Showing 40 open source projects for "boot"

View related business solutions
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 1
    SXMD

    SXMD

    MultiDistribution with Diagnostics, Recovery, Backup, Cleaning.. tools

    ...SXMD also gathering a XP PE : Hiren'sBoot with DOS tools ("ubcd"), a Portable Suite and many boot priorities or possibilities. Size : +/- 3Gb Available : USB / DVD version ("coming soon") WebSite : http://www.security-x.fr/tools/SXMD ("under construct")
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Data exchange is a core part of all cloud systems so it becomes necessarily important to control access to data that are confidential and whose integrity influences the state of the system at any time.It can be proven that the administrator in a IaaS can easily perform some hidden and malicious task on unsuspecting customer machine. This is attributed to the fact that he/she possesses the root privilege to do so and forms an attack. A cold boot attack can easily be lauched amongst other attacks by the privilege user or system administrator.A simple attack scenario could be that a customer pays a virtual machine at Amazon EC2 (Provider) and the systemadmin (Privilidged User) who is, for instance, threatened to be fired, has access to the same virtual machine state, this priviledged user can easily leak customer’s data. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    SBCD

    partitioning backup recovery and all kind of boot loaders

    partitioning backup recovery and all kind of boot loaders
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    This project provides a modification of the Linux boot sequence that allows a continuation of the boot process only if an encrypted filesystem can be used after entering a password. Without a successfully mounted filesystem the boot process will stop
    Downloads: 0 This Week
    Last Update:
    See Project
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 5
    qingy is a replacement of getty. Written in C, it uses DirectFB to provide a fast, nice GUI without the overhead of the X Window System. It allows the user to log in and start the session of his choice (text console, gnome, kde, wmaker, ...).
    Downloads: 21 This Week
    Last Update:
    See Project
  • 6
    watches for Regristry-changes of keys like HKLMSoftwareMicrosoftWindowsCurrentVersionRun etc. and pops up if something has changed, logs it, can ask google for the key found. Protects against Trojans and Viruses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    USB based memory acquisition tool targeting "warm boot" machines with 4GB of RAM or less. The software requires the use of USB portable media and is built on top of the syslinux platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    0 byte, is a SLAX modification to security. Download order: Boot directory: -slax.cfg -vmlinuz -initrd.gz -dban.bzi Slax directory: +base directory: -001-core -002-xorg -003-desktop -004-kdeapps -005-devel -008-0byte +modules directory -driverrak -segurt
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Getwifi allows Linux users to join wireless networks easily by joining available networks in an order specified by the user. Getwifi is configured using a single file which specifies networks, optional WEP keys, and the order in which to join networks.
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 10
    Set of tools needed to setup and maintain encrypted partitions under unix systems (initially linux). Especially helpfull when doing root device encryption. Features xml configuration, multiple users, usb "tokens" (usb mass storage) and key hierarchy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Using the Linux partition of a dual boot system, this software will provide the capability to eliminate spyware, adware, and other malware from the windows partition. Additional capabilities include the ability to tweak and improve windows from linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Eselstall Secure Environment to Launch Software you don't Trust At aLL: Combined chroot/setuid tool to easily launch background processes (servers) in a confined environment. Eliminates the need for su in the changeroot directory.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    RAMdisk-based Operating System for conducting Security Audits. Includes hping2, xprobe, netcat, lsh, wardialer, and more -- all on 1 computer disk. Runs off your RAM, so there is no need to reformat your computer. Great for pen testing!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Boot Integrity Services (BIS) is a CDSA application. BIS adds digital signatures to boot images obtained via PXE and DHCP/BOOTP protocols. BIS includes tools for creating keys, certificates, and digital signatures, and remotely configuring BIS clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    rcstagger

    secure network aware process monitoring system

    rcstagger is a network aware process monitoring system designed to work alongside the init process (Note that it makes no attempt to replace init). It utilizes openssl to maintain PKI authentication to verify the identify of sibling daemons and any control clients.
    Downloads: 0 This Week
    Last Update:
    See Project