Showing 45 open source projects for "windows kernel"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 1
    fswatch

    fswatch

    A cross-platform file change monitor with multiple backends

    ...A monitor based on kqueue, an event notification interface introduced in FreeBSD 4.1 and supported on most BSD systems (including OS X). A monitor based on inotify, a Linux kernel subsystem that reports file system changes to applications. A monitor based on File Events Notification, a Solaris/Illumos kernel API that reports file events. A monitor based on ReadDirectoryChangesW, a Microsoft Windows API that reports changes to a directory.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    nsjail

    nsjail

    A lightweight process isolation tool that utilizes Linux namespaces

    A lightweight process isolation tool that utilizes Linux namespaces, cgroups, rlimits and seccomp-bpf syscall filters, leveraging the Kafel BPF language for enhanced security. It utilizes Linux namespace subsystem, resource limits, and the seccomp-bpf syscall filters of the Linux kernel.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    Tetragon

    Tetragon

    eBPF-based Security Observability and Runtime Enforcement

    Tetragon is a flexible Kubernetes-aware security observability and runtime enforcement tool that applies policy and filtering directly with eBPF, allowing for reduced observation overhead, tracking of any process, and real-time enforcement of policies. Observe the complete lifecycle of every process on your machine with Kubernetes context awareness. Translate high-level policies for file monitoring, network observability, container security, and more into low-overhead eBPF programs....
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    MemGuard

    MemGuard

    Secure software enclave for storage of sensitive information in memory

    This package attempts to reduce the likelihood of sensitive data being exposed when in memory. It aims to support all major operating systems and is written in pure Go. Sensitive data is encrypted and authenticated in memory with XSalsa20Poly1305. The scheme used also defends against cold-boot attacks. Memory allocation bypasses the language runtime by using system calls to query the kernel for resources directly. This avoids interference from the garbage collector. Buffers that store...
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 5
    Osquery

    Osquery

    SQL operating system instrumentation and monitoring framework

    Osquery is an operating system instrumentation framework for Windows, OS X (macOS), Linux, and FreeBSD. The tools make low-level operating system analytics and monitoring both performant and intuitive. Osquery exposes an operating system as a high-performance relational database. This allows you to write SQL queries to explore operating system data. With osquery, SQL tables represent abstract concepts such as running processes, loaded kernel modules, open network connections, browser plugins, hardware events or file hashes.Osquery queries your devices like a database. ...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 6
    Yank Note

    Yank Note

    A Hackable Markdown Note Application for Programmers

    A Hackable Markdown Note Application for Programmers. Version control, AI completion, mind map, documents encryption, code snippet running, integrated terminal, chart embedding, HTML applets, Reveal.js, plug-in, and macro replacement. Use Monaco kernel, optimize for Markdown editing, and have the same editing experience as VSCode. Support version control; Applets, runnable code blocks, tables, PlantUML, Drawio, macro replacements, etc., can be embedded in the document; support for OpenAI...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Trusted Boot (tboot) is an open source, pre- kernel/VMM module that uses Intel(R) Trusted Execution Technology (Intel(R) TXT) to perform a measured and verified launch of an OS kernel/VMM. mercurial repo: http://hg.code.sf.net/p/tboot/code.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 8
    TOMOYO Linux is a LSM module which focuses on behavior of processes.TOMOYO Linux can be used as a system analysis tool as well as an access restriction tool like SELinux and Smack. TOMOYO Linux has been merged in Kernel 2.6.30.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 9
    HydraDragonAntivirus

    HydraDragonAntivirus

    Open Source Antivirus/XDR for Windows operating system

    Dynamic and static analysis with Real Time Malware Analysis with Antivirus for Windows, including open-source XDR (3 EDR projects), ClamAV, YARA-X, machine learning AI, behavioral analysis, Unpacker, Deobfuscator, Decompiler, website signatures, Ghidra, Suricata, Sigma, Kernel, Hypervisior based protection and much more than you can imagine.
    Downloads: 18 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 10

    usb-guard

    Turn any USB flash drive into a master key for your PC

    USB Guard is an advanced workstation security solution for Windows that turns USB drives into physical authentication keys using native Windows Kernel APIs. - Zero-Trust Security: Validates unique hardware serial numbers through direct Kernel API calls, ensuring only authorized USB drives can unlock your PC. - Brute-Force Protection: Exponential delay penalties after failed unlock attempts prevent automated attacks
    Downloads: 6 This Week
    Last Update:
    See Project
  • 11
    GoldBug - Encrypted Communications

    GoldBug - Encrypted Communications

    Chat Messenger. E-Mail-Client. Websearch. Filetransfer.

