Showing 957 open source projects for "gnu linux"

View related business solutions
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1
    mod_antihak is an Apache Module designed to eliminate the CodeRed and Nimda worm\'s network bandwidth consumption. We're working to make it as easy as writing a line of text to add more worms! :)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    GAIM encryption plugin using GPG (PGP clone). It works transparently and smoothly. Automatically establishes secure conversations with other enabled users, passes keys (if enabled) and eventually will allow you to specify your own keys to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Open Source file encryption, written to learn about cryptograpy, programming, etc. And hopefully come up with some new encryption techniques that might benefit the public.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Trace2ip is to hold one trace of all connections IP, memory the information into the file. The file to have like unique key ip_source and like associate data header IP. Alternative Key:Audit, Trace, Monitor, Dump, IP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 5
    The Desktop Environment For Kids is a kid friendly environment for UNIX/Linux, complete with kid oriented desktop themes and desk accesories.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A simple, secure web server, derived from Hobbit's "webs"
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A project to provide a GUI toolkit to facilitate (and where possible, automate) the breaking of classical (pen-and-paper) cryptosystems. Initial focus is on the cryptanalysis of monoalphabetic substitution ciphers.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8
    Prelude is an Hybrid Intrusion Detection system. It is composed of differents sensors and of a Manager. Currently distributed is an NIDS sensor. the Manager is for reporting attacks in an user readable form. Prelude is completly modulable and distributed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Blaster Scan is a TCP port scanner. It can extract users exploiting vrfy or expn, check anonymous access on FTP, check brute force on FTP and POP3, extract daemons\' versions, and scan for CGI bugs. It also has a SYN port scan, the ability to ping hosts t
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    This program is an automated administration tool that allows stranger (or worse, your friends) to connect to you host and create user accounts in a secure manner.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Cryptools is a collection of tools to aid in the process of cryptanalysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    ISP Controller is a project aimed at designing a complete sollution for a ISP-wide management system. Basically, we want the use to be able to configure any daemon, on any machine, using a central PHP/Apache backend.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    Sidecar is a Kerberos authentication utility used at Cornell University and several other universities. This project is designing a secure GTK+/Gnome utility that is functionally equivalent to the Windows/Mac versions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The newssnarf software is a sample extension of the popular "dsniff" package in that it will automatically track and log NNTP connections by USENET group and article number.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    SecureVNC is a development/add-on to the TridiaVNC sourcecode base which provides strong authentication, strong symmetric encryption, and fewer security vulnerabilities than existing VNC implementations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Nannie watches over your files so you don't have to.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Construct, inject and capture raw IP,ICMP, TCP and UDP packet using java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This is intended for those lazy security administrators that are tired of wasting their time doing the same things over and over again. This will make your life *much* easier!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    checkps is a program to detect rootkits by detecting falsified output and similar anolomies. The ps check should work on anything with /proc, the (currently incomplete) netstat check is more linux specific
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    a *simple* libpcap program that dumps network packets in a variety of formats. If you are a programmer, this is a good starting point for you to build your own programs. [NOTE: In the CVS repository there is a version with *alot* of features added]
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This is a project that simulates the German Military Enigma machine during WWII.. It is a project for beginers to learn to program and to meet people. If anyone is interested in helping, please email me @ dustin@rockhill.org
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    BFBTester is great for doing quick, proactive, security checks of binary programs. BFBTester will perform checks of single and multiple argument command line overflows and environment variable overflows. Versions 2.0-BETA and higher can also watch for tem
    Downloads: 2 This Week
    Last Update:
    See Project
  • 23
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    The purpose of this project is to develop and maintain a Virtual Reality network interface to provide for network management and security for heterogenous networks of all types. This interface will allow you to monitor and actively scan your network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Immune Security Architecture For your Enterprise -- Host-Based Intrusion detection for UNIX based systems, at the process level. Detect changes in the normal behavior of processes, advanced features to detect Buffer Overflows.
    Downloads: 3 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB