Showing 422 open source projects for "beta"

View related business solutions
  • Achieve perfect load balancing with a flexible Open Source Load Balancer Icon
    Achieve perfect load balancing with a flexible Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    Boost application security and continuity with SKUDONET ADC, our Open Source Load Balancer, that maximizes IT infrastructure flexibility. Additionally, save up to $470 K per incident with AI and SKUDONET solutions, further enhancing your organization’s risk management and cost-efficiency strategies.
  • Employee monitoring software with screenshots Icon
    Employee monitoring software with screenshots

    Clear visibility and insights into how employees work. Even remotely.

    Stay productive working at any distance from anywhere with Monitask.
  • 1
    Prismstumbler is a software which finds 802.11 (WLAN) networks. It is designed to be a flexible tool to find as much information about wireless LAN installations as possible. It comes with an easy to use frontend suitable for both PC and PDA displays.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    A simple but fully-featured implementation of the simple Caesar Cipher encryption algorithm, specifically 'rot13' - Caesar with a factor of 13. Supports file and tty input/output, internationalisation, and also includes a shared library.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Kamikaze IRCD is a premium class of russian IRCD based on bahamut ircd core. Full SSL support and unicode charset mappings/nicknames.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A daemon for detecting ARP spoofing (sometimes called "poisoning") on a network & alerting appropriately.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Powering the next decade of business messaging | Twilio MessagingX Icon
    Powering the next decade of business messaging | Twilio MessagingX

    For organizations interested programmable APIs built on a scalable business messaging platform

    Build unique experiences across SMS, MMS, Facebook Messenger, and WhatsApp – with our unified messaging APIs.
  • 5
    A Windows application which calculates hashes of files or strings using the most widely spread algorithms
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    AUTHd: Admission control daemon is a system aiming to provide authentication and authorisation services to other services. Uses the keynote trust management system. It is accessible via IPC, network (OpenSSL support) and kernel-space.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Strength in numbers. Existing products we're involved in include port to Linux of Tony Forbes' MFAC for brute-force factorization of MM61 for relatively small factors, and further development and improvement of Tim Charron's ECMnet distributed computing f
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    portaudit provides a list of published security vulnerabilities of FreeBSD ports and tools to check if installed ports are listed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Business Continuity Solutions | ConnectWise BCDR Icon
    Business Continuity Solutions | ConnectWise BCDR

    Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

    Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
  • 10
    NBTView is a 'NetBIOS Swiss Army Knife' written in C, and usable under several UNIX-like systems. NBTView allows you to passively monitor NetBIOS intelligence (users logged in, shares, etc.), run queries against machines, and brute-force share passwords.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    C++ libraries for creation of CGI applications. Functions include stream operators for the creation of HTML formatting, forms, etc. URL decoding and element retrieval, MySQL access, and encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    GPass is a small GNOME 2 application that allows the user to securely manage a collection of passwords. The password collection is stored in an encrypted file protected by a master password
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Cryptar is a cryptographic network backup program that is able to be very efficient with network resources by using an algorithm derived from the rsync algorithm. It uses SHA-1 hashes to verify (sign) its data and AES to encrypt it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Md5some aims to be a clone of the Gnu md5sum utility, which the additional (and seemingly unique) feature of being able to directly calculate the md5sum of a CD under Windows. It's written in C and builds on Gnu/Linux and Cygwin/Windows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    p12_import is an utility created to import pkcs#12 file into a pkcs#11 device. It could be used in place of Netscape/Mozilla, if there are troubles using the crypto device with other pkcs11 compliant application.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 16
    ODESSA - The Open Digital Evidence Search and Seizure Architecture is a cross-platform framework for performing Computer Forensics and Incident Response.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 17
    Automated Security Tools (autosec) aims to provide automatic tools which network administrators may use to help check and test the security of their network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    LULA stands for Lightweight User-Level ACL. A new way to manage SQUID ACLs, based on a MySQL embed and a Helper, targeting Enterprise Environments LuLa is the translation to portuguese of the word Squid. Also, LuLa is the name of brazilian president..
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Output spool reader for Snort! This program decouples output overhead from the Snort network intrusion detection system and allows Snort to run at full speed. It takes input and output plugins and can therefore be used to convert almost any spooled fil
    Downloads: 6 This Week
    Last Update:
    See Project
  • 20
    Easy to use network stress tester
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    Sniffer Server - decodes TCP streams and captures packets in general The captured content may be saved to files or sent to a client over TCP/IP connection (self-defined protocol)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    stealthy secure remote command triggering for ip networks
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    The Enforcer is a Linux Security Module designed to improve integrity of a computer running Linux by ensuring no tampering of the filesystem. It can interact with TCPA hardware to provide higher levels of assurance for software and sensitive data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    winKeyLock utility enables to lock computer access quickly. Disables the Windows keyboard and mouse so a DVD/Movie can be watched by a small child without changing anything! During lock the current screen stays transparent not like during screen server.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 25
    This is passwords, a free program to store passwords and additional data in an encrypted database. Passwords main focus is on quick and easy usage as well as robustness and flexibility in terms of the encryption technique.
    Downloads: 0 This Week
    Last Update:
    See Project