Showing 3198 open source projects for "t2 mac linux"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • Secure File Transfer for Windows with Cerberus by Redwood Icon
    Secure File Transfer for Windows with Cerberus by Redwood

    Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.

    Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
    Try for Free
  • 1
    F-Talk P2P Encrypted Secure Voip

    F-Talk P2P Encrypted Secure Voip

    F-Talk cross-platform p2p encrypted secure voip software

    ...http://ftalk.armanasci.com/guide Spefications * Peer to peer direct connection without using any central dedicated server. ( First basic part of the security ) * 128bit AES Symmetric end-to-end encryption PCM datas. ( Second basic part of the security ) * 64bit Base64 Encoding transferred server side info. * Ipv4 and Ipv6 Supoort. * Full-Dublex Communication. * Full Supports Windows,Linux,Mac and Android platforms. * Complately open source project. http://ftalk.armanasci.com/ http://blog.armanasci.com/ http://blog.armanasci.com/contact-me/
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    WHYDAH - Linux Distribution

    WHYDAH - Linux Distribution

    Penetration Testing and Security Auditing Linux Distribution

    About Distribution WHYDAH is a fast, lightweight and easy slax based linux live distribution focused on wireless security testing, automatic hardware detection, and support for many graphics cards, sound cards, wireless, SCSI and USB device. WHYDAH provides users with easy access to a comprehensive and large collection of security-related tools. Support for live USB functionality allows users to boot directly from portable media without requiring installation, though permanent...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Fake Ssh Manager

    Fake Ssh Manager

    Sends ssh password to your e-mail with fake form

    Fake Ssh Manager is a fake form which sends root password to your e-mail. Can be use for social engineering and phishing attacks. You can change the form according to your target *************************** Fake Ssh Login fake formuyla root şifresini size e-mail yoluyla gönderir Sosyal mühendislik saldırılarında kullanabilirsiniz. Formu hedef siteye göre değiştirebilirsiniz.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    NeSSi2

    NeSSi2

    Network security simulator

    At the moment NeSSi² is not actively maintained anymore since we are planning a successor project. NeSSi² is a network simulation tool suite addressing in particular network security aspects. Sample capabilities are profile-based attack generation, traffic analysis and support for attack/malware detection algorithm plugins.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5

    Substitution Cipher Decryption

    Decrypt messages encrypted with a substitution cipher

    The provided program helps the user with the deciphering of a substitution cipher with the 26 letter alphabet by providing the following features • Dynamic entering of ciphertext. Ciphertext can be modified at any point of the process. • Easy location of corresponding characters in the ciphertext and the substituted text by selection. • Fast frequency analysis for single letters, bigrams, trigrams and quadgrams (more N -grams can be made available by adding a single line of code). •...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    SIPve

    SIPve

    Videovigilancia, Control de Acceso y Carnetización

    Sistema Integrado de Protección Venezolano con capacidades de Videovigilancia, Control de Acceso y Carnetización para el resguardo físico de instalaciones.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    MyZone Social Network

    peer to peer social network

    MyZone is a peer to peer social network that supports almost all features common in Facebook and Google+. In addition you can share unlimited mp3s and mp4s with your friends. MyZone does not downgrade the resolution of your photos and all established connections are encrypted using state of the art encryption techniques. MyZone is designed to be resilient towards cyber attacks especially DDoS attacks and government imposed censorships. MyZone should be an interesting social networking...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    USB Autorun Virus Protector
    A simple and portable tool to protect USB storage drives against spreading of Autorun.inf viruses through the USB drives by creating some un-deletable dummy files in your USB drive. Also it can clean autorun viruses from the selected drive.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9
    Eolos VoipAudit

    Eolos VoipAudit

    Universal Framework to audit Voip protocols's security

    Visual Framework Tool to scan/sniff address space, enumerate users, crack credentials, pattern based dial spoofing and security reporting for Voip protocols. This software is intended to give a general framework to build and plug Voip protocol analizers in order to fix security issues and enhance VoiP platforms confidence. It IS NOT intended to be a cracking tool for malicious system breakers, but a really software MUST for security people to assure Voip platform security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10

    Reactor Breeder

    A Genetic Algorithm for Reactors in StarMade

    This software uses a genetic algorithm to "evolve" reactor designs for Schema's space-simulation game, Star-Made (http://star-made.org/). One of the more unique aspects of the game is that ship power management is not as simple as filling a cube with power generation blocks. This mechanism leads to difficulties in getting maximal power generation out of such reactors. This program rectifies this issue by using a self-organizing variant of brute force search. Much of the search space is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Maroniecoder

