Showing 7314 open source projects for "security"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    ViroFilT Pendrive Security ViroFilt Antivirus Software for Securing Pendrive and Entire Systems Prevent from the Shortcut Virus and Hidden Files/Folders Download Link Windows 8 32/64bit Version : http://goo.gl/Bn10Jq Windows 7 32bit only Click Here : http://goo.gl/EH5jkI Windows 7 64bit only Click Here : http://goo.gl/pfs7i3 Description : * Scan Entire System * Removable Disk Scanning with Automatically Detection * Removing Viruses & Trojans, Worms * Removing Unwanted Shortcuts LNK files in your Pendrive * Neutralize Hidden Folders & Files in Your Computer and Pendrive * Disable & Enable Task Manager Program * Disable & Enable Registry Editor * Disable & Enable Control Panel * Disable & Enable Command Prompt * Show Hidden Files Regards R.Sakthikumar(www.facebook.com/sakthi.kumar.it) Studying in diploma in Information technology 3year(2012-2015) A.D.J Dharmambal Polytechnic College Nagapattinam
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    PasGen

    Pronounceable Password Generator

    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Aes Edition hacker
    Paranoia Text Encryption mantiene SMS, correos, mensajes de redes sociales, notas y cualquier otro texto a salvo de ladrones, hackers y fisgones. Basta con pegar texto copiado desde cualquier aplicación, o guardarlo en un archivo para usarlo más adelante. Paranoia Text Encryption keeps SMS, mails, messages from social networks, notes and any other text safe from thieves, hackers and snoopers. Simply paste text copied from any application, or save it in a file, use it more later
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    video encryption

    video encryption

    Light video encryption technique (source code)

    Light encryption algorithm (technique) that can be used in real time video encryption. (source code has been uploaded; You can read attached pdf file for more details about the presented encryption technique ! )
    Downloads: 0 This Week
    Last Update:
    See Project
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 5
    jPBC is a Java porting of the PBC Library, a Pairing-Based Cryptography Library written in C. It supports symmetric and asymmetric pairing. With jPBC it is really easy to use such a strong cryptographic primitive.
    Leader badge
    Downloads: 15 This Week
    Last Update:
    See Project
  • 6

    Project Bletchley

    Tools for encrypting, decrypting and breaking WWII Lorenz ciphers

    Tools for working with German WWII Lorenz ciphers, including a Tunny encryption/decryption tool, and a Colossus emulator.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    MV2
    There are a lot of tools and plugins to fix security issues of the dignified mail system. The goal of this project is to redefine a system that takes the problems of our time into account. Be sure to visit this project on github: https://github.com/mv2project/mv2
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    sha3sum and then some

    sha3sum - A demonstration of the Keccak permutation.

    Hash mode interface to the Keccak code package. This program illustrates the use of the Keccak permutation. Usage is much more than a hash function. The NIST compatible settings are subject to change when they publish FIPS PUB 180-5. I wrote this program when evaluating the permutation and developing tree hashing for the Intel(R) MIC architecture.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    cSploit

    cSploit - An Android network penetration suite.

    cSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assesments on a mobile device.Once cSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing ( with common protocols dissection ), real time traffic manipulation, etc, etc .
    Downloads: 12 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    J.L Antivirus
    J.L antivirus is a free antivirus with Real-Time protection, powerful scanner and big database. Created in VB.NET +WARNING+ This AV is not for everyday use, so I dont responsible for risks and threats.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Cifradocesar
    Para proteger la información sensible de miradas ajenas, no basta con ocultarla en una carpeta anónima o ponerla en un archivo comprimido; lo suyo es cifrar los datos para que nadie pueda leerlos
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    WinMD5sum

    WinMD5sum

    A simple GUI MD5 sum Tool run on Windows

    WinMD5sum is a MD5sum tool for those who need a small and simple tool to just get the sum.It has a GUI look and keeps small(only 40KB).Runs only on Windows platform.The highlight is it can handle very large file(over TB) and the speed is fast enough.Enjoy it!
    Leader badge
    Downloads: 12 This Week
    Last Update:
    See Project
  • 13
    Steganometrographia

    Steganometrographia

    Latin titkosító és versgenerátor

    A program rövid üzeneteket tud elrejteni, kódolni latin nyelvű disztichonos versekben. Dekódolni is tudja az ilyen titkosított üzeneteket rejtő verseket. Ezen kívül véletlenszerűen is tud verseket generálni. Minden generált vers értelmes latin nyelvű költemény.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Intrusion Detection and Defense System

