Showing 2621 open source projects for "web-based"

View related business solutions
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    GridAuth is a user credential management system for distributed data and computational grids. GridAuth is configurable and extensible to just about any system requiring credential management, advanced authorization and secure authentication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Umbrella is a security mechanism that implements a combination of Process-Based Access Control (PBAC) and authentication of Digital Signed Binaries (DSB). Umbrella is designed for Linux-based consumer electronic devices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Java servlet implementation of the Lightweight Identity Management (LID), URL Management Software. More information about LID can be found at <a href="http://lid.netmesh.org>http://lid.netmesh.org</a>
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Establish/Maintain DHCP/DDNS/IP registry for small/medium/large scale networks. Easy maintenance and little to no personnel overhead. Provides a fully-automated interface for network registration.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    mod_schnappi combines the functionality of mass virtual hosting, mod_become, and mysql in one module, without having to run apache as root.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    COMMON VULNERABILITIES AND EXPOSURES (CVEŽ) DATABASE BROWSER, CVEBROWSER A web search engine for the CVE dictionary, targeted to be used on a intranet. CVEBrowser uses Java Servlets / JSP and MySQL and its designed to work well on RedHat
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Easy x509 certificate generation, with multi-user administration and safe distribution. Predefined types for User/Clients/Server/Mail/CA. Users integrate information from LDAP or AD directory. Full revocation(CRL) support with ftp distribution of CRLs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    oraOink is a cross-platform java swing client for gathering Snort alert statistics from an Oracle database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    x:einfach simple java components is a library for java. it includes various things like a page cache for web-content, a virtual string table, an ip subnet checker, string and date handling utilities, a connection pool and other simple things.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    An elliptic curve based encryption system for secure and private communications at the network level. Public key encryption is used to automatically negotiate keys for AES encryption links between all nodes in use. Dev version uses orinoco drivers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Green Screen: A Linux based Advanced Syslog Server for Juniper NetScreen Firewalls - Can be expanded later to support other products. It can capture syslog messages, parse them, store them in a MySQL database. A Web GUI interface is also included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    This project will hold many subprojects all of them based on the .NET platform. The main purpose of this project is to keep the MVP comunity connected and working together in an open source project.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Foresight is a security architecture designed to detect, alert, respond, and report on events happening throughout the enterprise. The interface aggregates and correlates security information (like a SIM or SEM) from multiple devices within the network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    hprobe is a packet generator with a built-in sniffer (using libpcap). It can generate many types of network probes to scan hosts and networks and automatically analyses the responses. Written in C for Linux platform
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A Python/GTK+ based GUI for managing ssh tunnels. Aims to be as simple as possible and provide hints and help where adequate, to bring tunneling technolgy to non-techies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Creates an ssh tunnel on demand
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Cisco Torch mass scanning, application layer fingerprinting, and exploitation tool to discover and attack remote Cisco hosts running Telnet, SSH, Web, TFTP, NTP and SNMP services. Useful in auditing large networks for misconfigured/un-updated Ciscos.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Extensible User Folder is a Zope user folder that requires the authentication of users to be removed from the storage of properties for users. Writing new authentication or property sources requires no intimate Zope authentication knowledge.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    PhpPwdManager, is a multi-user password manager application, written in PHP5 and MySql.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Role Manager is a security management framework based on the NIST model for Role Based Access Control (RBAC) and the Java[TM] 2 Platform security standards. The access control policies and the RBAC Model are implemented using the RBAC profile of XACML.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Barrier is designed to manage linux-box as firewall-qos router. It is sophisticated tool intended to manage your linux-box's iptables rules as also your QoS policy. Actualy QoS plugin for Barrier is based on htb
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    Sezame daemon grant temporary access (iptables) to specific (user defined) port. Access is granted on token based authorization to IP from which authorization was sent.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A collection of PHP scripts for both new web designers who just want to get a page up, and experienced php programmers who want to take the easy way out.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    SecurityFilter is a Java Servlet Filter that mimics the behavior and configuration format of container managed security, with several development and deployment advantages. See the Home Page for more details.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    The Intrusion Detection Exchange Protocol (IDXP) is an application-layer protocol for exchanging data between intrusion detection entities. IDXP-Java is a Java-based implementation based upon the Java BEEP Core implementation of RFC 3080 / RFC 3081.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB