Showing 822 open source projects for "using"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • 1
    Esgix

    Esgix

    Pentest virtual machine

    ...From a last year project of Network System and Security Master's degree at the ESGI, ESGIX virtual machine has been created to provide a test environement to people who want to learn penetration testing. The main objective is to obtain root access on the virtual machine, using However you could have fun by finding security holes and intrusions techniques, and exploit them as you think best. The machine is freely available in the Download section. You can find a complete installation Wiki in the Documentation section. Enjoy White Hacking
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Mole

    Mole

    Automatic SQL Injection Exploitation Tool

    Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a boolean query based technique. The Mole uses a command based interface, allowing the user to indicate the action he wants to perform easily. The CLI also provides auto-completion on both commands and command arguments, making the user type as less as possible.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    DogoIDS

    DogoIDS

    Active-probing-based network IDS for wireless networks

    .... *** IMPORTANT *** We uploaded the very first experimental implementation of DogoIDS (still alpha), so expect to find bugs. The Documentation is sadly not yet fully done. So far, we did experiments using a IEEE 802.11s network (open80211s kernel 3.10.0-rc4-wl). We are happy to receive comments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    File system/directory monitoring utilities with loggin and task processing support (can execute files or make a WCF service call). Multiple configuration options. Source code libraries can be used to create a custom file system monitor.
    Leader badge
    Downloads: 32 This Week
    Last Update:
    See Project
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 5

    RDonasco Security

    A security application that can be used as a shared service

    For full details of this application, please visit https://bitbucket.org/rdonasco/rdonasco-lib/wiki/Home The source codes for this project can be downloaded by cloning its repository which uses mercurial. ** Use the following clone command: ** hg clone https://bitbucket.org/rdonasco/rdonasco-lib
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    dCrypt - Android Encryption Decryption

    dCrypt - Android Encryption Decryption

    An Android application for encryption and decryption

    It is a simple android application for encryption and decryption of files using passphrase. Supported API levels are in the range 10 (min) and 17 (max). To encrypt a file, what you need is to share the file to "DCrypt" and enter a passphrase. To decrypt the file, you have to share the encrypted file to the application and enter the passphrase. Obviously the passphrase for encryption and decryption should be the same.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    PBM stealth

    Data hiding in bi-level pbm images

    Implementation of block parity for hiding data in bi-level pbm images in java. Increasing the security of stenography by using a random symmetric key for embedding and extraction of data from image. The project also has a PBM viewer in java and ascii viewer which shows the pbm images in ascii format.This project uses binary coded pbm images. Research paper : http://arxiv.org/abs/1304.1683 Key mechanism is not functional and program have bugs which are to be fixed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Wave Framework

    Wave Framework

    Open Source API-centric PHP Micro-framework

    ...Wave is a compact framework that does not include bloated libraries and features and is developed keeping lightweight speed and optimizations in mind. While not necessary for using Wave Framework, it comes by default with a URL and View controllers intended for building websites by solving URL requests and loading views. Mercurial and Git repositories is available for developers who are interested in following the development. Official website and documentation: http://www.waveframework.com Social networks for latest news: Google+ - http://plus.google.com/106969835456865671988 Facebook - http://www.facebook.com/waveframework Twitter - http://www.twitter.com/WWWFramework
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    F-Talk P2P Encrypted Secure Voip

    F-Talk P2P Encrypted Secure Voip

    F-Talk cross-platform p2p encrypted secure voip software

    This project connect to two peers directly ( using without any central server, stun server ) together with 128bit encrypted secure voip communication. http://ftalk.armanasci.com/guide Spefications * Peer to peer direct connection without using any central dedicated server. ( First basic part of the security ) * 128bit AES Symmetric end-to-end encryption PCM datas. ( Second basic part of the security ) * 64bit Base64 Encoding transferred server side info
    Downloads: 1 This Week
    Last Update:
    See Project
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 10

    MyZone Social Network

    peer to peer social network

    ...In addition you can share unlimited mp3s and mp4s with your friends. MyZone does not downgrade the resolution of your photos and all established connections are encrypted using state of the art encryption techniques. MyZone is designed to be resilient towards cyber attacks especially DDoS attacks and government imposed censorships. MyZone should be an interesting social networking platform for users who are more concerned with the privacy of their profile information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Reactor Breeder

    A Genetic Algorithm for Reactors in StarMade

    ...One of the more unique aspects of the game is that ship power management is not as simple as filling a cube with power generation blocks. This mechanism leads to difficulties in getting maximal power generation out of such reactors. This program rectifies this issue by using a self-organizing variant of brute force search. Much of the search space is pruned early on by a user-selectable fitness function. Within a few epochs, reactor output quickly converges to several sub-optimal, yet high-output reactors. Given enough time, the idea is that the optimal reactor configuration will be yielded.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Intrusion Block (IBlock) is a small Linux daemon which greps the alertfile of an IDS such as Snort or Suricata and blocks the offender hosts for a given amount of time using iptables.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    SecurePassG