    GoldBug is a decentralized & secure communication suite that offers an integrated e-mail client, an instant messenger & a file transfer. Also included is an URL-RSS-DB & a p2p web search. Current vers. w/ McEliece Algorithm. GoldBug has been 2013 - 2023 ten years just another Graphical User Interface of the Spot-On Encryption Suite. Main GUI features: Minimal & colorful Interface with Tabs in the East. Microsoft & Qt MinGW deprecated Win32 & for Compiling: ●...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 12
    Kernelhub

    Kernelhub

    Kernel privilege escalation vulnerability collection

    The original intention of making the project is for, learning, analyzing, and research the latest kernel vulnerabilities are not needed to see the system and related content. This project is a collection of proprietary, except for test failure or unspecified Exp, Demo GIF map. If there is an omission of the omission of CVE vulnerabilities, please join your issues and bring your use of code. Project code is prohibited from testing in a real environment! The reliability of the code is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    HiddenWall

    HiddenWall

    hidden firewall, custom firewall in kernel

    HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on bad situation, attacker can put your iptables/ufw to fall... but if you have HiddenWall, the attacker will not find the hidden kernel module that block external access, because have a hook to netfilter on kernel land(think like a second layer for firewall). My beginning purpose at this project is protect my personal server, now is protect the...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Kubesploit

    Kubesploit

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments written in Golang and built on top of Merlin project by Russel Van Tuyl. While researching Docker and Kubernetes, we noticed that most of the tools available today are aimed at passive scanning for vulnerabilities in the cluster, and there is a lack of more complex attack vector coverage. They might allow you to see the problem but not exploit it. It is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    RageFrame

    RageFrame

    Rapid development application engine based on Yii2 advanced framework

    RageFrame was created on April 16, 2016, a rapid development engine based on the Yii2 advanced framework, which is currently growing, the purpose is to integrate more basic functions, and no longer repeat the manufacture of wheels for the same basic functions, out of the box, making development easier. On September 10, 2018, version 2.0 was officially launched. After more than a year of open source feedback on version 1.0, it appeared in a better form. The 1.0 version has been refactored,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Spot-On
    Seriously entertaining dolphins on echo networks. The official source repository is located at https://github.com/textbrowser/spot-on. Downloads are located at https://github.com/textbrowser/spot-on/releases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The...
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18

    Rockhopper VPN software

    IPsec / IKEv2-based VPN software for Linux.

    Rockhopper is IPsec/IKEv2-based VPN software for Linux. This software is interoperable with Windows 7, Windows 8 and Windows 10 VPN clients and it provides a handy AJAX-based Web console to manage Secure Virtual Ethernet(LAN), Routing-based VPN, Remote Access VPN and servers protected by IPsec. No kernel modules are needed. The ESP protocol stack is also implemented in user space.
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    Windows DOS Alarm

    Windows DOS Alarm

    Set an audible alarm or google voice sms for incomming DDOS attack

    ...Detecting the Idle State: In the Early focus of the Windows Longhorn kernel, Windows 98 booted from a DOS subsystem, and was upgraded to a fully functional NTFS system. Task Scheduler is NOT required to use this project. If the computer is re-booted a new task scheduler is needed! send a sms text message or audible alarm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    InternetExploiter
    InternetExploiter Project download is interrupted, there will be more Features like : -encryption -token stealing -Webcam stream -kernel and user mode rootkit -privilege escalation and much more in the next release . Stay updadet here : https://www.facebook.com/pages/InternetExploiter/603567019785590?skip_nax_wizard=true&ref_type=logout_gear Exploit Windows PC´s fast and easy with an integradted Backdoor wich allows you to upload and download Files thrue a Command Line Prompt. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Matriux
    Matriux is a GNU/Linux, Debian based security distribution designed for penetration testing and cyber forensic investigations. It is a distribution designed for security enthusiasts and professionals, can also be used normally as your default OS.
    Downloads: 34 This Week
    Last Update:
    See Project
  • 22
    BHS Debian (Hades Update)

    BHS Debian (Hades Update)

    BHS debian (testing) jessie/sid

    BHS (Debian) New BHS release Based on Debian jessie/sid Kermel 3.12 KDE 4.11 Debian style and look Custom scripts!! Defcon tools!! New wifi scripts Multiarch support Top tools username: root password: BHS note: Don't forget to run the script located on the desktop to install the missing tools,because without to run it the menu will not be functional,if you not see it just download from here in the file section..sorry for the delay the upload stack for 2...
    Downloads: 36 This Week
    Last Update:
    See Project
  • 23
    The Safe C Library provides bound checking memory and string functions per ISO/IEC TR24731. These functions are alternative functions to the existing standard C library that promote safer, more secure programming. The ISO/IEC Programming languages — C spec, C11, now includes the bounded APIs in Appendix K, "Bounds-checking interfaces". This latest upload supports building static library, a shared library and a linux kernel module.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 24
    squitch p.u.r.e.

    squitch p.u.r.e.

    pure pentesting distribution

    Base: Ubuntu Server Kernel: 3.2.6 Desktop: Gnome 2 Tools: angry IP scanner etherape nmap wireshark fasttrack metasploit 4.2.5 inguma w3af wapiti crunch hydra-gtk radio-network hack‘n‘slay tools .. and more..
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    squitch pentest
    squitch a simple and small pentesting linux distro - A NEW RELEASE IS COMING SOON - !!! NEW FEATURES AND MORE TOOLS !!! take a look @the final edition: https://sourceforge.net/projects/squitchpure/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB