Showing 28 open source projects for "detect it"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Context for your AI agents Icon
    Context for your AI agents

    Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.

    Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
    Try for free
  • 1
    OSS-Fuzz

    OSS-Fuzz

    OSS-Fuzz - continuous fuzzing for open source software

    OSS-Fuzz is a large-scale fuzz testing platform developed by Google to improve the security and reliability of widely used open source software. Fuzz testing is a proven method for uncovering programming errors such as buffer overflows and memory leaks, which can lead to severe security vulnerabilities. By leveraging guided in-process fuzzing, Google has already identified thousands of issues in projects like Chrome, and this initiative extends the same capabilities to the broader open...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    readpe

    readpe

    The PE file analysis toolkit

    readpe (formerly known as pev) is a multiplatform toolkit to work with PE (Portable Executable) binaries. Its main goal is to provide feature-rich tools for properly analyze binaries with a strong focus on suspicious ones.
    Downloads: 24 This Week
    Last Update:
    See Project
  • 3
    Spock slaf

    Spock slaf

    Spock SLAF is a Shared Library Application Firewall "SLAF".

    Spock SLAF is a Shared Library Application Firewall "SLAF". It has the purpose to protect any service that uses the OpenSSL library. The SLAF inserts hooking to intercept all communication to detect security anomalies and block and log attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Motion monitors the video signal from one or more cameras (video4linux interface) and is able to detect if a significant part of the picture has changed. Features: interval snapshots, live streaming webcam, mpeg generation, database interface, OSD etc. For the latest releases and deb packages go to the Motion home page
    Downloads: 8 This Week
    Last Update:
    See Project
  • Smart Business Texting that Generates Pipeline Icon
    Smart Business Texting that Generates Pipeline

    Create and convert pipeline at scale through industry leading SMS campaigns, automation, and conversation management.

    TextUs is the leading text messaging service provider for businesses that want to engage in real-time conversations with customers, leads, employees and candidates. Text messaging is one of the most engaging ways to communicate with customers, candidates, employees and leads. 1:1, two-way messaging encourages response and engagement. Text messages help teams get 10x the response rate over phone and email. Business text messaging has become a more viable form of communication than traditional mediums. The TextUs user experience is intentionally designed to resemble the familiar SMS inbox, allowing users to easily manage contacts, conversations, and campaigns. Work right from your desktop with the TextUs web app or use the Chrome extension alongside your ATS or CRM. Leverage the mobile app for on-the-go sending and responding.
    Learn More
  • 5

    NCrypted

    NCrypted - simple file encryption software with GPU support

    ...This software was designed to be as simple as possible, so you won't find any fancy, flashy gui elements or complicated advanced options. You can also use it directly from command line. NCrypted can automatically detect and take advantage of your NVidia graphics card to speed up the file processing.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6

    OpengateM

    A MAC address based user authentication system for campus-wide network

    This system restricts the network users and records usage log of the users. It is applicable to the campus wide network and is compatible to almost all network terminals. MAIN DEVELOPMENT SITE IS MOVED FROM here TO "https://osdn.jp/projects/opengatem/"
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    DEEEP

    DEEEP

    Detector of Integer Vulnerabilities in Software Portability

    DEEEP is a open source static analysis tool to detect, in C programs, integer vulnerabilities caused by the bad adaption of aplications from ILP32 to LP64. It uses the tools Lint and Splint, and runs over Open Solaris and Linux operating systems. This tool semantically analyses source code. More precisely, it does type checking, data-flow analysis, and it automatically correlates the results of these two types of analysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Free-SA

    Free-SA is report generating tool for web, proxy and mail log files

    ...It can be used to control traffic usage, to evaluate conformance to the Internet access security policies, to investigate security incidents, to evaluate web server efficiency and to detect troubles with server configuration.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    Mwna++ has as purpose to be a Swiss knife to the study of the malicious traffic over an infected machine. It offers the capability to detect, control and report the Malware traffic, like scans applied, DoS, C&C, DNS resolutions, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 10
    Space Monkey
    SpaceMonkey is a Web application auditing tool. It can detect bugs or security flaws without using a knowledge database. It uses fault injection technics ('fuzzing') in order to reveal the flaws (SQL injection, XSS, File inclusion, command execution ).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Network Intrusion Detection Library. Allows the application programmer to easily capture, classify and detect anomalies in network traffic. Libebox supports modules {engines and parsers} that can be written and later loaded by an application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    ROOK is multi-session based Intrusion Detection System (IDS). ROOK can recognize correlations between sessions (TCP, UDP and ICMP sessions) to detect network security events.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Remote Sniffer Detection Tool is a utility to detect sniffers running on other machines in the same network (Ethernet) segment. This project is still in a very early beta stage and currently is only a PROOF-OF-CONCEPT for further development.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    THIS PROJECT HAS BEEN ABANDONED SINCE 2007, NO SUPPORT WILL BE PROVIDED. Winpooch is a watchdog for Windows (2000, XP, 2003, but only 32-bits). It detects modifications in your system, so as to detect a trojan or a spyware installation. It also includes a real-time anti-virus. Set your own security level for anti-spyware, ant
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    Zeppoo allows you to detect rootkits on i386 and x86_64 architecture under Linux, by using /dev/kmem and /dev/mem. Moreover it can also detect hidden tasks, connections, corrupted symbols, system calls... and so many other things.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Secwatch is an intrusion detection system using log analysis to detect service scan and other brute-force attempts on a server or other computer using system logs and will create temporary firewall rules to block offending IPs
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    wIDSard is an host based Intrusion Detection System. It intercepts syscalls made by the process to monitor at user level by the ptrace mechanism. It can detect not only single system calls, but even sequences, ripetition, negation ecc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    PADS is a signature based detection engine used to passively detect network assets. It is designed to complement IDS technology by providing context to IDS alerts.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Foresight is a security architecture designed to detect, alert, respond, and report on events happening throughout the enterprise. The interface aggregates and correlates security information (like a SIM or SEM) from multiple devices within the network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Invenire vera is a tool designed to detect attacks using standard unix logs of one or more systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    The main task of snal is to detect network sniffers. This is done by analyzing TCP/IP packets and DNS queries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    The Sentry tools provide host-level security services for the Unix platform. PortSentry, Logcheck/LogSentry, and HostSentry protect against portscans, automate log file auditing, and detect suspicious login activity on a continuous basis.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23
    Security proxy to clean up all unallowed constructions from HTTP requests, detect intruders and filter outgoing HTTP traffic against leaking classified data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    echolot implements a packet sniffer that grabs ARP packets on any ethernet devices. This empowers your box<br> * to detect intruders (new mac in lan)<br> * to find your boxes on foreign lans (known mac in lan)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A client/server application designed to let the user monitor a directory tree on a remote machine by creating snapshots of current file status in order to later detect file modification, addition and/or removal.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next