    Intrusion Detection and Defense System for windows

    Its a light weight Intrusion detection and defense system works with windows firewall to protect any windows operating system from attacks that are intended to hack the server or provide any operational damage. By keeping eye on network activities and event viewer logs, ServerCloak capture and log any failed/denied inbound calls from IPv4 as well as IPv6. Once the calls reaches its limit, the service immediately tells windows firewall to block the attacking IP by adding a denial inbound...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Cifrar texto
    Encriptador es un sencillo sistema para convertir un texto cualquiera en caracteres equivalentes sin sentido, y después poderlos volver a convertir en texto normal. En una única interfaz realizaremos tanto la encriptación como la desencriptación. Sólo hará falta pegar el texto en su ventana correspondiente, que depende si es para desencriptar o para encriptar, y listo
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    dhcpclientsimulator

    dhcpclientsimulator

    Both a DHCP client simulator and a DHCP attack tool.

    #DHCP Client Simulator For the DHCP client simulator mode, assuming there is an active DHCP server on the network, the user can choose to simulate any number of DHCP clients. All DHCP leases obtained from the server are saved in the DHCP_Leases.txt file, which is automatically generated by the program. The user can also release the leases received from the server, either one by one (by IP address) or all of them at once. After releasing all the addresses, the DHCP_Leases.txt file is...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17

    jellyphish

    Don't get phished!

    What is Jellyphish? Jellyphish is the first ever script that pings a websites and tells the users if a given website is a phishing site or not. What are the minimum system reqirements? 1) jre or jdk installation on your system.(http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html) 2) Internet connection.(your system should be connected to the internet when the script is running.) How to use it? 1) Run the jar file. 2) Now copy & paste the url...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    NinthTest JCA Provider

    A security provider for the Java™ Cryptography Architecture

    The NinthTest JCA Provider is a security provider for the Java™ Cryptography Architecture, focused on supporting candidate, reference, academic, and experimental cryptographic algorithms and security services. Because the services provided by the NinthTest JCA Provider are exploratory/provisional in nature, the NinthTest JCA Provider is not recommended for use in security-critical applications or environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Generador de contraseñas
    ¿Cansado de pensar nuevas contraseñas? En ese caso, prueba PassworD, un generador automático que te permitirá crear contraseñas con diferentes niveles de seguridad. El generador de PassworD permite crear lotes de contraseñas de diferente longitud (desde 8 a 100 caracteres) y con diferentes estructuras: legibles (sólo letras), alfanuméricas (letras y números), con mayúsculas e incluso con símbolos especiales.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Fleeting Password Manager

    Fleeting Password Manager

    Fleeting Password Manager generates and manages passwords.

    Fleeting Password Manager is a simple program that generates highly secure pseudo-random passwords from the given master password, URL/ID (e.g. facebook, www.facebook.com, google, my_server..) and user name. The user needs to remember only her master password to recover other passwords. Passwords are always regenerated on-the-fly from the given login data when needed and are never saved. In other words, Fleeting Password Manager combines the password creation and management. The length of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    USB 007

    USB 007

    A spy for USB drives.

    The application refers to track what happen with your computer USB ports by which USB drive and when. USB 007 can track it in your presence or absence. After inserting a removable disk such as Pen drive, Memory card, External hard disk etc. USB 007 will track the drive name, drive insertion date-time, drive space info and the file-folders (include hidden) that the drive contains. You will also get the updated info before the drive removed. The 4 more important features are that ♦...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    BeanieCaptcha

    BeanieCaptcha

    A simple PHP-AJAX captcha application

    BeanieCaptcha is a simple captcha developed with PHP - JavaScript.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    SERAM: Security Reasoning Framework

    SERAM: Security Reasoning Framework

    Framework for security-related definition and reasoning.

    The content of SERAM has been moved to the security-oriented workflow library SEWOL: https://sourceforge.net/projects/jawl/ SEARM provides support for the definition of access control policies, such as ACLs and RBAC models. Additionally, it allows to specify inference policies and comprises techniques for reasoning about inferences and information distribution along a set of inference rules.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    FileSafe tools

    FileSafe tools

    Cool MS-DOS tools in a stand-alone application form.

    A small library of cool MS-DOS tools in a stand-alone application form. An example of some tool would be: Calculator or password generator.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    arftoverinice

    arftoverinice

    ARF to Verinice .vna conversion filter.

    This program converts reports from the OpenVAS vulnerability scanner in the Asset Reporting Format (ARF) and generates a .vna file containing assets and risks generated from the ARF report. This file can be imported into the Verinice risk assessment system.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB