p/zcahttpproxy/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    gpg-remailer

    forwards re-encrypted PGP/GPG mail to a group

    Gpg-remailer has moved to GitHub, and can now be reached at https://fbb-git.github.io/gpg-remailer/ Please refer to github's location for the latest archive and releases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    TEncryptor

    TEncryptor

    Privacy, Security, no one will read your message again with this app

    TEncryptor Open Source app Written in Python3 and PyQt4 Licensed under the MIT License When you encrypt a text file or message The User need to choose 3 things 1- Password 2- The order of the letters 3- Four letter/word with specified order
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Cobrax trojan

    Cobrax Trojan - 1.0

    Troyano de conexion inversa desarrollado en C++ & Visual Basic 6.0, con codigo abierto.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    KMIP4J

    KMIP4J

    Open Source Implementation of KMIP 1.0 in Java

    The Key Management Interoperability Protocol (KMIP) defines the communication between a Key Lifecycle Management System (KLMS) and its clients. Some companies have been working with proprietary implementations of KMIP in different programming languages for a while, but up until now, no open-source solution existed. KMIP4J is an open-source implementation of KMIP 1.0 in Java. This software was developed by Stefanie Meile and Michael Guster at the University of Applied Sciences "NTB -...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    guncat

    Guncat acts like unix's cat, decrypting pgp encrypted sections

    Guncat has moved to GitHub, and can now be reached at https://fbb-git.github.io/guncat/ Please refer to github's location for the latest archive and releases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    a Project with All the bells and whistles to allow the average user to fully benefit from HTTP,DNS,FTP,SSH through python, allowing quick and easy deploying of servers without compiling, or installing anything but our favorite language.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    More flexibility. More control.

    Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 10

    natlog

    Creates easy to interpret logs of source-natted connections

    Natlog has moved to GitHub, and can now be reached at https://fbb-git.github.io/natlog/ Please refer to github's location for the latest archive and releases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    M3D5 Password Manager

    M3D5 Password Manager

    Just another password manager.

    THIS PROJECT HAS BEEN MOVED TO https://sourceforge.net/p/aes256-password-manager/ ========================= M3D5 Password Manager is a just another password manager that allows you to collect your passwords into a txt files hashed in MD5 with a personal key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Gryptonite (formerly GPassword Manager)

    Gryptonite (formerly GPassword Manager)

    Simple but Powerful, Cross-Platform Password Management Utility

    ...For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. Although the interface is simple and intuitive, the security is top-notch. It uses AES with CCM to secure and authenticate the data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Qubes OS

    Qubes OS

    Strong security for desktop computing through compartmentalization

    Qubes OS is an open source operating system designed to provide strong security for desktop computing using Security by Compartmentalization approach. Qubes is based on Xen, X Window System, and Linux, and can run most Linux applications and utilize most of the Linux drivers. It can also run Windows apps natively in Windows AppVMs ("Beta").
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    ssh-cron

    cron-like daemon able to use ssh connections

    Ssh-cron has moved to GitHub, and can now be reached at https://fbb-git.github.io/ssh-cron/ Please refer to github's location for the latest archive and releases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    PAVS

    PAVS

    PHP Application Vulnerability Scanner

    PAVS scans the PHP based web application source code and identifies the potential security problems in that application. PAVS also identifies the loop holes in PHP configuration file settings. Attacks addressed by PAVS are Cross-site Scripting SQL Injection File Manipulation File Inclusion Command Execution Code Evaluation
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    MR.SE SQL Injection Tool

    MR.SE SQL Injection Tool

    Auto SQL Injection Tool Coded by MR.SE

    SQLInjection is one of the basics of hacking. It is also one of the most tedious and most time consuming steps. MR.SE SQL Injection Tool programmed under Perl and hackers can quickly and easily penetrate their desired website databases with this.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    HTTPSearch

    HTTPSearch

    Simple Perl Script to search for sensitive Web sites

    A perl script that uses three Linux programs (nmap, grep, and wget) to find, retrieve, and classify web sites that may be running on a network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    ClamSentinel Portable

