Showing 70 open source projects for "issues"

View related business solutions
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 1
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    WiKID Two-Factor Authentication System

    WiKID Two-Factor Authentication System

    Two-factor authentication system

    The WiKID Strong Authentication System is a public-key based two-factor authentication system. It is a flexible, extensible, and secure alternative to tokens, certs and passwords. Application & API support exists for Java, ASP, PHP, Ruby, OpenVPN, TACACS+, etc. Read our eGuide on how to setup your network with two-factor authentication: http://www.wikidsystems.com/learn-more/two-factor-authentication-white-papers
    Downloads: 10 This Week
    Last Update:
    See Project
  • 3
    Fileprivacy

    Fileprivacy

    Fileprivacy easily encrypts your files

    ...#######BETA 2####### Bugfix - Beta 1 stopped working if filename was too short or long - added .exe file ####### NOTE ####### This is an early beta implying there are some issues left. The Keygenerator stops working if you change the algorithm after setting the keylength. It has to be restarted for further use. Because there are no start scripts, yet, you have to start Fileprivacy from console by typing: java -jar Fileprivacy-1.0_<version>.jar ####### ALSO NOTE ####### The author of this software is not responsible for the safety of your data. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    We! Analyze By Or Cohen

    We! Analyze By Or Cohen

    We! Analyze - designed to analyze ArcSight SmartConnectors logs.

    One of the biggest issues we have as ArcSight administrators is knowing what's going on with our connectors. A connector may be "up and running" but actually it has not sent a single event in weeks. Also, many single connectors collect events from multiple locations (multi database, multi file, WUC) and we might never know one of these locations is unavailable as events from the other locations are arriving so the connector seems to be working fine.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 5
    Eolos VoipAudit

    Eolos VoipAudit

    Universal Framework to audit Voip protocols's security

    Visual Framework Tool to scan/sniff address space, enumerate users, crack credentials, pattern based dial spoofing and security reporting for Voip protocols. This software is intended to give a general framework to build and plug Voip protocol analizers in order to fix security issues and enhance VoiP platforms confidence. It IS NOT intended to be a cracking tool for malicious system breakers, but a really software MUST for security people to assure Voip platform security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    catcher(keylogger)

    catcher(keylogger)

    Catcher is a keylogger tool

    Catcher is free tool for everyone that needs a keylogger to their project. * A new catcher will not be released this year(2013). But scheduled early next year. *manny016 is busy at the moment. *Some issues are being fixed and testing for issues. *The new software's finished last march 2013 but it's being hold because of some personal issues. Thank You For Your Support Please Never Stop Waiting!!! So what's to wait in the new catcher? Data storage is in xml. VB language. Data is fixed for data analysis. Not detected as a maleware any more. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Privacy Policy Merger

    XML Privacy Policy (P3P) language merger

    ...In cloud computing paradigm, the ability to aggregate policies as well as services will be useful and more effective for users that are privacy conscious regarding their sensitive or personal information. This project studies the problems associated with the Platform for Privacy Preference (P3P) language, and the present issues with communicating and understanding the P3P language. Furthermore, it discusses some efficient strategies and algorithms for the matching and the merging processes, and then elaborates on some privacy policy conflicts that may occur after merging policies. Lastly, the project presents a tool for matching and merging P3P policies. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    renamed to Whonix

    renamed to Whonix

    Due to trademark issues, TorBOX had to be renamed. Whonix is the new project name. Please go to https://www.whonix.org/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    thad0ctor's Backtrack 5 toolkit

    thad0ctor's Backtrack 5 toolkit

    thad0ctor's BT5 toolkit streamlines word list creation and other tasks

    Originally designed as a word list creation tool, thad0ctor's BT5 Toolkit has become an all purpose security script to help simplify many Backtrack 5 functions to help Pentesters strengthen their systems. The backbone of thad0ctor's Backtrack 5 Toolkit is the Wordlist Toolkit that contains a plethora of tools to create, modify, and manipulate word lists in order for end users to strengthen their systems by testing their passwords against a variety of tools designed to expose their pass...
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 10

    WhitewallManager

    Whitelist manager

    WhitewallManager is a whitelist manager. It aims to be a web based administration tool for administrators using a default-deny approach to the security of the network they are responsible for. Default-deny is a superior model for network security as compared to default-allow, which is how the security model of most local area networks is modeled. Default-deny disallows all but access granted to resources which you specifically allow. The advantage to this is that any new resources which...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    NSIA
    NSIA (Network System Integrity Analysis) is a web application monitoring system that scans web applications for potentially unwanted context such as defacements, unauthorized changes, errors, information leaks, profanity, compliance issues, etc
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    WATER (Wanted ACID/BASE To Emit Results) is a project to address some of the latency issues observed with BASE. Overall goal is to provide BASE like data with sub-second or near sub-second results for most basic queries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    This project automates the reporting of improper Internet use by the X-ARF format. The two schemas specified abuse_login-attack and abuse_malware are currently implemented. Fixing a Bug and the Date / Timestamp issues. Now it should work fine :)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a set of [relatively] short python scripts that you can easily examine.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 15
    Hoppy the {H}ttp {O}tions {P}rober in {PY}thon checks the availability of http methods on a specified server. It will probe these methods to see if they are active and in some cases disclose configuration issues leaking system information
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ** PRIMARY SITE NOW AT MAMBO-CODE.ORG ** Mambo Configuration Assistant (mamboCA) is designed to assist end-users to diagnose configuration issues with their Mambo CMS Sites.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Sussen is a tool that checks for vulnerabilities and configuration issues on computer systems. It is based on the Open Vulnerability and Assessment Language.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 18
    The Hacktivismo Project is a platform for development and planning issues between members, developers, contributors, and infrastructure providers of the Hacktivismo group (www.hacktivismo.com).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Security Advisor is a program designed to analyze and report security issues beyond application vulnerabilities. The program will analyze system and network configurations to recommend ways for improving security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    SyncShare Server is a secure messaging and real-time collaboration platform. Build solutions to connect people, data, and applications through firewalls and mobile devices. It handles all networking, security issues and lets one focus on the business
    Downloads: 1 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB