Showing 3726 open source projects for "linux windows like"

View related business solutions
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 1
    Simple Event Correlator (SEC) is a lightweight event correlator for network management, log file monitoring, security management, fraud detection, and other tasks which involve event correlation.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    HashSum is a .NET port from GNU's md5sum and sha1sum. It supports: hash algorithm selection between MD5 and SHA1 (more could be added later) and compatibility between HashSum and GNU's checksum file format
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3

    ProxyCryptGUI

    An easy to use 'front-end' to ProxyCrypt 3.X encryption application

    ProxyCryptGUI2025 • ProxyCryptGUI2025 is a free application that provides a Windows GUI (graphical user interface) for ProxyCrypt to manage encrypted virtual disk drives. • The setup file for ProxyCryptGUI2025 includes the required setup of ProxyCrypt 3.x and required AIM disk driver. • All files stored in an encrypted virtual drive can be accessed just as any files on regular disk drives but only after the drive is mounted/opened with the associated passphrase. • ProxyCryptGUI2025 can...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4

    X-Itools: Email/Web Log Search Engine

    Strong Email & Apache Log Analysis with Active Security Features

    X-Itools: eXtended Internet Tools. Suite of tools composed of several collaboration modules. Old and initial project born in 1999, 1st published in 2001 on Sourceforge. X-Itools E-mail management module (log analysis) initiated in 2004 with Web 1.0 technologies (private SVN server). X-Itools development restarted since 2011, on the basis of a unique module: E-mail management module (log analysis). Now based on web 2.0 technologies (ExtJS 4.1) and devel restarted because of a particular...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 5

    hdom_access

    receive an email when a file is accessed or modified on linux-unix

    receive an email or done a command when a file is accessed or modified or renamed or erased on linux, watch your files access, secure your workstation against viruses and ransomware
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    phantomcollect

    phantomcollect

    Advanced web data collection and device fingerprinting framework

    PhantomCollect is an advanced educational web data collection framework built for ethical cybersecurity research and privacy analysis. It runs a local web server that collects general technical data from visitors — such as IP, geolocation (with consent), device specs, browser info, network status, and battery level — and displays results in real time through the terminal interface. Designed for security researchers and developers, it demonstrates how modern tracking scripts and digital...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    teler

    teler

    Real-time HTTP Intrusion Detection

    teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that we collect and provide by the community. kitabisa/teler-waf: teler-waf is a Go HTTP middleware that provide teler IDS functionality to protect against web-based attacks and improve the security of Go-based web applications. It is highly configurable and easy to integrate into existing Go applications. teler provides alerting when a threat is detected, push notifications...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 8
    PCA

    PCA

    binary encryption archiver

    Petoron Crypto Archiver (PCA) Key features: AES-256-CFB encryption with unique IV per archive Argon2id key derivation (256MB RAM / time_cost=3 / parallelism=4) HMAC-SHA512 integrity and anti-tampering check No compression, no fingerprinting, no trace of original data Works with both single files and entire directories Fully CLI-based, portable, and open format (.pca) https://github.com/01alekseev/PCA
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    PyKCS11: a complete PKCS#11 wrapper for Python, created using the SWIG compiler. API documentation: http://pkcs11wrap.sourceforge.net/api/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • 10
     In-Browser-File-Encrypter

    In-Browser-File-Encrypter

    The source code of the In-Browser-File-Encrypter web app

    The In-Browser File Encrypter is a simple web application that enables you to securely encrypt your files directly in your browser using the AES-256 encryption algorithm in CBC mode. Check it out at: https://codepen.io/Northstrix/pen/xxvXvJL and https://northstrix.github.io/In-Browser-File-Encrypter/V1.0/web-app.html GitHub page: https://github.com/Northstrix/In-Browser-File-Encrypter The download shortcut:...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    PWSLIB3

    PWSLIB3

    Password Safe encrypted databases, Java library

    Java module to create, read and write Password Safe V3 encrypted databases. The package is a mature offspring from project JPasswords and can be used with Java 1.8. There is an API document available.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Vigen

    Vigen

    UTF-8 Multi-pass Tableau de Vigenère Encryption Rotation Engine

    Vigen is a Unicode UTF-8 multi-pass rotation encryption system based on the classic Tableau de Vigenère. Vigen is an experiment using this particular cypher, intended for those who are interesting in building their own encryption tables. Vigen can generate exceedingly strong rotation cyphers that are probably unbreakable without the given keys and tables. Vigen might even generate military grade cyphers, although I make no claim as to the security of the cypher. Vigen is for encrypting UTF-8...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    cracking-actions

    cracking-actions

    a bruteforcer that can crack variety of files such as zip,rar & more

    cracking-actions is an open source software that allows you to crack passwords, files, etc... ,it targets windows and linux
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Mnemonic-Recovery-CUDA

    Mnemonic-Recovery-CUDA

    Written in C/CUDA, this tool recovers lost mnemonics and passphrases f

    Written in C/CUDA, this tool recovers lost mnemonics and passphrases for BTC, ETH, TRX, DOGE, LTC, DASH, ZEC, BCH, and BTG. Supports BIP32/44/49/84 derivation paths. Features partial phrase recovery and a built-in dictionary for fast, efficient results. Compliant with wallet standards.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    SecurityHeaderAudit

    SecurityHeaderAudit

    Simple Python tool for checking website HTTP security headers

    SecurityHeaderAudit is a beginner-friendly defensive security tool that checks websites for common HTTP security headers and reports missing protections.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    DNISeguro

    Protege tu DNI eliminando datos innecesarios y evita estafas

    DNISeguro es una herramienta para windows que permite ocultar datos sensibles del DNI antes de compartirlo, reduciendo el riesgo de fraudes y falsificaciones. Además, puedes añadir un mensaje personalizado al documento para identificar a quién se comparte. 🔹 Características principales: ✅ Elimina información innecesaria del DNI. ✅ Añade un texto personalizado para mayor seguridad. ✅ Evita falsificaciones y fraudes. ✅ Interfaz fácil de usar y rápida. 📥 ¡Descarga DNISeguro y comparte...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Fiesta

    Fiesta

    Easy Antivirus

    Fast antivirus software
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    OpenPACE

    OpenPACE

    Cryptographic library for EAC version 2

    We moved to https://github.com/frankmorgner/openpace/ see you there!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    JMD5Sum

    JMD5Sum

    Simple utility / application to verify integrity of any file and text.

    With JMD5Sum it is possible to calculate and/or compare two MD5 files and/or texts in just a few clicks. Once you have chosen the file or entered the text, copy the MD5 obtained to the clipboard, choose another file or insert another text, compare the value obtained by pasting the previously copied value from the clipboard (with Ctrl-v) in the appropriate field. JMD5Sum also shows the characters one by one of the MD5 obtained, to facilitate reading. It also verifies the integrity of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    PureBasic Shamir Secret Sharing

    PureBasic Shamir Secret Sharing

    Open-source PureBasic implementation of the Shamir Secret Sharing

    PureBasic Shamir Secret Sharing is an open-source, self-contained and educational implementation of the Shamir Secret Sharing Scheme, written entirely in PureBasic. Shamir Secret Sharing is a cryptographic method that splits a secret into multiple parts (shares), such that any combination of at least T shares can reconstruct the original secret, while any number of shares fewer than T reveals no usable information. This implementation operates over the finite field GF(257), allowing...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21

    AsyncPortScanner

    Cross-platform asynchronous port scanner written in Nim.

    Fast cross-platform asynchronous port scanner written in Nim.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Ciphero

    Secure communication software

    Securely cipher your message or file, share it, safely de-cipher it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Ultramarker

    Ultramarker

    Ultramarker assessment criteria, marking and report generation system

    Is a Windows (and Linux) based application that allows educators and assessors to design criteria based assessment rubrics. It specifically allows generic feedback to be defined based upon common errors and individualised feedback. Grading schema can be easily designed to define levels of achievment or compliance to standards . Multiple weighted criteria can be included in the assessment and the same criteria used for multiple sessions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    PetoronHash-System

    PetoronHash-System

    PHASH | post-quantum XOF hashing algorithm | C++20

    PHASH is a self-contained, dependency-free, post-quantum XOF hashing algorithm implemented in modern C++20. This release delivers the first fully stable production implementation of the PetoronHash-System — a 1600-bit sponge-based hash function with domain separation, extendable output, and deterministic behavior. Key Features No external dependencies — pure C++20 implementation. Extendable Output (XOF) — supports arbitrary output length (256–8192+ bits). Post-quantum oriented design...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    Plum Harbor

    Plum Harbor

    An open-source file sharing app built using Next.js and Perplexity.

    An open-source file sharing app built using Next.js and Perplexity. The app employs ML-KEM-1024, ChaCha20, Serpent-256, and HMAC-SHA512 to ensure data confidentiality and integrity. The app is also equipped with a dedicated password vault. Check it out at https://plum-harbor.netlify.app/ GitHub page: https://github.com/Northstrix/plum-harbor Codeberg page: https://codeberg.org/Northstrix/plum-harbor The app is available in English and Hebrew. German version is available...
    Downloads: 1 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB