Showing 634 open source projects for "open server"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 1
    BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Darkjumper.py Developed by : mywisdom & gunslinger_ This tool will try to find every website that host at the same server at your target Then check for every vulnerability of each website that host at the same server
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    mac-robber is a digital forensics and incident response tool that can be used with The Sleuth Kit to create a timeline of file activity for mounted file systems.
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • 5
    IKEv2
    Encrypted Message Exchange by using Diffie-Hellman key exchange algorithm and Advanced Encryption Standard(AES) encryption algorithm with Cipher-block chaining(CBC) mode using User Datagram Protocol(UDP)port server-client application in C, Ansi-style
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    WebToken is a cryptographic system to authenticate users through a 2FA (Two-Factor Authentication) using OTP (One Time Password).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Servlet container extensions that help web developers write full featured Java web applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Brute Force Grid is a Process sharing framework on Peer to Peer overlay network. To demonstrate the application we have used the brute force attack to the hashes by hashing algorithms. License : GNU General Public License version 3 (GPLv3)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    SerMon is an Open Source Server-Side (PHP) Server Monitor. SerMon uses plugins to check your server and to send notifications. Easy to develop plugin.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 10
    The purpose of eAudit is to provide a comprehensive reporting capability relating to Electronic Auditing for various industries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    The aim of this small program is to parse your address book (Evolution address book or VCard file for the moment) and check if some of your contacts have uploaded a PGP public key on a key server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Hoppy the {H}ttp {O}tions {P}rober in {PY}thon checks the availability of http methods on a specified server. It will probe these methods to see if they are active and in some cases disclose configuration issues leaking system information
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A smart card-based public key cryptography system based on elliptic curves, using AES for session key generation and SHA for hashing. This project will include the smart card software, terminal software, and a public key server.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14
    scratchpad promject
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Power Hasher is a program that allow you to get the hash code of multiple files at once, and export the results to a file, making easy for this file to be imported and the files checked. Currently it supports MD5, SHA1, SHA256, SHA384 and SHA512.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A reverse HTTP shell to execute commands on remote machines behind firewalls. Once you run the script on the target machine, it periodically polls its designated server for commands to execute. Traffic traverses firewall as outgoing GET/POST requests.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    It provides fast connections to Linux/Unix hosts over SSH protocol. You don't need to remember the IP address, hostname, login, or password. Just select server from the list and press "Connect".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A PHP based auto Local Exploit trigger. It detects kernel version ,gcc and auto pwn it for specific vulnerabilities. A standard proof of concept.This PHP based script, when allows to upload on vulnerable server .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Velo is an open Identity and Access Management platform, with many IDM services such as provisioning, access control, password synchronization, audit & compliance, self service interfaces and much more, For more details visit: http://velo.safehaus.org
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    The purpose of this project is to demonstrate Information Card interoperability on heterogeneous platforms written using Java language to support Apache Tomcat, JBoss & SUN Application Server platforms running on Linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    mailrelaytester is used to check a smtp server if it accepts relays. It checks the same tests as http://www.abuse.net/relay.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Whenver the script detects a phpinfo() page, it fingerprints it for how much secure that phpinfo page. Ideal for web masters and web server admins who are a bit confused with phpinfo() page's numberous configuration items.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    This tool will allow obfuscation of UNIX scripts listing an interpreter as the first line. It is most useful for distributing functionality in a commercial product or a high user volume environment where you wish to hide proprietary information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Cheescloth is a security script that is used to monitor and block email being brute force sent to your mail server by zombie machines in control by spammers and hackers. It also will catch and block hackers trying to hack your server via SSH connection
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The project consist in an open source implementation of the W3C Recommendation of the XML Key Management Specification 2.0 XKMS 2.0. It is compound of a XKMS Server and a Client API to access to the Server via Web Service.
    Downloads: 0 This Week
    Last Update:
    See Project