    Creates Secure Passwords

    ...It is based on what I understand about password criteria needed to thwart most password guessing software. When saving or writing down a password, you may want to encrypt it using an encryption software like Encrypto available under my profile. When saving your password, you choose the extension you want to use, .txt should be fine. In addition to the original Java version, there is also a Windows .exe version written in C# that currently doesn't have the ability to save the password, just copy and paste it anywhere. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    ShieldWan

    Secure public portal

    ...Once authenticated, project users may access to applications available to them without having to re-authenticate. It allows to have secure accesses and a single users management for all applications through LDAP API. Users access the project using a public Web portal protecting existing private made applications. To allow users to connect to infrastructure through external method, the project consists of : - An identification made of a double security with: o an identifier and a unique password per session (One Time Password) o A method for sending "One Time Password" via SMS, Private Mail, Twitter Direct Message...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A pure java library to operate on OpenPGP cards directly using javax.smartcard apis with no need of external dlls/frameworks (such as pkcs11 or opensc-java). Includes sample OpenPGP card edit application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    DENRIT

    DENRIT

    Perform anonymous and non-anonymous pentesting.

    DENRIT allows remote administration of anonymous networks (TOR, I2P and FreeNet). Also, contains a pentesting module to execute commands using a selected anonymous network, pentesting with TOR or TCP Follows a client/server model with well-defined communication interfaces. SSH is used to allow remote clients to access the machine and manage any anonymous network that is installed there, plus allows penetration testing anonymously (or non-anonymously) using tools such as Metasploit Framework, nmap, nikto, among others. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Hide my message

    Hide my message

    Hide your secret message into any type of files

    ...It use a simple Cryptography algorithm to save the message in an secret way, so it can`t be read by any HexaReader. You can retrieve your message also in a very simple way by choosing the original file and click on Decode button. It was built using Java and Swing technology. It was published for educational use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Cyberbit

    Cyberbit

    Visual Cryptography and Bit-Plane Complexity Segmentation in Python

    ...The vessel images can be 8-bit gray-level images or 24-bit deep true-color images. Anyone who can correctly spot the two vessels and knows the dimensions of the image containing the secret message will be able to decrypt the secret message using the Cyberbit application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    steganoroute

    steganoroute

    Send steganographed text messages to mtr with fake hops in the network

    Steganoroute is a tool to send steganographed text messages to another computer over the network. The receiver must make a traceroute to the sender using the mtr program (and pressing 'd' once to switch the display mode to the continuous graph). This tool, the sender, creates several fake hops and makes them answer the ICMP packets (or not) to write the letters one by one on the mtr client screen.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20

    EasyWall

    Easy to use firewall for linux beginners.

    New improved iptables tool, based on my earlier project Easy Linux Firewall, but rewritten from scratch using Perl. It's a simple rewrite for now, but i am working on adding some new features like. Some of the improvements will be web administration panel, automatic filtering daemon, TCP listener providing easy to use API so you can integrate it on many servers and centralize them in to one Web interface to control all of them. I am open to new ideas and also any kind of contributors, because I'm working on this alone and it isn't easy, so you are welcome to help.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    husk
    An iptables front-end to allow rules to be expressed in a more flexible, free-form style using language closer to plain-English than iptables commands. Rules are then compiled to normal iptables commands.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    RŌNIN-LINUX

    RŌNIN-LINUX

    Linux Security Distro for Data Forensics, Pen. Testing, and IR.

    ...In support of this objective, the RŌNIN project is guided by two main goals: * Focus on Continual Learning - The project provides a platform for continual learning by providing not only a professional tool-set but also easy access to relevant documentation, resources, and training. * Process Driven Approach- The project's tool layout integrates a process driven approach to reflect structured engagements using such standards as PTES. *Work Platform - While RŌNIN, can be run as VM, it is pre-loaded with popular desktop applications to provide a viable professional work platform.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 23
    Lockscreen Pro

    Lockscreen Pro

    Beautiful screen locking software with advanced functions

    Lockscreen Pro's main feature is to lock your computer screen to not give other people access to it. You can simply unlock your computer with a password or an USB flash-drive. Every time someone enter a wrong password, Lockscreen will take a snapshot using your computers webcam. This will give you information about who tried to get into your computer.
    Leader badge
    Downloads: 71 This Week
    Last Update:
    See Project
  • 24
    Honeyd-Viz

    Honeyd-Viz

    Full featured script to visualize statistics from a honeyd honeypot.

    ...It uses “Libchart” PHP chart drawing library by Jean-Marc Trémeaux, “QGoogleVisualizationAPI” PHP Wrapper for Google’s Visualization API by Thomas Schäfer and geoPlugin geolocation technology (geoplugin.com). Honeyd-Viz currently shows 20 charts. There are also geolocation data extracted and displayed with Google visualization technology using a Google Map, a Intensity Map, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    dnmap

    dnmap

    distributed nmap framwork

    dnmap is a distributed nmap framwork using a client/server architecture. The server reads the commands from a file and send them to each client. The client execute the nmap command and send the results back. Also see: www.mateslab.com.ar
    Downloads: 0 This Week
    Last Update:
    See Project