Showing 957 open source projects for "gnu linux"

View related business solutions
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 1
    It provides a common interface to different message digest algorithms, such as MD2, MD4, MD5, SHA, SHA1, SHA256, SHA384 and SHA512. Other algorithms can be added later. Also, it provides a debug capability to export the result at every step.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    The PureSecure Plugin Factory Project focus on the production and share of Demarc PureSecure Extensible Service Monitoring (ESM) Plugins . They can be wrote in any language you want. Demarc PureSecure is free for non-commercial use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Wonder who deleted that important file on your Linux box? Did your database files "mysteriously" disappear from that super-secure Linux database server and you don't know how? Now your system logs will tell who, what, when, and how with Auditunlink
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Regular Expression, Arbitrary Protocol, Opensource Filtering Firewall (Reapoff) is a regular expression enabled TCP/IP plug proxy. The proxy operates on data using a pair of simple rule based configuration files defining the testing and actions on th
    Downloads: 1 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    ThorsenCode is a client-server system, that allows you and your buddies to share files in a safe way. It features encrypted filetransfers and encrypted chatrooms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    stands for Active Integrity Software, provide quick alert of elf file modifications. Based on Gnu/Linux OS, with a daemon to analyse datas give by the kernel module, written in C.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A suite of reverse engineering tools for ELF executables and any operating system that supports it, including numerous gdb patches.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Saint Lawless is a pentetration toolkit. It will be part Cheops and part Nessus with an isometric game-like GUI. Saint Lawless will attempt to gain as much information about a network environment with the least amount of probes. Saint Lawless will also
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    IKECrack is an IKE/IPSec crack tool designed to perform Pre-Shared-Key [password] analysis of RFC compliant aggressive mode authentication.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    ggsniff is not currently a standalone application. Rather, it is a patch for dsniff that adds the ability to record Gadu-Gadu messages to msgsnarf.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Network library lcrzo is useful to create network programs (sniff, spoof, configuration, clients, servers, etc.).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 400 functionnalities to test an Ethernet/IP network. Each one can be compiled alone and modified to match your needs. It was successfully installed under Linux, Wi
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Krome Shield is designed to fool remote fingerprinting tools (using ICMP & TCP), making them think you're running a different OS. It runs under Linux, using the netlink device and ipchains. In the future it will act like an IDS too, detecting attacks a
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    linsnoop is a unix98-terminal (ptmx) sniffer. Is used to observe a shells input/output. It can be used to observe users, also as keyboard sniffer... Be careful - the module is able to steal passwords!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This is a non-causal non-linear encryption system that cannot be cracked by the von-neuman architectures available today
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ProSum is a terminal based program that protects your files, sys_call_table and IDT like tripwire way (All in user space, without kernel modules) In addition, database with files etc. could be encrypted with Blowfish algorythm and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    This project is to create a system for secure remote administration of a unix server from a variety of different operating systems (eg unix and windows).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The IP Personality project is a patch to the Linux kernels that adds netfilter features: it enables the emulation of other OSes at the network level, thus fooling remote OS detection tools such as nmap that rely on network fingerprinting.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A command line tool to create secure encrypted file using private key. You must provide key string to convert you source file into ecrypted one.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    xwepgen lets Mac OS X users use WEP passphrases from nearly all non-Apple 802.11b software and hardware to connect to encrypted wireless networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    CuteFTP Password Recovery (cutepr) is a small utility that recovers passwords stored in CuteFTP's database, sm.dat. Sometimes users store the passwords, and then forget them. This utility searches through the database and displays all the site informati
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    libnwrap - a library of network function wrappers that provides a simple and clear yet powerfull enough API for UNIX network programming. It targets ease of use, protocol independence, reentrancy, thread-safety, as well as built-in cryptograpy
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Udpproxy is very simple but usefull tool for udp traffic forwarding. Can be used if you can't or don't want to mess with kernel level forwarding.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 24
    Track all IP/TCP, IP/UDP, NetBeui, IPX/SPX connections and ARP/RARP traffic. Optionally save connections in MySQL database. Implement http server so you can view connections with web browser or GTK client. Can send fake ARP reply and kill TCP connection
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    This program allow you to extract files from network traffic under HTTP and FTP protocols. It should permit you to see, for instance, using an antivirus on the files, if a machine of your network have downloaded a virus.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB