1004 projects for "gnu linux" with 2 filters applied:

  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 1
    A distributed and dynamically threaded password cracker. Completely cross-platform using Qt 4.3. Utilizes 1 server and N clients to distribute password cracking across N machines, each of which can utilize N CPUs.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Gateway Anti-Virus allows applications across the enterprise to check files for viruses by providing a SOAP-based virus scanning web service. The system uses clamav for virus definitions and detection.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    jHomeNet is a home automation client/server application written in Java used to monitor and control sensors and devices around your house. The application uses of a number of existing communication technologies including Dallas Semi's 1-Wire and X-10.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A self contained cross platform utility for encrypting (and decrypting) files using AES 256 (and SHA 256) for secure transportation or privacy.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    Minarke Is Not A Real Kriegsmarine Enigma But it will allow you to communicate with one. Command line enigma machine emulator. Full M4 compatability, can be used to decode WWII U-boat messages, or send your own.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    The goal of this project is to create an expandable secure content store along the lines described by JSR 283 supporting an access model, which incorporates both discretionary and mandatory access controls.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    psmd listens on an interface and writes the syslog messages that it sees to disk along with a hash. In addition, it can forward system messages to another system as though the messages came from the original device.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    TACS (Trust Ant Colony System) is a Trust model for P2P, Ad-hoc and Wireless Sensor networks (also valid for multi-agent systems) based on the bio-inspired algorithm ACS (Ant Colony System).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Phormat is a dataset format analysis tool to aid in the understanding and comprehension of unknown or undocumented file and protocol formats.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 10
    Web Application Gateway (WAG) provides core functionality, such as user definition, authentication and administration, for web applications developed as modules and utilizing the API exposed by WAG. Core technologies are PHP, MySQL and JavaScript.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    jCryptPad stores text informationen hierarchical, e.g. passwords, important texts etc. The data is saved in a encrypted xml file. Encryption is done with the AES algorithm. Additionally a password generator and a text encryption editor is also included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    viewstate is a decoder and encoder for ASP .Net viewstate data. It supports the different viewstate data formats and can extract viewstate data direct from web pages. viewstate will also show any hash applied to the viewstate data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Erinaceus is an esoteric two dimensional programming language which uses bitmaps as sourcecode. It is turing complete and able to modify itself. It has been created with the goal to create a language that can be hidden in pictures easily.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Thumbnail steganography creates a thumbnail from a source image and stores data in it by altering it's color channels. To decipher the data, a new thumbnail is made from the original image and the differences between the pixels are calculated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This is a Java library for the Nussus vulnerability scanner. It has also been tested to work with the OpenVAS server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Milk is a security source code assessment tool using Orizon as API. Milk scans java and .NET source file in order to perform a security code review trying to point out safe coding best practices misuse.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    An OVAL vulnerability assessment and compliance management tool, written in Python. Depends on paramiko and elementtree.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A simple java library (1.5.* and higher versions) in order to crypt (or decrypt) a file using a password. The library accepts the following parameters: an input file, the operation to perform, and the user password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    XMLStore is a new project that cares about XML-based Databases Access with users Authentication and Authorization and more such as dead-lock accesses. It will be soon introduced to other kind of databases such as SQL,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    JSmex is a JAVA based SmartCard Explorer with an user friendly GUI. It can read and edit the data on SIM, JavaCard, Geldkarte and Cryptoflex cards. Since version 1.1.0 JSmex can also read electronic passports (MRTDs) in plain or BAC mode.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    OCTV it is a robust and complete solution of security and monitoring.It has support for different models of cameras IP.Among its functions includes playback, recording, motion detection, event scheduling and can work simultaneously with many cameras
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    A Python re-write and extension of the (apparently abandoned) Hackbot script. It is designed to assist in the footprinting and enumeration phases of penetration testing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    BlowfishVHDL - free fully synthesizable Blowfish encryption algorithm hardware implementation.
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 24
    Ease the pain of operating a Windows Vista system with User Account Control (UAC) enabled--similar to the sudo command available for *nix systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    GigoIt’s HumanAuth supports ADA and Section 508 requirements, increased security and includes watermarked images with random positioning. HumanAuth ensures that an actual human is using your site without forcing them to read distorted CAPTCHA text.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB