1006 projects for "void based linux" with 2 filters applied:

  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • 1
    Amnesia.
    Amnesia is a design-rich 'host-proof' web application that encrypts and remembers all sorts of personal information from passwords to private notes. Project now hosted at Google Code: https://code.google.com/p/amnesia-app/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    phpKeyMgr is a PHP based SSH key managing software. You can create multiple keys, define servers, and choose valid keys for each servers. After this you can export the authorized_keys file with ease.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    REL (Research and Education Language) is a simple but very powerfull language with a compiler, an interpreter and a verifier.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 5
    Open Smart Home is project which provide intelligent control interface for your home.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    ** Guys I have built a much more powerful Fully Featured CMS system at: https://github.com/MacdonaldRobinson/FlexDotnetCMS Macs CMS is a Flat File ( XML and SQLite ) based AJAX Content Management System. It focuses mainly on the Edit In Place editing concept. It comes with a built in blog with moderation support, user manager section, roles manager section, SEO / SEF URL
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    ClamCour is a Courier-MTA multithread filter that allows Courier to scan mail for viruses using Clam Antivirus package. Attachments can be "quarantinated" and custom domain-based email reports can be sent.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    AMAS stands for Ants Mobile Authentication System and it permits to use one time passwords (OTP) to authenticate users and user groups. The user asks for tokens using a cellular phone call, an SMS, or a SOAP interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    ENCAM is an asset management database and configuration backup tool for Cisco network devices. ENCAM pulls configuration data from devices, stores it, reports changes, analyzes configuration defects, generates asset lists and compliance reports.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Dun and Bradstreet Risk Analytics - Supplier Intelligence Icon
    Dun and Bradstreet Risk Analytics - Supplier Intelligence

    Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.

    Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
    Learn More
  • 10
    A more modern wiki focusing on open technologies like SOAP and XML, and upon a more focused form of wiki software that incorporates the elements of traditional content creation, such as from journals, books or periodicals.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    This program aims at providing a java solution to hide secret information(such as secret file) to JPEG images. Hiding algorithm contains Jsteg and F5. The main(probably the toughest) stuff is encoding and decoding JFIF files.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Dr. Crypt Encryption Algorithm & Library
    DrCrypt, based on basic xor(exclusive or) encryption which is designed to be fast and reliable. Also DrCrypt supports 3 platform.(Java, .NET, Win32)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Software solution for creation and verification of digitral signatures. Can replace tokens and smart cards with mobile phones. Components included are client and server. Can creates, verifiy and store content and signatures. Offers secure sharing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    DWIP is short for Disk Wiping and Imaging Tool. This tool is being built for Mississippi State Universities National Forensics Training Center for use on a live cd to give out to it's students.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Ramos - McCain - RSA. Cryptographic tool based on the widely-known RSA public-key algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    IncrediBL is a project that aims to provide a respected and accountable DNSBL service for various communication systems like IRC and e-mail. The code is primarily used by the IncrediBL service itself, but it can also be used to create a separate DNSBL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Cryptic
    Cryptic is a cryptographic applications suite for encryption/decryption of data, calculating cryptographic hashes or message digests and securing user passwords using a master password in a password safe.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Ourmon is a network monitoring and anomaly detection system and displays the data for multiple BPF expressions via RRDTOOL-based graphs. It also helps the user identify various kinds of network anomalies using various flow analysis tools and logging.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    !! THIS PROJECT HAS MOVED TO GITHUB !! !! https://github.com/durzo/fail2sql !! Fail2SQL is an addon to Fail2Ban which logs information to a MySQL database. This information can then be used in reports, graphs or by third party programs to take further action such as permanent blocking, reporting to ISP etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    An attempt to send a full flagged MIME based email using open relay mail servers (authentication not required). Written in Python3. Using smtplib and email liabraries TODO: Bruteforce the SMTP authentication. Support TLS.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    AccesStream is a Java-based, embeddable identity and access management (IAM), security and access reporting platform. AccesStream includes Single Sign-On using SAML 2.0 and provides profile storage with LDAP v3 access for integration with Linux PAM
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    NetCop UTM with Secure Wi-Fi HOTSPOT
    NetCop is UTM, UTM Firewall, ClamAV Antivirus, Web Cache, Content Filter,IPS/IDS, WAN Link Manager, Bandwidth Manager, Anonymous Proxy Blocker, Wifi Hotspot Controller, SSL VPN, Network Virtulization in single ISO CD distribution.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 24
    Libnids - NIDS E-component, based on Linux kernel. This library provides IP defragmentation, TCP reassembly and port scan detection.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 25
    secureStore
    Designed for data centre management, secureStore uses end to end encryption, granular user access control, comprehensive login, and open source technology to create a secure way to manage sensitive information such as private keys, certificates, etc.
    Downloads: 0 This Week
    Last Update:
    See Project