Showing 1405 open source projects for "source"

View related business solutions
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 1
    USB based memory acquisition tool targeting "warm boot" machines with 4GB of RAM or less. The software requires the use of USB portable media and is built on top of the syslinux platform.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    This project is considered dead by me(The maker). please visit http://tuxcoder.sourceforge.net/ for the newer version.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    This project is a C++ library which allows incorporating DKIM into an existing MTA or other application. It provides full support for signing, verifying, and SSP. It is compliant with RFC 4871.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    LPStego is a steganographic tool for hiding a generic file in a jpeg image. Both command-line and graphical UI is provided.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 5
    gPWG is a GTK based password generation utility. gPWG allows you to create a completely random password or you can choose the password exact contents. Options include: number of passwords, random password length, allowed characters.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    pwntooth is designed to automate Bluetooth Pen-Testing. It scans for devices, then runs the tools specified in the pwntooth.conf; included blueper, bluesnarfer, Bluetooth Stack Smasher (BSS), carwhisperer, psm_scan, rfcomm_scan, and vcardblaster.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Store your secret notes in a safe place. Application and document in one executable file: the mechanism to encrypt/decrypt notes is part of it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    n00bRAT
    An undetectable Remote Administration Tool -OR- trojan, an all new approach. Easily usable, Client just requires any Web Browser to control remote machine via WebPage. Fooling firewalls/ids/ips security solutions, as it operates like any web-site.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    mod_dnsblacklist is a Lighttpd module that use DNSBL in order to block spam relay via web forms, preventing URL injection, block http DDoS attacks from bots and generally protecting your web service denying access to a known bad IP address.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 10
    sudosh3 is an auditing shell and filter based on sudosh2 (a continuation of sudosh).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A C library providing client access to Atlassian's Crowd application. Also includes a command line interface and an Apache authentication/authorization module.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Wireless Hackers Exploitation and Audit Toolkit is a metasploit like framework for Bluetooth and Wifi environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A suite of source and binary programs to test the capabilities of code analysis tools. A reference implementation of x86 binary analysis in C# is also included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A configurable system for synchronising multiple passwords of different types. Password quality can be imposed by using histories, cracklib based tests, and forcing certain passwords to be distinct. CGI and PAM modules exist for tight integration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Rinecrypt uses the Gladman implentation of the AES algorithm Rijndael and a SHA256 hash among other things, to encrypt/decrypt a file with a user supplied passsword.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Logdigest mails interesting lines from log files to the system administrator. Non-relevant lines are filtered out by customizable regular expressions. Logdigest comes with a set of such regexps to provide a good starting point.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    TclTrf is an extension library to the script language tcl, as created by John Ousterhout. It extends the language at the C-and Tcl-with ``transformer''-commands to encode and compress data. Based on the stacked channels of the tcl core (ability inter
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    Randomized packet generation for source mac, source ip spoofing. Any byte in a packet can be spoofed one by one packet generation. And provide a DDoS testing framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    tlax
    description: is a text encrypting with a basic algorithm based on reversing the text. devcpp compiles perfectly. and is created in C. (graphical mode).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Hide your data from any scans for fingerprints at forensic analysis. Fragger is an concept to fragment files into many small files by scrambling the content of the source file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    This project involves implementing simulations of Enigma machines and the Turing bombe on various parallel-computing systems including multi-processor PCs, Linux clusters, and modern enhanced graphic cards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    SpamCheetah is an OpenBSD greylisting based spam filter. It is a liveCD that can run on any machine and it does not modify your hard disk or anything else. It is a network level spam filter and you have to run a separate mail server with it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    View and edit your ELF object file. Useful for plugin-based architectures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Lite Security Module LSM PKCS11

    Lite Security Module: a daemon to handle PKCS11 Secure Boxes

    Lite Security Module: a daemon to handle Secure Boxes (files containing cryptographic keys, X509 certificates and data objects), accessible through a PKCS#11 library, supporting non-certified (lite) Software or Hardware Security Modules (www.clizio.com)
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB