Showing 71 open source projects for "void-linux"

View related business solutions
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    It moves by itself inside networks like virus infection & plagues, it is being written to solve computer virus problem drastically and responsibly. It is legal, free and open for public domain to improve W3 ICT Security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    K is a C++ library featuring Genetic Programming, cryptography, 64 bits arithmetic, cross-platform macros and unicode conversion routines. It compiles on NewtonOS, Mac < X, Unix and Windows and it makes little use of C++ templates.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    SSOOS- Security and Stability Oriented Operating System
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an
    Downloads: 3 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    The purpose of this project is to provide a biometric security solution by using voice print, fingerprint and/or facial recognition along with a password and/or smart card support using AES to protect data. Please read forums for if interested.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Strength in numbers. Existing products we're involved in include port to Linux of Tony Forbes' MFAC for brute-force factorization of MM61 for relatively small factors, and further development and improvement of Tim Charron's ECMnet distributed computing f
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Fingerprint Laboratory - a portable and layered package of libraries and tools for academic research and productive use that allows people to easily integrate Automatic Fingerprint Recognition technology into their software or system with little know-how.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Software for a van eck phreaking device. Please use to test security only. <a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550525,00.html">Here</a>'s an explanation if you don't know what van eck phreaking is.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 10
    GPL hash functions with various ouput sizes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Bouncer en localhost o lan, que permite capturar el trafico hacia un determinado canal de irc, cifrandolo con Rijndael, Serpent o Twofish. Y mostrando una salida por el canal en base64. Ideal para paranoicos.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Este software provee mecanismos de seguridad a sistemas Linux. Entre ellos podemos citar ACL, control centralizado de seguridad, ocultación de procesos, módulos, etc... Podemos usar programas externo como antivirus muy facilmente.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    _malloc is a library able to randomize normal malloc and to make it more secure from possible memory reading; thanks to it, data are allocated in bits with random keys without increasing dimension and access data needed time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The goal of the Stik's Security Module project is to provide a vehicle for implementation of a label based security policy complimentary to the existing Linux security model. The module is implemented by hooking the Linux 2.4.x system call table.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A suite of reverse engineering tools for ELF executables and any operating system that supports it, including numerous gdb patches.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Komoku implements an intrusion detection system using embedded system. Unlike other integrity tools, as tripwire, it does not rely on the operating system. The IDS is actually implemented in an INtel EBSA-285 board.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A library implementing the AES (American Encryption Standard) or Rijndael algorithms, intended to provide a neat packaged solution for other projects to use. Package includes C and Intel Pentium/MMX assembler versions of AES, along with an extensive
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The Hackers Lab is aimed to provide hackers, system audits, system and server and network administrators with applications to secure their own servers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Immune Security Architecture For your Enterprise -- Host-Based Intrusion detection for UNIX based systems, at the process level. Detect changes in the normal behavior of processes, advanced features to detect Buffer Overflows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Wargame Hackademic est un ensemble de composants à ajouter sur un liveCD linux, devenant un wargame; à partir d'un compte classique, vous devez, par divers objectifs et techniques d'exploitation, trouver les failles du cd pour accéder au mode 'su'
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Cryptofon

    Cryptofon

    Cryptofon - a safe phone with integrated encryption.

    The Cryptofon is designed to enable safe and secure communication trough a regular PSTN line. It supports narrowband connections (~2400 bit/s and lower).
    Downloads: 0 This Week
    Last Update:
    See Project