    Maroniecoder

    Encrypt a text through a list of encryption methods

    I came to the conclusion that this program is not worth the time for further development. Use different Encryption methods with parameters to en- or decrypted a text through the list With downloadable source-code since 1.3 You need to have Java installed http://www.oracle.com/technetwork/java/javase/downloads/index.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Web Forensik

    Web Forensik

    PHPIDS-based Security Log Analyzer for Apache

    NOTE: This project is no longer under active developement. Check out the successor at: https://github.com/jensvoid/lorg Web Forensik ist a script that uses PHPIDS to automatically scan your HTTPD logfiles for attacks against web applications. Check the Wiki for installation, configuration, usage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Formerly known as DotNetOpenId, this library brings easy and flexible OpenID, OAuth and InfoCard to the .NET platform. Official web site is at http://www.dotnetopenauth.net/, which includes source code downloads.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Enigmatic CGI pastebin
    Simple CGI script which allows you to transfer sensitive ascii data (passwords, hashes, pem keys) via HTTPS. SSL MUST BE implemented by webserver. Algorithm: - Paste new data into textarea, submit. You get link Link consists of three md5 hashes from salt. File, containing your data, named that way. So, it is hard to bruteforce links/files. - Whenever link being opened, script reads file and prints its content into brower in text/plain content-type. Afterthat, script removes file. So...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Intrusion Block (IBlock) is a small Linux daemon which greps the alertfile of an IDS such as Snort or Suricata and blocks the offender hosts for a given amount of time using iptables.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    SecurePassG

    Creates Secure Passwords

    SecurePassG creates more secure passwords. It is based on what I understand about password criteria needed to thwart most password guessing software. When saving or writing down a password, you may want to encrypt it using an encryption software like Encrypto available under my profile. When saving your password, you choose the extension you want to use, .txt should be fine. In addition to the original Java version, there is also a Windows .exe version written in C# that currently...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    a simple ddos utility - only for testing purposes! dont use this on real machines. read the rar archive comments for info
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Compensato
    Compensato is full suite of diagnostic and troubleshooting tools (focused on troubleshooting Windows environments at the moment) that runs from an Ubuntu based Linux live environment. Once booted a browser winow will launch and the program will automatically look for a Windows installation to work with. You should be able to have this Windows installation visible to the system either internally or externally.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Intended for Developers to highlight their security weak coding and show them how attackers can abuse these weaknesses. Refer to the following web sites for directly viewing training movies online. http://yehg.net/lab/#training http://core.yehg.net/lab/#training
    Downloads: 9 This Week
    Last Update:
    See Project
  • 20
    RSAT

    RSAT

    A script to perform SAT attacks on RSA

    SAT solvers are being used more and more in partial key exposure attacks. The scope of this script is to show that SAT solvers can be used in partial key exposure attacks of RSA with very good results.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Falcon Attacker

    Interesting multithreaded, customizable, simple denial of service tool

    Falcon Atttacker DoS Tool. Features: Choosable DNS/IP, PORT, Page, Server Timeout, Threads, Time Between Headers. POST attacks, GET attacks, TCP flood, ICMP flood, modem hangup ping exploit flood, DNS-to-IP option for less bandwidth, speeds, other stuff, Multithreaded, Simple question/answer style attack control, comprehensive attack options. BTC: 1LGJhVQeJZ1RQXjkm3VWdJxE4Gz88tk2Y2
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Py Forensic

    Análisis forénsico, entorno unificado y extracción de datos

    ...Dichos scripts llevan a cabo las tareas forénsicas que habitualmente reservamos a otras aplicaciones. La instalación en Windows es muy sencilla (ver instrucciones en la descarga). En otras plataformas (Mac y GNU/Linux) se complica.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    The Safe C Library provides bound checking memory and string functions per ISO/IEC TR24731. These functions are alternative functions to the existing standard C library that promote safer, more secure programming. The ISO/IEC Programming languages — C spec, C11, now includes the bounded APIs in Appendix K, "Bounds-checking interfaces". This latest upload supports building static library, a shared library and a linux kernel module.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 24
    A Java library for executing, parsing and persisting NMap output.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    Access Road

    Access Road

    Simulator of access controls

    The Access Road software is a universal simulator of access controls that is intended to improve design and auditing of IT security. Access Road offers the out-of-the-box simulations of GNU/Linux Ubuntu® (components and rights on the file system), MySQL Server®, and a generic Role-Based-Access-Control application to adapt to your needs. It is designed for database, system, and application administrators, IT architects and developers, auditors. Access Road provides a full simulation of...
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB