Showing 200 open source projects for "metasploitable-2"

View related business solutions
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 1
    Fully packaged linux distribution to provide internet access and resource management to small and medium companies.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    Watermill is a watermarking and fingerprinting software written in Java. It consists of a generic watermarking library which is used by other libraries to watermark relational databases (Postgresql,MySQL), XML Dbs (Xindice) and Web Services. WARNING:
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    JSSF - Java Server Security Faces it's framework for security layer. With JSP tags and pages/resource access control. Support MyFaces and Sun RI JSF
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Spring Security (Acegi Security System for Spring) Samples used in the Book "Spring Security - Das Acegi Security System professionell einsetzen" from Mike Wiesner, entwickler.press
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    epacrypt is a tool to encrypt and decrypt plaintext and binary data using different encryption algorithms which can be chosen from a list.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    PortableNotary permits you to verify pdf signature. Is OS independent and can be used from command line.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    MAximized Risk COntrol (MARCO) supports security professionals and security consultants in building up an enterprise specific Risk- and Control Matrix. So it helps to identify and handle potential risks and mitigate them via properly defined controls.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The Cookie-revolver framework provides J2EE web-applications with two-factor authentication security, “something I know” (userid/password) and “something I have” (encrypted one-time cookie).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The Web Application Reliability and Defense (WARD) framework is a two-part security solution composed of a vulnerability detection component, SecureUnit, and a vulnerability protection component, SecureFilter.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 10
    First Wall is AntiSpyware program. Block spyware to track your system, calling dialers, change browser options...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Offers a complete structure of security for Spring-based projects. It turns any bean in a protected resource. It uses a non invasive approach, and once you create a security policy it makes the bean a PEP (Policy Enforcement Point).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    This project aims to release an IP unencumbered implementation of the core services provided by Mesmerize: an open framework for enterprise security management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    anti spam tool. uses an active algorithm (not filtering).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The Ganymed SSH-2 for Java library (implementing the SSH-2 protocol) allows you to connect to SSH servers from within your Java programs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    One of the project requirements is to be able to digitally sign parts of the IPC 1752 XML documents before it is electronically transmitted between two business partners.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Tecnotel is a project that seeks security and comodity to the end-user, controlling your house through the telephone line, internet or remote-controller. The software available controls the electronic-equipment and others.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    An Iris Recognition system written in Java. Acquires an image, locates the iris and produces a unique 'iris profile' for it. Will be fully supported by its own GUI but potentially linked into other applications, such as xlock.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    truegui is a Java based frontend for the famous truecrypt tool. It is designed for Linux desktops systems (like Gnome or KDE, etc).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Tristero is a framework for creating distributed peer-to-peer file sharing applications. It uses standard technologies for each component, reducing the work of implementing a particular network architecture to the novel aspects of that system and eliminat
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Compute shared RSA keys for two parties using Gilboa's protocol. Other protocols may be added. Contains JAVA source for Benaloh, Naccache-Stern and Goldwasser-Michali crypto-algorithms. Oblivious transfers and BiPrimaliy tests also implemented.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    FragMend is a GUI tool that allows a forensic investigator to classify and view sectors of raw or unallocated data. The sectors can then be ordered and grouped into files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Java version of the excellent KeePass password keeper. KeePass is the primary app; this project just gives access to the database on other platforms. Current platforms: Java Swing, SuperWaba.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Open Source Security System for home users as well as for system administrators. Aims at providing an uniform security platform, Operating System Independent, to protect and prevent valuable data from corruption/stealling and destruction.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    From the creator of ClipClear comes JClipClear, a Java version of the Clipboard displayer and clearer. This program works on almost all OSes that have a clipboard feature.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB