Showing 3264 open source projects for "gnu linux"

View related business solutions
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    A framework for information security management. It has the centralized server for managing the IDS sensors, log consolidation and correlation, report generation etc. Also it has customized IDS sensor based on snort.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    IDS-probing Project is a testing project for IDS evasion.Using libnetdude API and other plugins to do IDS assessment.Sending different mutant exploits to check IDS's defensive ability.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    "Google Hack" Honeypot Project. GHH is written in PHP and assists the development of web based honeypots designed to lure search engine hackers.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Smoothwall Mod for Dansguardian User group editing. Creates five initial groups; everybody, child, preteen, teen and adult. Intended to automated the editing of filtergroupslist and exceptionuserlist via the web interface of Smoothwall. Inserts as a new
    Downloads: 0 This Week
    Last Update:
    See Project
  • 5
    What are the packets rejected by your Netfilter based firewall today ? How often this suspicious host try to connect to your box ? What are the most rejected domains ? Who is this strange host which scan your ports ? The responses are in the iptables log
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    ModSecurity 2.x managament tool. Generate special rule, show logs, create conf.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    KCPentrix is liveCD design to be a standalone Penetration testing toolkit for pentesters and security analysts
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    S/Key Generator. An RFC2289 compliant One-Time Password generator written in Java language and O.S. Thinlet package for GUI. It uses MD4 and MD5 hash algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    WASTE is a mesh-based workgroup tool that allows for encrypted, private communication between distant parties on the internet, independant of local network organization.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    Secure Gateway for ICQ
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    This contains a sample implementation of DTLS-VPN using OpenSSL DTLSv1 Support - to send data over an encrypted channel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    PIX Logging Architecture correlates Cisco PIX system logs into a MySQL database and provides a web-based frontend for displaying, searching, and managing Cisco PIX logged events, traffic, and IDS logs (More info at http://www.logging-architecture.net ).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    -KleanUp- Secure, automatic and komplete kleaning of Kubuntu!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Thresh is an application for Snort that manages alert thresholding and suppression. This application was designed to assist the administrator with tuning one or more Snort sensors. This was designed to run under RedHat flavors of Linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    An extremely versatile neural net. Hopefully.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Sting is a simple, host-based approach to detecting arp cache poisoning based man in the middle attacks (such as made by ettercap) on your LAN. It uses SNMP to periodically query the arp cache of your router and make sure its entry for you is correct.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Pillager is a set of PHP Scripts that allows you to test the security of your web server permissions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A fast contractual framework based Monitoring agent for Java with extended support for temporal operators and customizable agents for JVMTI, Javassist and Dynamic Proxy APIs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    HumanSudokuSolver is intended to solve Sudoku puzzles in a way human beings would do (non brute force). It currently solves most of the puzzles I tried and can output a step-by-step solution. Developers who want to contribute are welcome!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Privale is a p2p network following the form of onion routing/mixmaster networks. But, it is an anonymous publish and retrieval medium, not a proxy system. Privale attempts to defend against denial of service attacks, Sybil attacks, and traffic analysis
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    NOTE: Development has moved to github: http://www.github.com/jaymzh/check_x509 check_x509 is a generic script to check X509 entities for expiration periods. It can be run from nagios, nrpe, cron, on the command line, or in other scripts or programs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Privacy-preserving proxy for digital credentials transactions
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    SecMec is a wizard to install several security mechanisms on Linux. It runs straight from the console and was designed initially to run on Slackware Linux, but it's possible to port it to any other distro with some customization.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The PeerTrust system uses policies to describe trust and security requirements. Such policies are a component of Peertrust run-time system that can negotiate to establish trust among systems on the Semantic Web
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB