Showing 5338 open source projects for "linux-debian"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1

    Xenophobe

    Block countries via iptables and gui menu with country flags.

    The purpose of this project is to geographically restrict access from countries to your server and simply iptables restrictions via a country code and not a large ip list. It is intended as a means of reducing unwanted attacks, brute force, spam, etc. not as a means to segregate access worldwide nor discriminate against any country. I have waned to package an rpm, and deb file that quickly allows most users to block ip addresses from ip blocks that have been geographically assigned....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    NDPMon

    NDPMon - Neighbor Discovery Protocol Monitor

    The Neighbor Discovery Protocol Monitor (NDPMon) is used by Internet Protocol version 6 network administrators for monitoring ICMPv6 packets. NDPMon observes the local network for anomalies in the function of nodes using Neighbor Discovery Protocol (NDP) messages, especially during the Stateless Address Autoconfiguration. When an NDP message is flagged, it notifies the administrator by writing to the syslog or by sending an email report. It may also execute a user-defined script. For...
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    AnalogIDS

    Snort log analyzer written in python

    ES: AnalogIDS es un analizador de logs de snort escrito en python que permite la generación de estadisticas de conexiones establecidas, protocolos y alertas de seguridad. Ademas permite generar gráficos de barra y pastel de las estadisticas. EN: AnalogIDS is a snort log analyzer written in python that allows the generation of statistics established connections, protocols and security alerts. You can generate bar graphs and pie statistics.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    phalanx # parallel hash alternative

    phalanx # parallel hash alternative

    parallel hash alternative message digest

    phalanx - parallel hash alternative (PHA) is an initiative to provide a fast and portable, parallel/multithreaded message digest utility and library.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    Barada
    ...There is companion software called Gort which runs on Android devices, essentially turning your phone into a SecureID token. The PAM module is available in the repositories for Debian based distributions. Gort, the Android client, is available from the android market (https://play.google.com/store/apps/details?id=net.sf.crypt.gort)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6

    AntiDef

    Anti defacement command line tool

    AntiDef is written in order to handle with defacement attacks. This tool written in Java in a fast-and-dirty manner; However is works. This tool is working straight forward. Server administrator should run the application with the following specific parameters: path to the copy of the web site (source), path to the application directory, path to log directory and few more optional parameters. This tool compares the source and the destination files, then copies the "defaced" files if...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    MandelHash

    MandelHash

    MD5 hash used to position and color two overlaid Mandelbrot sets.

    I'm using an MD5 hash of a username and password field to generate some entropy which is used to generate color pallets and positions / scaling of two Mandelbrot sets. These two images are overlaid to create interesting pictures which represent the entered credentials. I'm interested in all things security, this is mostly just for fun, but could possibly be used to help users identify mistakes in their password entry prior to submission and enforce a tighter failed password lockout policy....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    mitm-shaper

    Man-in-the-middle traffic shaper bridge

    Man-in-the-middle traffic shaper bridge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    renamed to Whonix

    renamed to Whonix

    Due to trademark issues, TorBOX had to be renamed. Whonix is the new project name. Please go to https://www.whonix.org/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 10
    LOGalyze CLI

    LOGalyze CLI

    Command line client interface for LOGalyze 4

    Command line LOGalyze client. logalyze-cli is a powerful command line client for managing LOGalyze engine. With LOGalyze application log analyzer, you can collect your log data from any device, analyze, normalize and parse them.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    JCrypTool - Eclipse based Crypto Toolkit
    JCrypTool moved to GitHub! See https://groups.google.com/d/topic/jcryptool-developers/nauEXL6vsbk/discussion for more information and visit our new project home at https://github.com/jcryptool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Secure Content Management System
    SCMS is an MVC based secure content management system. It is designed from the ground up to withstand common Web application vulnerabilities. It is designed for PHP 5.0-5.2.x and MySQL 4.1+, and it can optionally support PostgreSQL as a database backend.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    GPODCS is a Certification Authority developed in the ESA Grid Processing On Demand (gpod.eo.esa.int) project. It offers a PKI infrastructure and GSI authorization management. GPODCS is portable, reliable, easy to install, configure and personalize.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    libObfuscate
    libObfuscate 2.00 ISO C / open-source / system independent * Modern 256bit cryptography: AES, Anubis, Camellia, Cast-256, Clefia, FROG, Hierocrypt3, Idea-NXT, MARS, RC6, Safer+, SC2000, Serpent, Speed, Twofish, Unicorn-A, Wrapper * CSPRNG (based on AES) * Modern 512bit hashing: Grostl, Keccak, SHA2, Skein, Wrapper * Scrambling * Multi-layered obfuscation
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    Netviz

    Netviz is a Python app designed to monitor devices on the user's LAN.

    Netviz (short for NETwork VIsualiZer) is a Python program I cobbled together for a user to monitor devices on the user's LAN or a small section of the Internet. Essentially, it's a pretty interface for information on the MAC addresses and IPs of those devices. The range to search can be set either by the boundaries of the user's LAN using the "Find Range" button or through user-typed IPs. Also, there is a list of tracked MACs. If any of these tracked MACs appears on the LAN, the program...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    KaTaLyzer is network traffic analyzer which offers full network communication monitoring through graphs of protocols traffic for all communicating nodes or for choosen node (based on IP or MAC address). See more at katalyzer.sk
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Python Port Scanner
    A Simple Port Scanner in Python. You need python installed on your pc before you can use the script!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Keylogger BETA version

    A small application , like a keylogger (save in .txt)

    Put this app on the victim PC and this software will be save all words in a .txt file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Bitte neue Website des aktuellen sourceforge Projekts PF_HP beachten! Please see new Website of the current sourceforge project PF_HP! Selbst im vereinfachten zweidimensionalen HP-Modell (hydrophob/polar) ist die Proteinfaltung bereits NP-vollständig. Hier implementieren wir einen brute-force Algorithmus zur Lösung kurzer Eingabesequenzen (0-1-Bitstrings) für die Proteinfaltung. Spende einen Cappuccino: Bitcoin: 1HqrdnfQgi9B4LW8UEvLAwh7X5gXPCoQ5B Litecoin:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Odz Multiple CMS Scanner

    Odz Multiple CMS Scanner

    A multi vulns. cms scanner

    Welcome to our project page odz multi. cms scanner is vulns. scanner for joomla , Wordpress , Xoomp and Nuke the scanner is updated with the lates vulns. with the possibilitie to scan many sites on the same server the scanner is coded in php and have a very simple interface
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    sqlmap
    sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22

    Quazzar

    Quazzar is a DoS tool

    Quazzar is a DoS tool, that include many attacks, it's simple and flexible
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Foi comprovado que senhas como: datas de nascimento, números de telefone, numero de cartões de crédito... são fáceis de serem descobertas (hackeadas), por isso existe o Password Generator, para gerar senhas que são difíceis de descobrir. O Sistema funciona como um gerador RANDOM, que cria instantaneamente uma série de possibilidades de combinações que o sistema julga ser mais difícil para programas e hackers descobrirem.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    JPassword Recovery Tool

    JPassword Recovery Tool

    Password recovery tool for compressed archives and md5, sha-1/2 hashes

    This is a simple but sophisticated open source password recovery tool for M$ Windows, it can effectively 'crack' any password protected archive that can be decompressed by 7zip given enough time and resources. It can also bruteforce MD2, MD5, SHA-1 and SHA-2 hashes (SHA-256, SHA-384, SHA-512), CRC16, CRC32, CRC64 and Adler32 hashed passwords for both Windows, and Linux. It requires java 7u4 and above, and 7-zip v9.20 and up for archive recovery. Keeping these above applications up to date ensures peak performance. if you have any ideas, bugs, tips/improvements and/or suggestions please dont hesitate to contact me NB AS OF V1.07 PLEASE MAKE SURE 'resources' FOLDER IS IN THE SAME DIRECTORY AS THE JPasswordRecoveryTool.jar Known Bugs(v1.09): -although md2 was selceted by default for hash recovery if you did not slected another value and reselect md2 it would use md5 by default
    Downloads: 32 This Week
    Last Update:
    See Project
  • 25

    CRYXOR 2012

    Encryption with Vernam (1917)

    Programm dev by www-cassiopee (sophen). Encryption with Vernam. unbreakable algorithme... but needs lot of safty measures for be it realy.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB