Showing 957 open source projects for "command-line"

View related business solutions
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 1
    Stegeek is very simple tool, that takes several files,encrypt, and mix them into one file. Also add some redundancy. The result is, that we have one archive and N keys. It should not be possible to guess N, if you have archive and up to N-1 keys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    alr-encrypt has moved to http://sourceforge.net/projects/encrypt
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Offers a complete structure of security for Spring-based projects. It turns any bean in a protected resource. It uses a non invasive approach, and once you create a security policy it makes the bean a PEP (Policy Enforcement Point).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    HoneyC is a low interaction client honeypot / honeyclient that allows identify rogue servers on the web.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place. Icon
    Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place.

    For healthcare Providers and Facilities

    Incredable streamlines and simplifies the complex process of medical credentialing for hospitals and medical facilities, helping you save valuable time, reduce costs, and minimize risks. With Incredable, you can effortlessly manage all your healthcare providers and their credentials within a single, unified platform. Our state-of-the-art technology ensures top-notch data security, giving you peace of mind.
    Learn More
  • 5
    anti spam tool. uses an active algorithm (not filtering).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    BRUTALIS - BRUTeforce ALternative Is Stupid. Brutalis generate brute force passwords. It can be integrated in any command line for an attack and support resume, character panel, minimum and maximum length, special separating characters and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Capture is a high interaction honeypot client that finds malicious servers on a network. Capture monitors the systems state, and checks for changes which malicious resources may cause. THIS PROJECT HAS MOVE TO HTTP://www.nz-honeynet.org/capture.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    fortune-mod-isec is a compilation of straps/tips from the Information Security World. The straps have been compiled/produced from the Internet, books, norms, standards & collaborators' know-how.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    NBTscan-Ipanto is a command-line tool that scans for NETBIOS devices on a local or remote TCP/IP network. NBTscan-Ipanto is more powerful than others NETBIOS scanners as it is designed not to flood ARP tables and firewalls.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Axe Credit Portal - ACP- is axefinance’s future-proof AI-driven solution to digitalize the loan process from KYC to servicing, available as a locally hosted or cloud-based software. Icon
    Axe Credit Portal - ACP- is axefinance’s future-proof AI-driven solution to digitalize the loan process from KYC to servicing, available as a locally hosted or cloud-based software.

    Banks, lending institutions

    Founded in 2004, axefinance is a global market-leading software provider focused on credit risk automation for lenders looking to provide an efficient, competitive, and seamless omnichannel financing journey for all client segments (FI, Retail, Commercial, and Corporate.)
    Learn More
  • 10
    Package for coding and decoding files with Matheos algorithm from commandline or console in Linux/Unix Environment. Based on Keys stored in files or as hardware locks (on devices). Fast and strong coding. Fast encoding.ONLY BINARY PACKAGES FOR NOW!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    PBNJ - a suite of tools to monitor changes on a network over time.
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    sshvpn is a shell script based tool which uses openssh vpn tunneling feature to connect two private networks or attach a host to the remote private network securely over the internet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    SNames is a threaded java dns scanner. It uses patterns to provide good bruteforce strength when trying to resolve hostnames.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Polymorphic shellcode detection library suitable for IDS developement, based on generic nopsled detection and subsequent execution as controlled process. Tested as a Snort plugin.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Gamja will find XSS(Cross site scripting) & SQL Injection weak point also URL parameter validation error. Who knows that which parameter is weak parameter? Gamja will be helpful for finding vulnerability[ XSS , Validation Error , SQL Injection].
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Zeppoo allows you to detect rootkits on i386 and x86_64 architecture under Linux, by using /dev/kmem and /dev/mem. Moreover it can also detect hidden tasks, connections, corrupted symbols, system calls... and so many other things.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Secwatch is an intrusion detection system using log analysis to detect service scan and other brute-force attempts on a server or other computer using system logs and will create temporary firewall rules to block offending IPs
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This utility binds IP addresses of your local network according to MAC adresses stored in MySQL database. It can help to avoid IP spoofing, and increase network control.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Packet generator for security research (currently RADIUS protocol). Create either large highly variable test runs or short programs demonstrating a characteristic sequence of packets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The Bro Re-usable Architecture (BRA) is a project by Christopher Jay Manders that will allow one, with minimal effort, to set up a working Bro (real-time intrusion detection) environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Open Identity Management (OIDM)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    apGuard is very easy to use program which allows to automatize the process of setting permanent rights for files and directories (using the configuration file). Works on linux, and probably on other UNIX systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Ncartographer takes the xml output from an Nmap scan and displays it graphically in an attractive, compact, scalable, and complete manner. Supports saving the display of a scan as .png or .jpg images, and can generate images from a command line.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    This project provides a user-level command to edit NFSv4 Access Control Lists (ACLs). The command allows users to display and change NFSv4 ACLs from clients that do not have complete NFSv4 ACL support.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Tecnotel is a project that seeks security and comodity to the end-user, controlling your house through the telephone line, internet or remote-controller. The software available controls the electronic-equipment and others.
    Downloads: 0 This Week
    Last Update:
    See Project