    ClamSentinel Portable

    ClamSentinel Portable is a real-time scanner for ClamWin Portable

    Original author: Andrea Russo and Robert Scroggins ClamSentinel Portable is ClamSentinel, configured and launched according to the PortableApps.com Format. It uses ClamWin's virus database, so ClamWin is required. If you have ClamSentielPortable next to ClamWinPortable, then ClamSentinel will detect ClamWin's database. For example, if ClamSentinelPortable is installed in folder A (/A/ClamSentinelPortable/App,etc) and ClamWinPortable is also in folder A (/A/ClamWinPortable/App,etc), then...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    sendmespamids
    SendMeSpamIDS is a python written honeypot. It includes HTTP, HTTPS, SMTP and many more, which are under constant development. The scripts support syslog and are ready for ELK integration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    GDLOG

    Implementation of the GNFS for discrete logarithm problem in GF(p)

    GDLOG is an implementation of the General Number Field Sieve algorithm for discrete logarithm problem in GF(p).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Enigma_3

    A substitution-based encryption algorithm for binary data or text

    Enigma3 is a substitution-based encryption algorithm that can be applied to binary or text data and results in far greater security than traditional encryption. An electronic dictionary of words is employed and numeric codes are then assigned to each word within the dictionary. Communications are coded as a set of numeric codes which can then only be translated back into the original message by using the original coded dictionary. This is not an encryption method in the commonly accepted sense as it is not based purely upon and cannot be compromised purely by mathematical means.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    SecSy: Security-oriented Log Synthesis

    SecSy: Security-oriented Log Synthesis

    Tool for synthesizing business process logs.

    SecSy is a tool for security-oriented log synthesis. Besides basic synthesis properties (cases per day, office hours, randomized activity duration, ...), its detailed parameter setting for simulating business processes also allows to specify data usage (objects + access modality), actors for process activities and access control constraints for task/object permissions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    OWASP Zed Attack Proxy

    OWASP Zed Attack Proxy

    Find web application vulnerabilities the easy way!

    The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. Note that this project is no longer used for hosting the ZAP downloads. You should download ZAP via https://github.com/zaproxy/zaproxy/wiki/Downloads Please see the homepage for more information about OWASP ZAP
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    SEPIA: Security-oriented PN Framework

    SEPIA: Security-oriented PN Framework

    Petri net framework for security related modeling and reasoning.

    ...Along Place/Transition-nets, it supports Petri nets with distinguishable token colors and defines coloured workflow nets, where coloured tokens are interpreted as data elements used during process execution. To support information flow analysis of processes, SEPIA defines so-called IF-Nets, tailored for security-oriented workflow modeling which enable users to assign security-levels (HIGH, LOW) to transitions, data elements and persons/agents participating in the process execution. SEPIA builds upon TOVAL (http://sourceforge.net/p/toval), JAGAL (http://sourceforge.net/p/jagal) and SEWOL (https://sourceforge.net/projects/jawl/). To use SEPIA, make sure these libraries are on the build path. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    SEWOL: Security-oriented Workflow Lib

    SEWOL: Security-oriented Workflow Lib

    Java Library for workflow handling

    ...It allows to specify the shape and content of process traces in terms of entries representing the execution of a specific workflow activity. Currently it supports plain text, Petrify, MXML and XES log file types. In order to specify security-related context information, SEWOL provides access control models such as access control lists (ACL) and role-based access control models (RBAC). SEWOL uses and encloses the following libraries: - TOVAL (http://sourceforge.net/p/toval), - JAGAL (http://sourceforge.net/p/jagal), - OpenXES (http://www.xes-standard.org/openxes/), - Spex (http://code.deckfour.org/Spex/) - Google Guava (https://github.com/google/guava), - xstream (http://xstream.codehaus.org/) and - graph-impl and visualization components of Jung 2 (http://jung.sourceforge.net/). ...
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB