1004 projects for "gnu linux" with 2 filters applied:

  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 1
    jWaste is a Java based implemtation of the WASTE-Protocol. WASTE is a mesh-based workgroup tool that allows for encrypted, private communication between distant parties on the internet, independant of local network organization.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Anonycat is web-based software that allows you to surf the web anonymously and bypass overly restrictive corporate firewalls or monitoring/blocking software. It can be used online (http://anonycat.com), or run as a service on your own webserver.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    JEraser is a very simple but extremely effective tool to erase a file or and entire directory so that no one could recover it. It's written in Java so you can run it on every platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    The Network Simulation Environment (NOSE) has the capability to virtually create complex networks including different types of operation systems very cost-efficient on a single computer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    Java server implementation of the CAS protocol. CAS is used for distributed authentication and authorization.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    C library for Common Authorization Services (CAS) client applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A privacy and security aware mailing list manager, perfect for allowing closed groups to interact on the Internet without interference from outsiders and former insiders.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    DcSecure is a php based wrapper that cleans Get, Post, and Server variables so as to defend against php vulnerabilities. It cleans all variables and replaces the orignal ones with the cleaned ones so the target scripts do not require modifications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    NAC is a collection of tools for cryptography. The goal is to provide simple-to-use crypto tools (like an OTP, String and number generator, public key algorithm...) you can use under Linux, Windows...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    IDSRG stands for "Intrusion Detection System Report Generator". It generates graphic reports from a snort database of alerts. The main goal of the project is to provide instant reports of your ids events. It has 7 predefined reports and the plans are t
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Open source implementation of the Java Authorization Contract for Containers (JACC) Provider
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    IP Blocker is an incident response tool that automatically updates access control lists on Cisco routers and other devices. Web and command line interfaces are both supported, as is logging, email notification, and automatic expiration of blocks.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    oraOink is a cross-platform java swing client for gathering Snort alert statistics from an Oracle database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The Stegosaurus project is an initiative to build a system for prevention and detection of steganographic propagation on live networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Establish/Maintain DHCP/DDNS/IP registry for small/medium/large scale networks. Easy maintenance and little to no personnel overhead. Provides a fully-automated interface for network registration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This proyect is an implementation of OpenPGP (RFC2440) written entirely in Java. It let's you sign, encrypt, decrypt messages and files, using public key cryptography.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Cisco Torch mass scanning, application layer fingerprinting, and exploitation tool to discover and attack remote Cisco hosts running Telnet, SSH, Web, TFTP, NTP and SNMP services. Useful in auditing large networks for misconfigured/un-updated Ciscos.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This is a simple protection system made in C++. This is my 3th program :). Its like a keygen
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    GPP is a General Purpose Proxy Java graphical application intended mainly for packet inspection and modification. It's main idea is to be a little user-friendly portable man-in-the-middle tool for security analysis. Later, some protocols should be added
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Creates an ssh tunnel on demand
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    The Intrusion Detection Exchange Protocol (IDXP) is an application-layer protocol for exchanging data between intrusion detection entities. IDXP-Java is a Java-based implementation based upon the Java BEEP Core implementation of RFC 3080 / RFC 3081.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    AMaViS is a script that interfaces a mail transport agent (MTA) with virus scanners.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    netleak is a collection of small perlscripts that detects connectivity between network segments. It is mostly useful to detect "leaks" in large organizations that have private network segments physically separated from the Internet.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Role Manager is a security management framework based on the NIST model for Role Based Access Control (RBAC) and the Java[TM] 2 Platform security standards. The access control policies and the RBAC Model are implemented using the RBAC profile of XACML.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    PhpPwdManager, is a multi-user password manager application, written in PHP5 and MySql.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB