Showing 179 open source projects for "using"

View related business solutions
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 1
    A Windows application which calculates hashes of files or strings using the most widely spread algorithms
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    Cryptar is a cryptographic network backup program that is able to be very efficient with network resources by using an algorithm derived from the rsync algorithm. It uses SHA-1 hashes to verify (sign) its data and AES to encrypt it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    p12_import is an utility created to import pkcs#12 file into a pkcs#11 device. It could be used in place of Netscape/Mozilla, if there are troubles using the crypto device with other pkcs11 compliant application.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 4
    Invenire vera is a tool designed to detect attacks using standard unix logs of one or more systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    A hybrid dictionary/brute passphrase search tool for PMK discovery on 802.11 networks using WPA with preshared keys (PSKs)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Ultramagnetic is a concurrent fork of GAIM that provides strong end-to-end encryption using libgcrypt and anonymous routing using the Six/Four protocol.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    PAM module that spawns a ssh-agent and adds identities using the password supplied at login.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    CPU is meant to be a swiss army knife for administrators who are currently using or wanting to use an LDAP backend for user authentication. This project allows for easy user administration of LDAP users and allows for user and group mods, deletes and add
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A ultrafast lightweight (no GUI) encryption/decryption software using the CryptoAPI on Windows platform, to secure just about anything - regular files and directories, consoles, communication resources(COM ports), Disk devices, pipes and sockets anythin
    Downloads: 0 This Week
    Last Update:
    See Project
  • Turn traffic into pipeline and prospects into customers Icon
    Turn traffic into pipeline and prospects into customers

    For account executives and sales engineers looking for a solution to manage their insights and sales data

    Docket is an AI-powered sales enablement platform designed to unify go-to-market (GTM) data through its proprietary Sales Knowledge Lake™ and activate it with intelligent AI agents. The platform helps marketing teams increase pipeline generation by 15% by engaging website visitors in human-like conversations and qualifying leads. For sales teams, Docket improves seller efficiency by 33% by providing instant product knowledge, retrieving collateral, and creating personalized documents. Built for GTM teams, Docket integrates with over 100 tools across the revenue tech stack and offers enterprise-grade security with SOC 2 Type II, GDPR, and ISO 27001 compliance. Customers report improved win rates, shorter sales cycles, and dramatically reduced response times. Docket’s scalable, accurate, and fast AI agents deliver reliable answers with confidence scores, empowering teams to close deals faster.
    Learn More
  • 10
    Secure Distributed Objects provides a mechanism for using socket-based SSL communications in the MacOS X Distributed Objects system, by providing a NSPort subclass - SecureSocketPort - and other utilities.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    ReHash is an easy-to-use console-based hash calculation tool written in C++. It supports many algorithms and output formats and it can be fully configured using some of the many command-line arguments which can be passed to the tool.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    Status Module is a daemon which forwards vital system information (memory usage, active processes, etc.) into the kernel logs by using a kernel module. This is very useful for logging or security purposes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    zssh (Zmodem SSH) is a program for interactively transferring files to/from a remote machine while using the secure shell (ssh). It is intended to be a convenient alternative to scp, avoiding the need to re-authenticate each time a file is transferred.
    Leader badge
    Downloads: 12 This Week
    Last Update:
    See Project
  • 14
    This ain't your daddy's crypto! We provide a set of C libs and utilities to perform cypherpunk style crypto functions, using your existing OpenPGP keys. Ring signatures; credentials; mental poker; timelines; zero knowledge proofs. Cool stuff!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Gobbler: A tool to audit DHCP networks Includes DHCP rogue server detection, DHCP DoS, distributed spoofed port scanner using DHCP to obtain many source IP addresses, mulitple arp scans, filtered port detection, spoofed OS detection (nmap + port 0)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    QT based Linux web security tool that it is designed to test targets for weak passwords using crack, leech and URL testing functions. Plugins allow potentially any protocol (eg http, ftp) or server to be attacked, while remaining anonymous using proxys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A suite of tools (a sniffer, a TCP hijacker, an ARP poisoner and a TCP tunnel through ICMP/IGMP packets) created for testing TCP/IP weakness and using them in a non-conventional way. [Up to now I've done only the sniffer-related part]
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    microCODE is a PHP module that allows inclusion of encrypted PHP sourcecode instead of plain PHP scripts. Protect your intellectual property using standard encryption algorithms like DES or AES.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    pam_krb5 is designed to allow smooth integration of Kerberos 5 passwordchecking with applications built using PAM. It also supports session-specific ticket files (which are neater), Kerberos IV ticket file grabbing, and AFS token-grabbing.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    KISS is a kernel-side host-oriented security tool, which may bring you file integrity checking, file and process hiding and actions handling on special internal events (using a tiny scripting language).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Regular Expression, Arbitrary Protocol, Opensource Filtering Firewall (Reapoff) is a regular expression enabled TCP/IP plug proxy. The proxy operates on data using a pair of simple rule based configuration files defining the testing and actions on th
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Remote Packet Filter Control Daemon allows remote control and monitoring of OpenBSD's packet filter. It communicates with clients using RPFC protocol running on top of SSL (Secure Socket Layer).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Krome Shield is designed to fool remote fingerprinting tools (using ICMP & TCP), making them think you're running a different OS. It runs under Linux, using the netlink device and ipchains. In the future it will act like an IDS too, detecting attacks a
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A command line tool to create secure encrypted file using private key. You must provide key string to convert you source file into ecrypted one.
    Downloads: 0 This Week
    Last Update:
    See Project