Showing 5196 open source projects for "linux is"

View related business solutions
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 1
    CryptAPI is a C# library that contains unimplemented algorithms in the .NET framework (NT, NTLM, BlowFish, DES and MD5) linking and emulating the crypt() unix function re-programmed in C#. The main purpose is to provide backward compatiblity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    We can briefly define HDIV as a Java Web Application Security Framework. HDIV extends web application frameworks behaviour (Struts 1.x, Struts 2.x, Spring MVC) in order to avoid most common web application security vulnerabilities
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    CrazyLogger, Kurulumlu Keylooger Programıdır.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Open-source/PHP front-end system for full gateway management based on Iptables/Netfilter, using only built-in features of Netfilter package.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    This project provides a java implementation of the Captcha project ( see http://www.captcha.net ). A CAPTCHA is a program that can generate and grade tests that: -Most humans can pass. -Current computer programs can't pass.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Command-line strong encryption tools including: triple cascaded encryptor, multiple hash calculator and multiple block cipher encryptor. Supports AES, Serpent, Twofish, SHA-512, RIPEMD-160, MD5 and other algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    JConfigura is a library usable in java environments for sharing configuration parameters between different java applications. Moreover it exculpates developers of aspects like property file reading and securing property files with rsa encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    witchxtool is a tool to facilitate hacking consisting of: Port Scan, LFI Scanner, MD5 Brute Force, Dork SQLI Scanner, Proxy Scanner Fresh, Dork LFI Scanner
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Java Home Monitor Application
    This application is used to monitor your home via email / FTP using USB camera and microphone , there is a lot of configurations to customize it upon needs. A motion detection is also supported. More info, in my blog http://osama-oransa.blogspot.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • 10
    Hexjector is an Opensource,Cross Platform PHP script to automate Site Pentest for SQL Injection Vulnerabilties.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Graphical OS fingerprinting
    GraphicalOSfp is a python application which aims to collect random data issued by remote systems in IP and TCP sequences. These data are then displayed in a 3D referencial to highlight an attractor of the random engine of the remote machine.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Hyenae
    Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant. *** Hyenae is back *** Hyenae will be continued here: https://sourceforge.net/p/hyenae-ng
    Leader badge
    Downloads: 55 This Week
    Last Update:
    See Project
  • 13
    SQueRT - A Simple QUEry and Report Tool. SQueRT was created to make the data from Sguil more accessible for people that do not require the real-time event handling and analytical aspects of the TCL/TK Sguil client.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    TCP over RDP tunneling tool
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    qingy is a replacement of getty. Written in C, it uses DirectFB to provide a fast, nice GUI without the overhead of the X Window System. It allows the user to log in and start the session of his choice (text console, gnome, kde, wmaker, ...).
    Downloads: 15 This Week
    Last Update:
    See Project
  • 16
    PHP file monitoring program under LAMP environment without inotify。
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    JHide
    JHide is simple steganography tool aimed to demonstrate basic steganography techniques.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18
    Slogger is a session keystroke logging utility. The goal of the design is to provide the same features available in many commercial products, but under the GNU license.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Two utilities that use the bing and google search engines to harvest email addresses and profile links on linkedin.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    metaPwn is a automated script for Matriux users which can help them perform autopwn using Metasploit by just entering the Target domain
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A program that uses the ICMPv4/v6 protocol to find and map which hosts are up in a network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    FBAC-LSM
    FBAC-LSM is a Linux Security Module based implementation of the Functionality-Based Application Confinement (FBAC) model. Policies to confine processes are created using reusable abstractions which describe the functionalities applications perform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Project to make a simple encryption tool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Proxy Tester is a proxy list tester and then it generates a wpad.dat file you can use for your browser based on working servers. wpad.dat file selects a random proxy server from the list of provided working proxy servers with each connection request.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    ModRWLBF stands for ModRW Logical Brute Force. It's a tool designed to help penetration testers identify rewrite rules used by webservers using logical methods as well as pure bruteforce.
    Downloads: 0 This Week
    Last Update:
    See Project