Showing 4645 open source projects for "open source project"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 1
    A Java library for executing, parsing and persisting NMap output.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    The Safe C Library provides bound checking memory and string functions per ISO/IEC TR24731. These functions are alternative functions to the existing standard C library that promote safer, more secure programming. The ISO/IEC Programming languages — C spec, C11, now includes the bounded APIs in Appendix K, "Bounds-checking interfaces". This latest upload supports building static library, a shared library and a linux kernel module.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    The system is designed to upload phishing emails to a database where they are automatically analyzed and customized reports can be generated. UnMask was developed by ECIT Labs, Dept of Computer Science, FSU. The director of the Lab is Dr. Sudhir Aggarwal. UnMask has substantial on-line help features and should mainly be self-explanatory.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    psyBNC is an easy-to-use, multi-user, permanent IRC-Bouncer with many features. Some of its features include symmetric ciphering of talk and connections (Blowfish and IDEA) It compiles on Linux, FreeBSD, SunOs and Solaris.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    Access Road

    Access Road

    Simulator of access controls

    The Access Road software is a universal simulator of access controls that is intended to improve design and auditing of IT security. Access Road offers the out-of-the-box simulations of GNU/Linux Ubuntu® (components and rights on the file system), MySQL Server®, and a generic Role-Based-Access-Control application to adapt to your needs. It is designed for database, system, and application administrators, IT architects and developers, auditors. Access Road provides a full simulation of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This is a C source code scanner based on symbolic logic. It analyses C source code (especially that of the Linux kernel, at which it is aimed) for programming errors and vulnerabilities. The tests are defined by the user.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    ...They have since then evolved into a general-purpose tool for binary program testing, profiling, and security restriction. The sandbox libraries are currently maintained by the OpenJudge Alliance (http://openjudge.net/) as a standalone, open-source project to facilitate various assignment grading solutions for IT/CS education. See project page at https://github.com/openjudge/sandbox for details.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    ssh_ninja

    SSH Protector

    ssh_ninja will watch the secure or auth log file depending on distribution for a configured number of login attempts to accounts and issue an IPTables drop statement to block and IP
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    catcha

    Catch-a spammer with a CAPTCHA.

    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 10
    AttackVector Linux

    AttackVector Linux

    linux distro for anonymized penetration based on Kali and TAILS

    AttackVector Linux is a new distribution for anonymized penetration and security. It is based on Kali and TAILS, which are both based on Debian. While Kali requires a modified kernel for network drivers to use injection and so forth, the Tor Project's TAILS is designed from the bottom up for encryption, and anonymity. Nmap can't UDP via Tor. The intention of AttackVector Linux is to provide the capability to anonymize attacks while warning the user when he or she takes actions that may...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SPIZD stands for Stress Probing Invasive Zap Destructor; it's a command-line stress test tool used to determine how many simultaneous (concurrent) connections servers can handle. Protocols: http, pop3, pop3s, imap, imaps, smtp, smtps, ssh, radius.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    JSSLTrace - a SSL/TLS Interceptor

    A java-based interceptor for SSL/TLS protocol

    Jssltrace is a java-based tool, which enables it's user to intercept ssl based communication between two programs. Jssltrace works essentiallly in the same manner as tcptrace (http://www.pocketsoap.com/tcptrace), which is the main inspiration for it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Kvault

    A web application to store login credentials

    This php application provides a web interface into a encrypted vault for storing password and other useful information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    DENRIT

    DENRIT

    Perform anonymous and non-anonymous pentesting.

    DENRIT allows remote administration of anonymous networks (TOR, I2P and FreeNet). Also, contains a pentesting module to execute commands using a selected anonymous network, pentesting with TOR or TCP Follows a client/server model with well-defined communication interfaces. SSH is used to allow remote clients to access the machine and manage any anonymous network that is installed there, plus allows penetration testing anonymously (or non-anonymously) using tools such as Metasploit...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    "My session" is a class that stores session data in a database rather than files. This method in most secure than the default session system of PHP
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    w3af
    w3af, is a Web Application Attack and Audit Framework. The w3af core and it's plugins are fully written in python. The project has more than 130 plugins, which check for SQL injection, cross site scripting (xss), local and remote file inclusion and much more. This project has been migrated to github! See details in our project site: http://w3af.org/
    Downloads: 3 This Week
    Last Update:
    See Project
  • 17
    A pure java library to operate on OpenPGP cards directly using javax.smartcard apis with no need of external dlls/frameworks (such as pkcs11 or opensc-java). Includes sample OpenPGP card edit application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Dirt

    Dirt

    An IRC proxy to add chat encryption to IRC clients

    Dirt is a multi-platform IRC proxy that adds FiSH-compatible chat encryption (including DH1080 key exchanges) to any IRC client. It can be used as a SOCKS proxy or as a simple bouncer. For security reasons, only localhost connections are allowed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A Bash script for downloading and installing additional Clamav definition files.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    IPFIRE-wall is a framework that implements a network firewall. It can be used in desktop systems and in simple network configurations, providing a friendly graphical interface and a simple installation procedure. Also unprivileged users can personalize.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    mod_gnutls

    mod_gnutls

    mod_gnutls apache module

    mod_gnutls uses the GnuTLS library to provide SSL 3.0, TLS 1.0, TLS 1.1 and 1.2 encryption for Apache HTTPD. It is similar to mod_ssl in purpose, but does not use OpenSSL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Livro sobre segurança da informação, cobrindo tópicos como: firewalls, IDSs, quebra de senhas, VPNs assim como técnicas para proteger as camadas de uma pilha TCP/IP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Hide my message

    Hide my message

    Hide your secret message into any type of files

    Secrets is a Java application allow you to hide you message into any type of files either audio, video, text, dll or any type of files. It use a simple Cryptography algorithm to save the message in an secret way, so it can`t be read by any HexaReader. You can retrieve your message also in a very simple way by choosing the original file and click on Decode button. It was built using Java and Swing technology. It was published for educational use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    NetDash

    NetDash

    Network Intrusion Detection and Full Packet Capture System

    NetDash is a network dashboard and intrusion detection system. NetDash passively collects network traffic and then stores key information to be analyzed for unwanted network activity. NetDash captures all traffic passed over the network and stores that traffic in a PCAP file that can be downloaded and analyzed with other tools such as Wireshark. NetDash processes each PCAP file and stores relevant information about each packet captured in a MySQL database. Loaded NetDash plugins display...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Elemata CMS

    Elemata CMS

    Elemata is an open source content management system.

    Elemata is a free content management for personal use and commercial use at the moments. Elemata will provide you with the best CMS experience. Learn how to turn any html/css document into a theme at elematacms.com
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB