Open Source Linux Security Software - Page 2

  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1

    Primes

    Calculate primes by using extremely fast sorting

    This project considers the problem of calculating primes as a sorting problem. It includes the most efficient tree-based sorting algorithm that is possible and shows that finding a new prime can be done by sorting the differences between the previous primes in the right way. Unfortunately it has turned out that going this way is even more slowly than trying to find primes by brute force. So it can only be used as a test with heavy load for the sorting algorithm, which can be used for sorting any kind of data. And as already mentioned, it's just the most efficient tree-based sorting algorithm that you can get. But furthermore this way of finding primes interestingly leaves a hard nut to crack for mathematicians: In very rare cases it finds numbers that are not primes. For all primes below one million this phenomenon arises in exactly two cases: 31213 which is 7 * 7 * 7 * 7 * 13 336141 which is 3 * 3 * 13 * 13 * 13 * 17 Who can explain, why?
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Role Manager is a security management framework based on the NIST model for Role Based Access Control (RBAC) and the Java[TM] 2 Platform security standards. The access control policies and the RBAC Model are implemented using the RBAC profile of XACML.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Scalytics Open Intelligence - OSINT

    Scalytics Open Intelligence - OSINT

    Open OSINT stack for monitoring, analysis, and risk detection

    EUOSINT is the open-source edition of the OSINT pipeline built by Scalytics for real-world intelligence monitoring, situation analysis, and risk detection. It is not a toy dashboard or a loose script bundle. It is a packaged operational stack with a web interface, a Go-based collector runtime, configurable ingestion and refresh cadence, Docker-first deployment, and local or server installation options. The public release removes non-public and protected integrations while preserving the pipeline structure and deployment model that make the system usable in practice. EUOSINT is built for teams that need continuous monitoring, reproducible installs, and a base they can extend for their own intelligence and security workflows.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    The aim of the UndertheCarpet project is to develop a general steganalytic tool that is able to proccess different stego mediums (multiple image formats such as gif, bmp, jpg, etc. but also sound and text files), incluiding many of the state-of-the-art te
    Downloads: 1 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 5
    An extremely versatile neural net. Hopefully.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6

    Virtual Botmaster

    Simulate Botnet NetFlow traffic for research analysis

    Simulate Botnet NetFlow traffic for research analysis
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Alkindus is an automated solver for short monoalphabetic substitution ciphers without word divisions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Matlab, Maple and C/C++ applications of Linear Algebra in many domains, including curves in many dimensions, Cryptography and Chaos etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Monitor and log all ARP traffic on a switched network, organized into html output with ARP spoof detection, network scan detection and misconfigured network device detection. NOTE: this project is currently not usable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    This is a non-causal non-linear encryption system that cannot be cracked by the von-neuman architectures available today
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Bio-SPHERE aims to create a flexible, secure and multimodal biometric platform for applications that require biometrics. Bio-SPHERE is formed by a network of interacting nodes that interface with biometric hardware and offer biometric functions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    It moves by itself inside networks like virus infection & plagues, it is being written to solve computer virus problem drastically and responsibly. It is legal, free and open for public domain to improve W3 ICT Security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    BlowfishVHDL - free fully synthesizable Blowfish encryption algorithm hardware implementation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Botnet Detectors Comparer

    Compares botnet detection methods

    Compares botnet detection methods by computing the error metrics by reading the labels on a NetFlow file. The original NetFlow should have a new column for the ground-truth label, and a new column with the prediction label for each botnet detection method. This program computes all the error metrics (TPR, TNR, FPR, FNR, Precision, Accuracy, ErrorRate, FMeasure1, FMeasure2, FMeasure0.5) and output the comparison results. It also ouputs a png plot. The program can compare in a flow-by-flow basis, or it can apply our new botnet detection error metrics, that is time-based, detects IP addresses instead of flows and it is weighted to favor sooner detections. See the paper for more details.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    BruteNet is a system of the distributed brute force and distributed calculations built on user extensions capable to solve a great number of problems related to the partition on a lot of machines.With sample extention you can distribute brute md5-hash
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    C++ template classes for Multi-Value Logic support arbitrary precision and user defined Multi-Value Logic types. This library comes with pre-defined data types: integer, boolean, bit, logic, std_logic, bit_vector, logic_vector and std_logic_vector.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    CloudMapper

    CloudMapper

    CloudMapper analyzes your Amazon Web Services (AWS) environments

    CloudMapper helps you analyze your Amazon Web Services (AWS) environments. The original purpose was to generate network diagrams and display them in your browser (functionality no longer maintained). It now contains much more functionality, including auditing for security issues. If you want to add your own private commands, you can create a private_commands directory and add them there. You must have AWS credentials configured that can be used by the CLI with reading permissions for the different metadata to collect. Cloudmapper needs to make IAM calls and cannot use session credentials for collection, so you cannot use the AWS-vault server if you want to collect data, and must pass role credentials indirectly or configure AWS credentials manually inside the container. Generate HTML report. Includes a summary of the accounts and audit findings. Generate an HTML report for the IAM information of an account.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    ConDEnSE (Confidential Data Enabled Statistical Exploration) will be a web-based environment for statistical analysis of confidential data from various database sources, based on Plone and R, and using the Jackknife method of confidentiality protection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Crypt-EG is an easy visual cryptosystem program that implements ElGamal method using elliptic curves.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The Cryptix ASN.1 Kit aims at facilitating the task programmers face in coding, accessing and generating java-bound, both types and values, defined as ASN.1 constructs, or encoded as such.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    CryptoHelper is a Java program designed to aid in the decryption of classical ciphers, ie pre WWII ciphers. It brings together tools like frequency analysis, friedman tests, enciphering/deciphering for several clasical ciphers, and brute force algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A collection of small utilities with a connection to cryptography and cryptanalysis. Written for efficiency and a small memory footprint.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A one key 64-bit encryption program designed for Linux and Windows. There is a console version, and also a GUI version provided by wxWindows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Software for a van eck phreaking device. Please use to test security only. <a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550525,00.html">Here</a>'s an explanation if you don't know what van eck phreaking is.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    This is a project that simulates the German Military Enigma machine during WWII.. It is a project for beginers to learn to program and to meet people. If anyone is interested in helping, please email me @ dustin@rockhill.org
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB