Showing 1229 open source projects for "beta"

View related business solutions
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    More flexibility. More control.

    Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    ndp-sk is a tool designed to manipulate NDP tables of all kinds of equipment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    NDPWatch is a daemon that monitors ipv6 activity and keeps a database of ethernet/ipv6 address pairings. It reports abnormal changes via mail. It has pretty the same features than its IPv4 analog ARPWatch.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    InterLDAP is a middleware for identity management, completed with management tools. It is divided in subprojects, all designed for one objective: manage electronic identities, from their creation, trough their life in organization, until their deletion.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    The Saint Jude Project is a Project to develop Kernel-Level IDS mechinisms to protect the integrity of host systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 5
    USSI is the Universal SAFE Signing Interface. USSI provides web services for the application of SAFE digital signatures for PDF, text, xml, etc. Please see http://www.safe-biopharma.org for more information on SAFE.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This is another ip/host blockeer used to create blocking entries in both the hosts.allow file, and also pf tables. Blcoks are built on illigal logins and also final block log entries from hosts.allow. The ability to pull in external blacklists once a day
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Odyssi PKI aims to be a complete PKI suite written in Java, and designed from the ground up with security in mind. When completed, it will be fully standards compliant with PKIX, XKMS, OCSP, and other PKI standards.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    The VSC is a PHP/MySQL/Apache Interface for Nessus 2.x. It allows users to hierarchically manage hosts, scanning policies, and request automated immediate, future/reccuring scans of a host or group of hosts, view scan reports and generate metrics.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Shade is a versatile LSB (least significant bit) manipulation and analysis tool used to hide/retrieve files from within other files, such as images. The goal is to make the existence of the hidden file completely undetectable, and optionally encrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • 10
    Flexible, secure file-transfer utility similar to rsync achieving high transfer rates for both large and small files on networks with both LANs and WANs (networks with low or high latencies). Supports interactive batch as well as scripting operation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    LINReS is a tool which can be used by Incident Response and Computer Forensic Teams during initial response phase to collect volatile and other non-volatile data from a compromised Linux machine using statically compiled binaries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    cpm is a small console tool to manage passwords and store them public key encrypted in a file - even for more than one person. The encryption is handled via GnuPG so you can access the programs data via gpg as well.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    KIside is a message digest computing and displaying tool. It computes and shows the hash code of any file as a string of hexadecimal numbers. KIside implements standard algorithms such as MD4, MD5, SHA1, SHA256, SHA384, SHA512, TIGER, RIPEMD160.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This program try to crack any md5 hash , but not using one cpu, using the power of distributed computing to get better results in less time
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Automated Incident Reporting (AirCERT) is an Internet-scalable infrastructure to automatically receive, process, and analyze security event information reported from across administrative domains.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A library for accessing a Time Stamp Authority Server using both HTTP and TCP protocols. It implements RFC3161.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    This project is a collection of Open Source crypto cores and implementations relating to high speed cryptanalysis/cracking and complex implementations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Ircproxy is transparent IRC content-filtering application. It may be used whenever there is a need of monitoring IRC connections.It may be used to deny specific connections or to behold suspicious IRC traffic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A standard API for accessing OpenPGP and S/MIME email in JavaMail.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    using PHP (and some ShellScript) to protect your linux server against bruke force attacks(http://en.wikipedia.org/wiki/Brute_force_attack). also keep a log in MySQL and have email reporting
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    nssl is intended to be a netcat-like program with transparent Secure Socket Layer support, either clear or encrypted sessions can be used. It requires OpenSSL library to be installed.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    Viralator enhances your network's squid proxy server with a virus scanner. Before a user can download a file, the proxy passes the file to the Viralator script which, in turn, uses a virus scanner to scan, disinfect, or delete the download.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Zeitline is a Java/Swing tool that allows a computer forensic investigator to import events from various sources of a computing system or network and then order and classify them into one or more timelines of events.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    l7f stands for "Layer7Firewall" which is a firewall-system, that protects your application on any protocol and fits its security needs flexibly. It can be used for example as web-application firewall.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Real-Time Proactive Secret Sharing Library for RTAI is an implementation of the Shamir's secret sharing scheme and Herzberg's proactive secret sharing algorithm. The library uses a port of GNU GMP in order to make multiple precision arithmetic operatio
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB