Showing 221 open source projects for "advanced-ip-scanner linux"

View related business solutions
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Secure File Transfer for Windows with Cerberus by Redwood Icon
    Secure File Transfer for Windows with Cerberus by Redwood

    Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.

    Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
    Try for Free
  • 1
    SAM Jr provides real-time analysis of Snort data. SAM Jr is written in Java and should run anywhere a modern JVM is available. SAM Jr will be extendable via plugins so that custom actions can be written easily.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    GridAuth is a user credential management system for distributed data and computational grids. GridAuth is configurable and extensible to just about any system requiring credential management, advanced authorization and secure authentication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    This project provides a 'brute-force' search for optimum assembler fragments for Microchip Technology Inc's mid-range PIC processor range.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    TSEFS is an encrypting filesystem.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    x:einfach simple java components is a library for java. it includes various things like a page cache for web-content, a virtual string table, an ip subnet checker, string and date handling utilities, a connection pool and other simple things.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    JHoney is a honeypot tool for Linux written in Java. It simulates vulnerable net services to trick an attacker or trojan to attack them. The attacker IP is blocked once a service is attacked, and then the intruder cannot attack for example webservers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Messa is a fully distributed instant messaging and presence application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    MetaCoretex security scanner is an extreemely modular plugin based security scanner written entirely in JAVA to allow the use of JDBC Type IV drivers when scanning databases. Initially, most plugins will likely be for DBs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Visual IP is a network protocol analyzer that works in any operating system with a java VM. At the moment it only allows you to examine data from the disk, and created by tcpdump. You can interactively browse the capture data, viewing summary and det
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 10
    Construct, inject and capture raw IP,ICMP, TCP and UDP packet using java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    This program makes it possible to transfert files from a computer to another via SSL/TCP/IP. It is composed of a part to listening of possible requests, the server, and of one or more customers. Pure Java program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Applet loader for the Cyberflex Access Developer 32k and e-gate 32k cards. Will allow you to load the MuscleCard applet onto the smartcard and use it as cryptographic token.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Adds account lockout after multiple failed authentications in Tomcat's container managed security
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    MTCaptcha Direct Token Decrypt
    MTCaptcha, a GDPR and VPAT compliant captcha service build for the enterprise. This is the demo code to decrypt and decode MTCaptcha's verified token directly on server side without making any API call. This is for customers of MTCaptcha Captcha Service (https://www.mtcaptcha.com) The demo code can be found on github: https://mtcaptcha-public.github.io/MTCaptcha-Direct-Token-Decryption/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    An attempt to bring order to the chaotic world of computer passwords
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    One of the project groups in Intake 6 is planning on doing a IM client which is secure. This includes messenging, file sending, picture drawing, video transmissions by far.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The Shibboleth Proxy provides an intermediate filter to the Shibboleth authentication system, enabling Shibboleth unaware applications to connect automatically and make use of Shibboleth protected HTTP-based service providers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    OpenSQLi-NG is the next generation open source sql injection tool. It silently test and exploit (on-demand) SQL injections conditions. Please refer to the project web site to have the complete description: http://opensqling.sourceforge.net/?page_id=8
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Plug 'n Auth

    The project is being migrated to http://code.google.com/p/ciform...

    IMPORTANT : The project is now being hosted at http://code.google.com/p/ciform Plug'n Auth is an API providing easy integration of different authentication mechanisms into web applications. Within a few steps web admins will be able to change both the authentication backend and the logon frontend at any time with no further effort
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    JSleuth is a system base lining collection tool. The primary purpose of Sleuth is to gather and/or develop topographical information and attributes about specified directories and files in a manner conducive to allow the baseline to be compared against.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Open eSign allows software developers and technical parties in a company to create secure, online (web-based) forms and documents that follow a business process flow and enable legally recognized electronic signatures using digital signature technology.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB