Showing 28 open source projects for "nse options data"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 1
    Syncthing

    Syncthing

    Open Source Continuous File Synchronization

    Syncthing is an open source continuous file synchronization program, which essentially works by synchronizing files between two or more computers in real time. Syncthing is designed to first and foremost keep users’ data safe and protected against data loss and against attackers who would unlawfully try and access this data. It doesn’t store data anywhere else except on your computers and uses encryption to secure all your data. It is very easy to use, cross-platform and automatic. As such, it is very user-friendly and ideal for all users looking for a secure and easy-to-use file synchronization solution. ...
    Downloads: 42 This Week
    Last Update:
    See Project
  • 2
    age

    age

    A simple, modern and secure encryption tool (and Go library)

    age is a security-oriented tool and library by Filo Sottile. age is a simple, modern, secure encryption utility (and Go library) that emphasizes minimal configuration and strong defaults. It provides small explicit keys, no complex options, and is designed for UNIX-style composability; you can pipe into it, integrate it into scripts, etc. It supports a clearly defined format and promotes interoperability across implementations (there are Rust, TypeScript, etc). The project is well-suited for personal data encryption, backup use-cases, scripting encryption workflows, and embedding encryption in tools. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    GOAD (Game of Active Directory)

    GOAD (Game of Active Directory)

    game of active directory

    GOAD (Gather Open Attack Data) is a security reconnaissance framework for collecting, enriching, and visualizing open-source intelligence (OSINT) around hosts, domains, and certificates. It automates queries to certificate transparency logs, passive DNS, subdomain enumeration, web endpoints, and other public threat feeds. The tool aggregates results into structured formats and can produce interactive graphs to highlight relationships between entities (e.g. domain → IP → cert → ASN). Analysts...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    Chronograf

    Chronograf

    Open source monitoring and visualization UI for the TICK stack

    Chronograf allows you to quickly see the data that you have stored in InfluxDB so you can build robust queries and alerts. It is simple to use and includes templates and libraries to allow you to rapidly build dashboards with real-time visualizations of your data. Access control is only available in InfluxDB Enterprise and InfluxDB Cloud. Chronograf offers a complete dashboarding solution for visualizing your data. Over 20 pre-canned dashboards are available to allow you to get started very...
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    XRAY

    XRAY

    XRay for recon, mapping and OSINT gathering from public networks

    XRAY is a modular security toolset that helps developers and security professionals analyze, fuzz, and test web applications, protocols, and network services for vulnerabilities. It provides a framework for writing and executing inspection modules that can parse structured data (JSON, XML, HTML), traverse graphs of endpoints, and perform intelligent probing guided by discovered surface area. XRay is typically used as a reconnaissance and vulnerability discovery engine in red-team or...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    teler

    teler

    Real-time HTTP Intrusion Detection

    teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that we collect and provide by the community. kitabisa/teler-waf: teler-waf is a Go HTTP middleware that provide teler IDS functionality to protect against web-based attacks and improve the security of Go-based web applications. It is highly configurable and easy to integrate into existing Go applications. teler provides alerting when a threat is detected, push notifications...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Live-Forensicator

    Live-Forensicator

    A suite of Tools to aid Incidence Response and Live Forensics

    ...It automates the capture of volatile information—running processes, network connections, loaded drivers, account sessions, and in-memory artifacts—into a consistent artifact set that investigators can analyze offline. The tool tries to be non-invasive while collecting sensitive data quickly and logs the collection steps to preserve chain-of-custody details and to help auditors understand potential collection side effects. Because live collection can alter system state, Live-Forensicator includes options to limit intrusive actions and to capture hashes, timestamps, and provenance metadata to aid later validation. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    KeePass

    KeePass

    A lightweight and easy-to-use password manager

    KeePass Password Safe is a free, open source, lightweight, and easy-to-use password manager for Windows, Linux and Mac OS X, with ports for Android, iPhone/iPad and other mobile devices. With so many passwords to remember and the need to vary passwords to protect your valuable data, it’s nice to have KeePass to manage your passwords in a secure way. KeePass puts all your passwords in a highly encrypted database and locks them with one master key or a key file. As a result, you only have to...
    Leader badge
    Downloads: 203,447 This Week
    Last Update:
    See Project
  • 9
    Temp_Cleaner GUI

    Temp_Cleaner GUI

    A free and open-source program to free up disk space

    ...Temp_Cleaner GUI Project is a simple and straightforward utility that enables you to clean your Windows-based computer of junk and obsolete files. The app comes with a single-window interface packed with a huge list of options. As you probably hinted, all you need to do is select the areas where you prefer the app to clean temporary files. In addition to browsers, the app also includes directories that are generally skipped when doing maintenance on the PC, such as Systemdrive Recycle Bin, Windir, Windows 10 Modern Application Cached data, Action Center, Notification Center Cached data, or Icon Cache file in the Local app data folder, just to name a few. ...
    Leader badge
    Downloads: 1,106 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 10
    BleachBit

    BleachBit

    deletes junk files to free disk space and improve privacy

    BleachBit frees disk space and maintains privacy. Cleans cache, Internet history, temporary files, logs, cookies, Firefox, Google Chrome, Flash, Windows, Linux, and more. Downloads are at www.bleachbit.org and source code is at GitHub.
    Leader badge
    Downloads: 2,148 This Week
    Last Update:
    See Project
  • 11

    pwmd

    Serves XML element content over a UDS or TLS.

    ...An element may also contain a "target "attribute that resolves to another element path in the XML document similar to a symbolic link in a filesystem. Pwmd also supports multiple connections to the same data file (with locking), obtaining a passphrase when needed via a pinentry program or key file, gpg-agent support as well as smartcards, caching options and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Speedcrypt File Encryption

    Speedcrypt File Encryption

    A File Encryptor with many Options and Powerful Algorithms!

    Speedcrypt is a software to encrypt your data that implements some of the most powerful and secure algorithms in the world. It also uses the most sophisticated password derivation techniques, with very robust HASH Functions. Speedcrypt implements libraries such as Bouncy Castle and others among the most used in the world of cryptography! Speedcrypt is a free program for encrypt the files which helps you to manage in a secure way. The files are encrypted using the best and most Secure...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 13
    Secure Password Generator

    Secure Password Generator

    The Strong Password Generator is a user-friendly and secure tool

    The Strong Password Generator is a handy tool designed to help users create secure and complex passwords effortlessly. With its customizable options and user-friendly interface, this tool provides a reliable solution for generating strong passwords that enhance the security of online accounts, sensitive data, and digital assets. Features: Password Complexity: The generator allows users to specify the desired complexity of the password, such as the length, inclusion of uppercase letters, lowercase letters, numbers, and special characters. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    pyWhat

    pyWhat

    Identify emails, IP addresses, and more

    pyWhat is a Python-based identification tool designed to figure out “what” a piece of text or file content represents, especially in security and OSINT workflows. Given inputs such as hex strings, URLs, email addresses, IP addresses, credit card numbers, cryptocurrency wallets, or entire .pcap capture files, it scans for structured patterns and tells you what it finds. The tool is recursive: it can traverse files and directories to extract meaningful entities, which is useful when analyzing...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    VaultSync

    VaultSync

    Sync directories and files in a secure folder on an external drive

    VaultSync keeps synchronised data backups from one or more computers in an encrypted vault that is locked with a password. It is optimised to operate on a flash or external drive with minimal installation but it can also work on a hosted storage system like Dropbox, One Drive or Google Drive. It is really important that a backup is simple and fast to make. There is no point in having to decide what files are important or what has changed at the time of the backup, or having to manually...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    QuantumAccelerator

    QuantumAccelerator

    Open source application to help you optimize and tweak Windows 10/11

    DISCLAIMER: THIS APPLICATION IS IN BETA AND MIGHT HARM YOUR SYSTEM, ONLY USE IT IF YOU ARE A TECH EXPERIENCED PERSON. POSSIBLE DAMAGE DOES INCLUDE BUT IS NOT LIMITED TO DAMAGE ON OTHER APPLICATIONS, HARDWARE DAMAGE (OVERHEATING) AND DATA LOSS QuantumAccelerator is a free and open source application to easily manage Windows 10/11 in one place. With this application, I want to allow less tech experienced people to be able to manage their computer, especially when it comes to privacy. It...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    vulscan

    vulscan

    Advanced vulnerability scanning with Nmap NSE

    Vulscan is a module that enhances nmap to a vulnerability scanner. The nmap option -sV enables version detection per service which is used to determine potential flaws according to the identified product. The data is looked up in an offline version of VulDB.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    Invoke-PSImage

    Invoke-PSImage

    Encodes a PowerShell script in the pixels of a PNG file

    ...It can embed a script or binary blob into an image (commonly PNG or JPEG) and later recover that payload without leaving a separate file on disk, enabling in-memory execution workflows. The tool offers options for compression and encryption so the embedded content is both smaller and protected by a passphrase when required. It includes helpers to encode a payload into an image, decode an embedded payload back to readable form, and run the extracted content directly from memory to avoid touching disk. Designed as a compact, single-file PowerShell script, it relies on .NET imaging APIs to manipulate pixel data or metadata and to store the payload in a way that survives ordinary file transfers.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19

    Latin Square Toolbox

    Generates Latin squares and counts their transversals

    The Latin Square Toolbox contains software tools for efficiently generating Latin squares and counting their transversals with various user-configurable options. This open source release aims to help educate folks on Latin squares and their important applications to cryptography. This version contains three tools: 0. Latin Square Generator (LSG) 1. Latin Square Transversal Counter (LSTC) 2. Latin Square Property Checker (LSPC)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    rtl2832-entropyd

    Use an rtl2832 USB dongle to generate random data for the linux kernel

    rtl2832_entropyd is a program that is designed to feed entropy into the linux /dev/random kernel entropy pool. It automatically forks and runs as a daemon, unless one of the testing options, -o or -t, are selected. Then it never forks. To use it, you need an rtl2832 USB dongle. They are relatively cheap (< $10 on ebay), and are actually used to listen to a broad range of radio transmissions. This application exploits the radio noise in the atmosphere to extract entropy. The kernel...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    URC ACCESS MODES v3.0

    URC ACCESS MODES v3.0

    Provides control of Various Functions with pasword protected interface

    With URC ACCESS MODES v3.0 we can have complete protection & control for our desktop/laptop with a password protected interface it has 6 best tools which includes : USB Tool & CD/DVD Tool, Registry(regedit.exe) Tool & Command Prompt(cmd.exe) Tool, Group Policy Tool(gpedit.msc) & Task Manager Tool(taskmgr.exe), With USB & CD Tools , Data Theft is Eliminated , No one can access our data without our permission since we can disable USB Mass Storage Devices such as Pen Drives ,...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 22
    White Knight

    White Knight

    Machine Shutdown Security Tool

    ...This project seeks to provide a quick any easy low overhead solution that will shut your computer down to trigger your full disk encryption before an unsophisticated adversary has time to extract sensitive data. News: Alpha 0.04 Hotfix Update - Passwords now work! - Successfully tested against USB Rubber Ducky! This release I worked on building out a class that can be used to start offensive attacks on the target USB. Two options have been enabled for this release, the ability gather a log of all files on the incoming device & the ability to calculate the SHA1 of the incoming drive's files. ...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 23
    SaBackup

    SaBackup

    Create incremental backups

    SaBackup creates incremental backups of your data. For this it utilizes Microsoft's Robocopy and the Volume Shadow Copy Service. You can use any file browser to access your backups, no special program is needed.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    BitKiller
    BitKiller securely shreds files and directories, removing them completely from your hard disk. It can quickly and efficiently overwrite files using anything from random data to the Gutmann method. It also changes filenames to make them harder to find. No setup or installation needed.
    Leader badge
    Downloads: 53 This Week
    Last Update:
    See Project
  • 25

    AlertWheel

    AlertWheel is a visualization-based analysis tool for Snort IDS logs

    AlertWheel is a new software application easing network analysis on large-scale networks. It is based on a novel radial visualization capable of simultaneously displaying several thousand alerts, emphasizing the most important alerts or patterns in the dataset. Among other things, AlertWheel offers a new technique for representing bipartite graphs (where links exist between two distinct node groups). Using this approach, links are positioned in a way to reduce occlusion in the visualization....
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next