Showing 95 open source projects for "access database"

View related business solutions
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 1
    Access Road

    Access Road

    Simulator of access controls

    ...It is designed for database, system, and application administrators, IT architects and developers, auditors. Access Road provides a full simulation of MySQL Server. This includes the components, the users, the hosts and the privileges at any level. The focus is on IT weak configurations, executing environments (malware analysis) and people authorizations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    J! Secure Password Hashes
    J! Secure Password Hashes provided an easy access to all Joomla! password hash algorithms and the Drupal 7 SHA-512 hashing algorithm. Compatible: Joomla! 2.5.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    DENRIT

    DENRIT

    Perform anonymous and non-anonymous pentesting.

    DENRIT allows remote administration of anonymous networks (TOR, I2P and FreeNet). Also, contains a pentesting module to execute commands using a selected anonymous network, pentesting with TOR or TCP Follows a client/server model with well-defined communication interfaces. SSH is used to allow remote clients to access the machine and manage any anonymous network that is installed there, plus allows penetration testing anonymously (or non-anonymously) using tools such as Metasploit...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Ralasafe Access Control Middleware focus on data-level privilege management, including database row/column and content privilege management. It also manages 2) login control; 3) function-level privilege management; and 4) URL privilege authentication
    Downloads: 0 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5
    The i-Code Console is a web based application purposely created to access the existing database of a Prelude installation and provide a single access point to the stored events. This project includes the web app, the web server and all the utilities and 3 example rules for the Prelude Correlator module. This console was created within the i-Code Project (http://www.icode-project.eu).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    IdMUnit is an xUnit automated testing framework for Identity Management solutions.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    Itilect FTP Proxy

    Itilect FTP Proxy

    Provide users with a managed temporary access to arbitary FTP

    This tool allows you to set proxied access for your users, using predefined FTP accounts. System works like this: Users connects to FTP proxy just like they do with a regular FTP, but using specially formed string as a username (string, that includes their internal profile name and desired target FTP) and their internal password. If they are allowed to access this host, proxy will establish connection with a target FTP and authenticate using real credentials. After that, server will act...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    HTTP Anti Flood/DoS Security Module

    HTTP Anti Flood/DoS Security Module

    Detect Flooder IPs, Reduce Attack Surface against HTTP Flood Attacks

    This module provides attack surface reduction enhancements against the HTTP Flood Attacks at the web application level. Massive crawling/scanning tools, HTTP Flood tools can be detected and blocked by this module via htaccess, firewall or iptables, etc. (like mod_evasive) You can use this module by including "iosec.php" to any PHP file which wants to be protected. You can test module here: http://www.iosec.org/test.php (demo) Watch the Proof of Concept video:...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9

    DAL4j

    Data Access Layer 4 Java

    Welcome to Data Access Layer for Java (DAL4j) a set of command line tools and framework used to reverse engineer a MySQL or SQLServer database schema into a set of JPA Entity Beans. DAL4j can be useful for scenarios where there is an existing database schema but a technology other that JPA is used to interact with the database. DAL4j can provide an easy way to migrate your code base from other technologies such as JDBC or Hibernate to JPA.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Add Two Lines of Code. Get Full APM. Icon
    Add Two Lines of Code. Get Full APM.

    AppSignal installs in minutes and auto-configures dashboards, alerts, and error tracking.

    Works out of the box for Rails, Django, Express, Phoenix, and more. Monitoring exceptions and performance in no time.
    Start Free
  • 10

    Xenophobe

    Block countries via iptables and gui menu with country flags.

    The purpose of this project is to geographically restrict access from countries to your server and simply iptables restrictions via a country code and not a large ip list. It is intended as a means of reducing unwanted attacks, brute force, spam, etc. not as a means to segregate access worldwide nor discriminate against any country. I have waned to package an rpm, and deb file that quickly allows most users to block ip addresses from ip blocks that have been geographically assigned. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    LUARM

    LUARM

    A detailed user action logging engine

    The Logging of User Actions in Relational Mode (LUARM) is a logging/audit engine designed to record in detail user actions in a Relational Database Management System (RDBMS). You can then have an organized 'who is doing what' view in your system, being able to easily correlate program execution, file access and network endpoint activity to user entities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    RIDSystem

    capturing packet and detecting intruders with their signature

    Introduction: This project has been developed to detecting intruder activity in your network according to the existing signature of intrusion attacks,Anomalous behaviour etc... Scope: Government authorities has lot of information about defence,revenue,income tax and many informations. Intrusion Detection System will certainly minimize the unauthorized access and take immediate response to stop such illegal works. MNCs manages their whole information system using application...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ...It runs in a Java servlet container such as Tomcat,In addition, RivuES provide a visual management and control web UI, most of the functions of Solr can be managed through WEB UI, Data source supported including MS office,XML,TXT,Html, database of Mysql and Access.(In our comercial version,40+ file types, 20+ database are native supported, network File System, CMS, ECM, Domino, Sharepoint are native supported, IBM's content management system, EMC documentum is also native supported, RBAC support on LDAP, AD, DB base RBAC, Domino Authentication)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    jGuard is written in java. his goal is to provide a security framework based on jaas (java authentication and authorization security) . this framework is written for web and standalone applications, to resolve simply, access control problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Rasea
    An acronym for cRoss-plAtform accesS control for Enterprise Applications. Rasea aims to become a reference in access control as a service based on the RBAC model.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    InfoShare
    InfoShare allows information owners to share information with collaborators while maintaining control of its access control policy centrally. Any changes to the policy will remove access from the collaborator next time they try to open the file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Project Aristotle
    Project Aristotle (formerly the Identity Governance Framework (idgov) project) is an openLiberty.org project that enables developers writing applications using identity-related information to access information in a multi-protocol environment supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Software to retrieve password of administrative system users stored in a MySQL database, designed for Nagios to access servers via expect or via SSH when you have not the Public key. Not exclusive to Nagios, but very desirable to sysadmins.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    PasSafe
    PasSafe is a free & open source password manager for all Operating Systems. Store your passwords in a highly-encrypted database locked with one master password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    A simple access control app that intends to replace declarative jaas security in web.xml for web applications deployed on Jboss app server and TOMCAT container. Also include an extension for PHP applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Mistral-IdM is a project whose aim is to provide an identity management system, with advanced authentication and authorization abilities, based on standards (SAML, XACML, XKMS), providing a user-friendly administration console.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Server/client suite which provides per-user access control/firewall/QOS. Robust and high speed implementation is secure against MAC/IP spoofing, and can scale to large networks with many clients. Options for additional monitoring and captive portal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    AccesStream is a Java-based, embeddable identity and access management (IAM), security and access reporting platform. AccesStream includes Single Sign-On using SAML 2.0 and provides profile storage with LDAP v3 access for integration with Linux PAM
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    secureStore
    Designed for data centre management, secureStore uses end to end encryption, granular user access control, comprehensive login, and open source technology to create a secure way to manage sensitive information such as private keys, certificates, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    ConDEnSE (Confidential Data Enabled Statistical Exploration) will be a web-based environment for statistical analysis of confidential data from various database sources, based on Plone and R, and using the Jackknife method of confidentiality protection.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB