Showing 1405 open source projects for "source"

View related business solutions
  • Streamline Azure Security with Palo Alto Networks VM-Series Icon
    Streamline Azure Security with Palo Alto Networks VM-Series

    Centrally manage physical and virtualized firewalls with Panorama

    Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
    Learn more
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    Portscan is a simple TCP port scanner (connect scan, similar to nmap -sC). It is implemented with threads for better speed. Please see the code and review it. Criticism is more than welcome. Helps needed to make it robust.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Authenticating proxy server software for Mac OS X. The front-end is written in Obj-C using the Cocoa framework, but the actual proxy daemon application is written in C using plain BSD sockets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    TILT is a set of terminal logging and playback tools for auditing telnet and SSH connections made from a bastion host. It provides timestamped logs and real time playback of logs for incident reports, incident analysis or as a training aid
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    The Solitox Community system provides an integrated real-time chat service, web interface, and a scalable infrastructure for adding more services with common credentials. These interfaces allow a greater level of communication for your users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 5
    WHIPS (Windows Host Intrusion Prevention System) is a Host Intrusion Prevention System for Windows NT/XP/2003. WHIPS uses the system call interposition technics and it is developed as a kernel module.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Recently, security is becoming a social issue. Security patch of Microsoft was cracked in several days after releasing. This kind of binary cracking is composed by debugging and reverse engineering technique.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A set of tools, many written in C, to deal with BRO (www.bro.ids.org). and its working environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The Cryptographic Implementations Analysis Toolkit (CIAT) is compendium of command line and graphical tools whose aim is to help in the detection and analysis of encrypted byte sequences within files (executable and non-executable).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The idea of chklinkcnt is to traverse all directories of a linux or unix filesystem and in each directory count the directory entries and compare the number with the link count of the current directory. If these don't match something might be wrong.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 10
    FLAG was designed to simplify the process of log file analysis and forensic investigations. FLAG facilitates efficient analysis of large quantities of data within an interactive environment. PyFlag is the reimplementation of FLAG in Python.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    SSHDOS is a DOS port of SSH, SCP, SFTP and Telnet clients. Needs a packet driver (or a PPP driver for dialup connection) only. There are two separate packages for SSH1 and for SSH2.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 12
    revinetd is a revserse tcp port redirector. It operates in two modes, listen-listen and connect-connect. It can be used to forward traffic through firewalls where outbound rule sets are more liberal than inbound rules.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    After installed on one computer, it captures MSN chat across all computers in the same LAN, analyze and save into database for future analysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    ConAlyzer (CONsistency anALYZER) is an experimental tool for finding inconsistencies between log files and file system metadata, implemented in Tcl/Tk. At present it only handles FTP log files produced by the Serv-U FTP server on the Windows platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This project is an attempt to redesign the snort database schema and to provide a new analysis frontend and associated tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    The PowerCiph Data Encryption Algorithm is a versatile, yet simplistic, encryption algorithm/protocol. The ultimate goal of the algorithm is simplicity, compactness, and a lack of prerequisites.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    GTCop Professional Security Appliance aims to provide a powerful tool for satellite communications, with enhanced QoS and bandwidth controls. As derived from IPCop Firewall, it is a stable, secure, easy to configure and maintain GNU/Linux firewall box.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    WARNING: Project moved to http://github.com/plashchynski/viewssld viewssld is a free and open source non-terminating SSLv2/SSLv3/TLS traffic decryption daemon for Snort and other Network Intrusion Detection Systems (IDS).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Secure Storage service is a set of tools to store in a secure way and in an encrypted format confidential data on the grid storage elements. The service has been designed for the grid Middleware of the EGEE infrastructure, gLite.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Snort_inline is a modified version of Snort. It accepts packets from iptables, instead of libpcap. It uses new rule types to tell iptables if the packet should be dropped or allowed to pass based on the Snort rules.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    RAS-SMS is a simple extension to Microsoft's Remote Access Service (RAS). RAS-SMS adds two factor authentication to standard VPN/PPTP clients on Windows, Mac-OS and Linux. RAS-SMS uses your mobile phone instead of smart cards, RSA keys or USB tokens.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Memsniff is a bootable memory sniffer which extracts passwords and other interesting information from memory, based on a catalog of known signatures. It can be copied onto a removable device, and used to extract data from memory of a cold-booted system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    For system user to take backup of any confidential file(it may be code/important document)as it may contain content not meant for the others to view or the system may crash.We will be securing the backup of selected files at regular intervals of time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    TSMtape allows recovery of files found on TSM v5.x (tested against 5.2) tapes.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    Brute is a brute force hash cracker, it allows the user to specify how many threads he want running simultaneously. It is fast, and modular, all the hash algorithm dependent code lies in a module (a shared library). Modules available: MD5; SHA256; SHA512
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB