2124 projects for "gnu linux" with 2 filters applied:

  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 1
    Prelude is an Hybrid Intrusion Detection system. It is composed of differents sensors and of a Manager. Currently distributed is an NIDS sensor. the Manager is for reporting attacks in an user readable form. Prelude is completly modulable and distributed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Blaster Scan is a TCP port scanner. It can extract users exploiting vrfy or expn, check anonymous access on FTP, check brute force on FTP and POP3, extract daemons\' versions, and scan for CGI bugs. It also has a SYN port scan, the ability to ping hosts t
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A project to provide a GUI toolkit to facilitate (and where possible, automate) the breaking of classical (pen-and-paper) cryptosystems. Initial focus is on the cryptanalysis of monoalphabetic substitution ciphers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    This is an easily configurable firewall which runs under ipchains or iptables (2.2 kernel, or 2.4). Requires no knowledge of iptables/ipchains.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    This program is an automated administration tool that allows stranger (or worse, your friends) to connect to you host and create user accounts in a secure manner.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Cryptools is a collection of tools to aid in the process of cryptanalysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    ISP Controller is a project aimed at designing a complete sollution for a ISP-wide management system. Basically, we want the use to be able to configure any daemon, on any machine, using a central PHP/Apache backend.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    Sidecar is a Kerberos authentication utility used at Cornell University and several other universities. This project is designing a secure GTK+/Gnome utility that is functionally equivalent to the Windows/Mac versions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The newssnarf software is a sample extension of the popular "dsniff" package in that it will automatically track and log NNTP connections by USENET group and article number.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    SecureVNC is a development/add-on to the TridiaVNC sourcecode base which provides strong authentication, strong symmetric encryption, and fewer security vulnerabilities than existing VNC implementations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    petrovich is a GPLed filesystem integrity checker similar to Tripwire. It is written in Perl using standard perl modules available from www.cpan.org. It currently supports Base64 MD2, MD5, and SHA1 hashes. Petrovich has been tested on windows 2000, Ope
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The port scan plug in for snort, or just portscan for short is intended to be used in conjunction with snort and logcheck. The tool will allow you to monitor your snort log file and then do port scans based upon certain keywords.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Nannie watches over your files so you don't have to.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This is intended for those lazy security administrators that are tired of wasting their time doing the same things over and over again. This will make your life *much* easier!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Construct, inject and capture raw IP,ICMP, TCP and UDP packet using java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    checkps is a program to detect rootkits by detecting falsified output and similar anolomies. The ps check should work on anything with /proc, the (currently incomplete) netstat check is more linux specific
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    GNotary is an asynchronous peer-to-peer digital notary service based on email. The server polls POP3 mail boxes scanning for specified key words in the subject line. A digital signature of the email body is returned to the sender.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The goal of this project is to develop a network protocol (Peer Instant Messenger Protocol, PIMP) that creates a distributed, peer-to-peer network for the transmission of instant messages, along with a graphical client that will allow users to access the
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The CDSA Java Interface project allows you to use CDSA services as JCA-JCE services from your Java applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    KCrypto is a KDE2 file encryptor. It uses the Rijndael ( block cipher algorithm AES winner ) public domain c++ class implementation written by Szymon Stefanek , and it is capable of encrypting and decrypting every kind of file ( text and binary ) i
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    protect product by test the number printed in it,easy to vist for wap and http.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    a *simple* libpcap program that dumps network packets in a variety of formats. If you are a programmer, this is a good starting point for you to build your own programs. [NOTE: In the CVS repository there is a version with *alot* of features added]
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    This is a project that simulates the German Military Enigma machine during WWII.. It is a project for beginers to learn to program and to meet people. If anyone is interested in helping, please email me @ dustin@rockhill.org
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Free Crypto Token will be a free, operating system independent and standard driven interface to smartcards, key files and other hard- and software crypto tokens. In fact FCT will be a framework for PKCS#11 modules that will also include some implementati
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    This turns a PDA with a wireless connection into a internet telephone.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB