Showing 7315 open source projects for "security"

View related business solutions
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 1
    Rinzler USB Cleaner

    Rinzler USB Cleaner

    V2.0-Unhides Folder/Files,removes malicious scripts from USB Drive

    V2.0 (30th Dec 2014). It is a USB Malware Cleaner. This is a small tool that removes malicious scripts created by virus or malware, unhides folder and files, deletes all shortcut from selected drive. Also disables autorun completely and provides option to enable registry, folder options and task manager. Visit the project website for more information.
    Leader badge
    Downloads: 37 This Week
    Last Update:
    See Project
  • 2
    BinaryCrypt

    BinaryCrypt

    Binary Conversion Calculator

    With BinaryCrypt, you can convert between regular text, binary, hexadecimal, octal decimal and decimal. You can convert only decimal (as of right now) to any base up to base 64. You can also save your converted text to a file or open a converted text file to decrypt the message, and perform basic arithmetic in binary. The git repo for the C# code is located at: https://github.com/m1r4g3/BinaryCrypt-.Net
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Pro Password Generator

    Pro Password Generator

    Generates passwords depends on your choise.

    *Generate random and really strong passwords *Password length can be selected. * Passwords characters type (letter,capital letter,numbers,special characters (. - _ ? etc.) can be selected. * Copy-clear the generated password with a button.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    lecithine

    FUSE File system powered by secret sharing scheme

    Lecithine is a FUSE (file system in user space) using a secret sharing scheme. You can use Lecithine as regular file system. When writing to disk, data will be devided into randomly chosen pieces (secret shares) and stored into different places. Upon reading, the shares are merged together such that in turn the plaintext results. From a cryptographers point of view, there is no symmetric or private key ever needed to produce a ciphertext. This is how secret sharing schemes are designed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 5
    Simple program to encrypt text. Programa simple para encriptar texto.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Encript Decript rtf Text or plain text
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    GlobalPlatformPro

    GlobalPlatformPro

    Easy to use GlobalPlatform tool (and a Java library)

    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    House Party Protocol

    House Party Protocol

    an ultimate evidence wiper

    It's a open source file wiper program which can get commands remotely and acts in emergency stiuations. Program's name inspired by Iron Man 3 movie where Tony Stark activates the "House Party Protocol" when his house is destroyed. It's written for preventing your private datas captured by police or thieves. *Usage* - You need to have a hosting account which can run php scripts (you can register for a free one) Change the $password section in base.php and upload it to your hosting with...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    wafep

    wafep

    Web Application Firewall Evaluation Project

    WAFEP is designed to assess the attack vector support of web application firewalls and application IDS/IPS modules. It operates through an "attacker website" with links, forms, browser controls and other request initiators which send a collection of malicious payloads through the WAF to a target application, which in turn, checks which payloads were blocked and which passed successfully. The WAFEP application serves as both the "attacker" website and the "target" website, and thus,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10
    UDP Flashflood

    UDP Flashflood

    UDP Flooder / DDoSer / Booter

    DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES.
    Leader badge
    Downloads: 6 This Week
    Last Update:
    See Project
  • 11

    L337 Scanner

    Vulnerability Scanner

    L337 Scanner is powerful vulnerability scanner.It has both community edition and professional edition. Community edition is free for all. Community edition has only sqli scanner. which means through community edition you can scan a target site for sql injection vulnerability or search google for sqli vulnerable site. Requirements : 1. Java 8 or higher (oracle recommanded) Rules : 1. Don't give trailing slash 2. Put link with protocol like http,https Test Example : 1....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    TurboPower LockBox

    TurboPower LockBox 2 & 3 Cryptographic Library for Delphi

    LockBox 3 is a Delphi library for cryptography. Currently supported Delphi XE6. It provides support for AES, DES, 3DES, Blowfish, Twofish, SHA, MD5, a variety of chaining modes, RSA digital signature and verific...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    HT is a file editor/viewer/analyzer for executables. The goal is to combine the low-level functionality of a debugger and the usability of IDEs. We plan to implement all (hex-)editing features and support of the most important file formats.
    Leader badge
    Downloads: 51 This Week
    Last Update:
    See Project
  • 14

