Showing 25 open source projects for "hosts"

View related business solutions
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 1
    AdAway

    AdAway

    Ad-blocking for your Android

    Tired of seeing ads pop up on your Android device? You can take them all away with AdAway! AdAway is an open source ad blocker for Android that uses the hosts file and local vpn. It effectively keeps pesky ads at bay so you can continue using your Android device uninterrupted by constant ads. AdAway gives you the option to add custom sources of host files. It also lets you add custom rules for your whitelist, blocklist and rules for redirects, so your ad blocking is not just generic, but tailored specifically how you want it. ...
    Downloads: 34 This Week
    Last Update:
    See Project
  • 2
    syslog-ng

    syslog-ng

    Log management solution that improves the performance of SIEM

    ...Search billions of logs in seconds using full text queries with Boolean operators to pinpoint critical logs. syslog-ng Store Box provides secure, tamper-proof storage and custom reporting to demonstrate compliance. syslog-ng can deliver data from a wide variety of sources to Hadoop, Elasticsearch, MongoDB, and Kafka as well as many others. syslog-ng flexibly routes log data from X sources to Y destinations. Instead of deploying multiple agents on hosts, organizations can unify their log data collection and management. syslog-ng Store Box provides automated archiving, tamper-proof encrypted storage, granular access controls to protect log data. The largest appliance can store up to 10TB of raw logs.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 3
    Middleware for Existing SSH Hosts (Mesh)

    Middleware for Existing SSH Hosts (Mesh)

    Fine-grained authorizations and single sign-on for SSH remote commands

    Mesh is a secure, lightweight grid middleware that is based on the addition of a single sign-on capability to the built-in public key authentication mechanism of SSH using system call interposition.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    SSHGuard

    SSHGuard

    Intelligently block brute-force attacks by aggregating system logs

    SSHGuard protects hosts from brute-force attacks against SSH and other services. It aggregates system logs and blocks repeat offenders using several firewall backends, including iptables, ipfw, and pf.
    Leader badge
    Downloads: 112 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5

    knocker

    A simple, portable port scanner

    Knocker is a simple, versatile, and easy-to-use TCP security port scanner written in C, using threads. It is able to analyze hosts and the network services which are running on them. It is available for Linux, FreeBSD, Unix, and Windows95/98/2000.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    PLEASE GO TO https://github.com/deksai/pam_abl A PAM module that provides auto blacklisting of hosts and users responsible for repeated failed authentication attempts. Generally configured so that blacklisted users still see normal login prompts but are guaranteed to fail to authenticate.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Nast is a packet sniffer and a LAN analyzer. It sniff packets and save data in files, checks NIC in promisc mode,build LAN hosts list, find a gw,performs a port scanning, catchs daemon banner etc... It also provides a GTK/ncurses interface.
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8
    A program that uses the ICMPv4/v6 protocol to find and map which hosts are up in a network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Black scalpel is an advanced graphical (Swing gui) security and analysis tool written in Java, C and Assembler (platform independent). Current stage is early alpha, many features are still missing. Use SVN!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Rent Manager Software Icon
    Rent Manager Software

    Landlords, multi-family homes, manufactured home communities, single family homes, associations, commercial properties and mixed portfolios.

    Rent Manager is award-winning property management software built for residential, commercial, and short-term-stay portfolios of any size. The program’s fully customizable features include a double-entry accounting system, maintenance management/scheduling, marketing integration, mobile applications, more than 450 insightful reports, and an API that integrates with the best PropTech providers on the market.
    Learn More
  • 10
    GNIPS is a network intrusion prevention system for Linux using Snort and iptables. It alerts user of incoming attacks on their network and allows them to block any offending hosts. It's also possible to configure GNIPS to send out alert emails.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A tool to monitor internet hosts` bandwidth usage in a Linux-NAT network. A daemon collects data and clients display them (currently a Java applet with a graph). It automatically detects new hosts and has a nice summary statistic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    NetSV is part of the management/supervision plane and its role is to assist the network administrator when performing an IPv6 network renumbering by supervising the procedure and making diagnostics on the monitore hosts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Ungoliant is a system utilizing open-sourced backends to isolate problematic (virus-infected or otherwise) hosts from a network. Focuses on vpmsd, snort, and nmap for detection and containment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    KSB26 [Kernel Socks Bouncer] is Linux Kernel 2.6.x loadable module that redirects tcp connections (to user-defined target hosts) through socks 4/5 chains, in a complete transparent way.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    raddump interprets captured RADIUS packets to print a timestamp, packet length, RADIUS packet type, source and destination hosts and ports, and included attribute names and values for each packet.
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16
    hprobe is a packet generator with a built-in sniffer (using libpcap). It can generate many types of network probes to scan hosts and networks and automatically analyses the responses. Written in C for Linux platform
    Downloads: 4 This Week
    Last Update:
    See Project
  • 17
    SharedSecret is a program used to negotiate a shared secret (password) by two hosts in secure way over the Internet. The software is written in C, based on client/server architecture with initial intention to run on POSIX-Compliant Operating Systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    links2world Firewall is a simple tool writen in C, that helps you generate iptables rules for Linux 2.4.x and newer kernels. Very easy to configure, it is designed to run on hosts with one or more network interfaces.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    EtherMan: Ethernet Man In The Middle Attack Tool. It is capable of forcing traffic between two hosts to pass by a third party (MITM) and then redirected to its original destination again. This program is written for educational reasons, and I am not res
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    TCPUnique is a tool for realtime display of unique hosts on your network matching a tcpdump-style filter expression.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    SVPN provides an encrypted tunnel between two hosts, which in combination with IP forwarding enabled on one of the hosts can create a VPN.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    An ultrasecure communications server and clients for *NIX and Windows hosts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    ...It can extract users exploiting vrfy or expn, check anonymous access on FTP, check brute force on FTP and POP3, extract daemons\' versions, and scan for CGI bugs. It also has a SYN port scan, the ability to ping hosts t
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Fastspy is a multithreaded network port scanner. It minimizes connection idle time performing fast subnet service search, classic port range scan, hosts list scan, and also send user data over a connection to log servers response.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    rcstagger

    secure network aware process monitoring system

    rcstagger is a network aware process monitoring system designed to work alongside the init process (Note that it makes no attempt to replace init). It utilizes openssl to maintain PKI authentication to verify the identify of sibling daemons and any control clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next