    PassManConvert

    Password Manager File Format Converter

    A Java application that converts between popular password manager formats such as: Keepass v1 and v2 Password Safe v1, v2, and v3 KeyRing v4 and v5 CSV plain text CSV encrypted with PGP
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    kripta

    kripta

    A small utility to encrypt files

    An application to encrypt files using Tiny Encryption Algorithm(TEA) with user defined keys of 4 to 16 character length
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    LOIC

    A network stress testing application

    Low Orbit Ion Cannon. The project only keeps and maintains (bug fixing) the code written by the original author - Praetox, but is not associated or related to it. DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR...
    Downloads: 1,102 This Week
    Last Update:
    See Project
  • 17
    SimpleEncryptionTool

    SimpleEncryptionTool

    This is a simple home use Encryption tool.

    This is a Application written in QT on top op the QT Simple Encryption module "http://qt-project.org/wiki/Simple_encryption" it can Encrypt Text, and Data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    gsg.networks

    gsg.networks

    A simple native java network library

    A simple native java network library containing ftp, smtp and port knocking clients. Designed to be easily extended or customized this library will adapt smoothly in any java project
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    PlayAuthenticate

    PlayAuthenticate

    An authentication plugin for Play Framework 2.x (Java)

    Fully customizable and localizable controllers and views (e.g. Play Authenticate allows you to define your own controllers and views for every visual step of the signup and/or log in process). Completely dynamic URL generation for all views (uses the route file - means you can adapt the look and feel as much as you like). The sample shows how to do this with Twitter bootstrap. Linking of accounts (e.g. one local user with multiple authentication providers). Linking can be done automatically...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    NetCrypt

    NetCrypt

    NetCrypt - file-transfer utility providing secure data transfer

    NetCrypt is a small Open Source command line file-transfer utility providing authentication, confidentiality and integrity validation while still maintaining top-notch performance and transfer speed between machines. No public key distribution is required: NetCrypt is designed to use a symmetric passphrase with a strong key-derivation-function. NetCrypt seeks to fulfill all those requirements. In it's default configuration, it uses the AES-256-GCM cipher with a PBKDF2 key iteration count...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    X-Crack Full

    X-Crack Full

    The best SSH penetration testing tool ever!

    X-Crack Full is an SSH penetration testing tool. It is coded in Python.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Locker Password Manager

    Locker Password Manager

    Simple password manager

    Locker Password Manager allows you to save and protect email and web accounts, as well as personal notes. The application has a simple design and you will not spend too much time clicking on different options and making various settings.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Basic Facebook Login Source

    Looking for a simple way to use FB login method without FB sdk?

    Looking for a simple way to use FB login method without FB sdk? Then you are in luck, because this is the most simplest login method for Facebook that could be made. Requirements - Timer - Textbox 1 "Username" - TextBox 2 "Password" - Button1 "Login" It's simple as that, no need for any other addons! Read more about it @http://mecode.vysilhq.com/2014/08/visual-basic-facebook-login-without-sdk.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    pidCrypt
    pidCrypt is no longer maintained! pidCrypt is a crypto library offering modular cryptographic functions in JavaScript. Supports: AES (CBC & CTR Mode), RSA, MD5, SHA-1, SHA-256, SHA-384, SHA-512, ASN.1, Base64, UTF-8. The AES-CBC mode is compatible to OpenSSL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    BitKiller
    BitKiller securely shreds files and directories, removing them completely from your hard disk. It can quickly and efficiently overwrite files using anything from random data to the Gutmann method. It also changes filenames to make them harder to find. No setup or installation needed.
    Leader badge
    Downloads: 54 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB