Showing 5338 open source projects for "security"

View related business solutions
  • Secure File Transfer for Windows with Cerberus by Redwood Icon
    Secure File Transfer for Windows with Cerberus by Redwood

    Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.

    Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
    Try for Free
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 1
    JPassword Recovery Tool

    JPassword Recovery Tool

    Password recovery tool for compressed archives and md5, sha-1/2 hashes

    This is a simple but sophisticated open source password recovery tool for M$ Windows, it can effectively 'crack' any password protected archive that can be decompressed by 7zip given enough time and resources. It can also bruteforce MD2, MD5, SHA-1 and SHA-2 hashes (SHA-256, SHA-384, SHA-512), CRC16, CRC32, CRC64 and Adler32 hashed passwords for both Windows, and Linux. It requires java 7u4 and above, and 7-zip v9.20 and up for archive recovery. Keeping these above applications up to date...
    Downloads: 35 This Week
    Last Update:
    See Project
  • 2
    Foi comprovado que senhas como: datas de nascimento, números de telefone, numero de cartões de crédito... são fáceis de serem descobertas (hackeadas), por isso existe o Password Generator, para gerar senhas que são difíceis de descobrir. O Sistema funciona como um gerador RANDOM, que cria instantaneamente uma série de possibilidades de combinações que o sistema julga ser mais difícil para programas e hackers descobrirem.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    SXMD

    SXMD

    MultiDistribution with Diagnostics, Recovery, Backup, Cleaning.. tools

    The SXMD (" like Security-X MultiDistribution ") use syslinux, grub4dos and others bootloaders to recover a crashed boot or run many GNU / Linux utilities. The first category is "Antivirus" with editors like Antivir, AVG, Comodo, DrWeb, FSecure, Kaspersky, Panda, VBA ... The second is composed by GNU/Linux's Distro: DSL, CorePlus (+Qemu Starter), Slacko, Slax Custom, Slitaz & XPuD ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    This is just a little something i have put together. I am just learning C#, so i am wanting to increase my C# Skills. Martinmine, inspired me as a Coder, and as a friend to do it. He also helped with the Random Password Generator. :) I will be looking forward to update it and make it have more features and see how many people are maybe actually going to use it. Adding any reviews would be nice aswell. Thanks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 5
    Files Hash code Verifier

    Files Hash code Verifier

    A tool to verify and generate MD5,SHA,CRC32 hash of multiple files

    A Security tool that will help to verify the hash codes of files . Currently,Our Hash Code verifier tool supports the following Hash types: MD5,SHA,CRC32. More details about the tool can be found in the project homepage.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Barada
    Barada (Barada Aint Respecting Any Deceptive Adversaries) is a PAM module designed to provide two-factor authentication support. There is companion software called Gort which runs on Android devices, essentially turning your phone into a SecureID token. The PAM module is available in the repositories for Debian based distributions. Gort, the Android client, is available from the android market (https://play.google.com/store/apps/details?id=net.sf.crypt.gort)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Tetrumble

    Tetrumble is encryption tool.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The Martus (TM) Bulletin System is used by human rights and social justice groups to track violations. This Java program is as easy to use as email. Bulletins can be encrypted or searched, and can be backed up to a remote server. See www.martus.org.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Dequiem

    Dequiem

    Python DDoS Tool

    Dequiem is a DDoS tool written in python 2.7
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 10

    JS Password Generator with Rulesets

    JavaScript password generator with ruleset checking.

    This javascript random password generator is different, in that the password generated must conform to a particular set of rules. The rules currently supported are: - Maximum # of Repeated characters - Minimum # of characters - Maximum # of characters - Minimum Upper, Lower, and Numbers To be done: Minimum # of special Characters
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    IT security resources

    IT security resources

    IT security resources for ethical hacking & penetration testing

    this collection of most used resources that will help you in ethical hacking and penetration testing. Collection of hacking tools and materials and all major type of attacks and tutorials.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    JMD5 is a multi-threaded Java program to calculate the MD5 sums of files. It uses Java Swing as GUI framework
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Pwn Plug Elite

    Pwn Plug Elite

    Pwnie Express Pwn Plug Elite image for stock Sheevaplugs

    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    sqlcake

    sqlcake

    Automatic SQL injection and database information gathering tool.

    Automatic dump database & interactive sql shell tool dumps the current database structure including tables and columns and turns into an interactive mysql prompt with extra features. Written in Ruby.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15

    aleXa Steganography Tool

    Tool to encode a message inside an image using LSB

    xst is a desktop tool written in C# that allows to encode a message inside an image file. The information is Encrypted, protected by a password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Security Management System

    A management system for sensitive system and security information

    A management system for sensitive system and security information. This system is designed to aid IT/Security professionals in maintaining a repository of sensitive information for their systems, to include: sensitive system information (architecture, assets and inventory, vulnerability data, remediation strategies, assessments) and so on. This is an ever evolving project and will take shape over a given amount of time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    NTRU

    NTRU

    NTRUEncrypt and NTRUSign in Java

    This project provides an implementation of the NTRU public-key cryptosystem: NTRUEncrypt and NTRUSign.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Abstract—The security challenge coming with the popularity of web-based applications is a serious matter. The privacy of the data sent back and for has become a crucial issue. As a matter of fact, in one of their most recent publications, Chen et al analyzed this problem and showed that, although the existence of powerful communication security systems such as HTTPS, WPA/WPA2 Wi-Fi encryption, several high-scaled Webapps are exposed to side-channel attacks using timing and a subset of the applications’ internal information flows. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    BPass Manager

    BPass Manager

    Simple Bash password manager using GPG and SQLite

    Bash Password Manager (BPass) is a shell script that create a SQLite database in which you can store your passwords with the maximum security! In fact it uses GPG (or GPG+OpenSSL) to encrypt and decrypt your database. Now i'm developing the version 2.0 of this script and it will take me some times because i'm busy with my study! Please note that this project is in beta version so please use it only for testing purpose! I've tested this script on: - Ubuntu 11.10 x32/x64 - Ubuntu 12.04 x32/x64 - ArchLinux i686/x64 So please feel free to open tickets or mail me for everything :)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    IP Tables State implements the "state top" feature from IP Filter for IP Tables. "State top" displays the states held by your stateful firewall in a "top"-like manner, in real time. IPTState also has an option to print your state table once and NOTE: Development has moved to github: http://github.com/jaymzh/iptstate
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Data exchange is a core part of all cloud systems so it becomes necessarily important to control access to data that are confidential and whose integrity influences the state of the system at any time.It can be proven that the administrator in a IaaS can easily perform some hidden and malicious task on unsuspecting customer machine. This is attributed to the fact that he/she possesses the root privilege to do so and forms an attack. A cold boot attack can easily be lauched amongst...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    CavitySearch is a Bash script which utilizes several methods of assessing the capabilities of Bluetooth devices. Most of the information can be gathered without pairing with the target device or alerting the end user. CavitySearch will report running services, Device Name, Device Address, Device Type, open RFCOMM Channels "ports", open L2CAP PSMs "ports", device manufacturer, supported protocols, and more. It is also able to help find "hidden" services running on the device.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    syslog proxy daemon

    syslog proxy daemon

    creates an extra socket for syslog (e.g. in a chroot jail)

    Developed for systems that have an older version of syslogd which does not support multiple sockets (e.g. via the '-a' flag). Performs extensive message validation according to RFC 3164
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    PULSE

    PULSE

    Php User Login System Exentended

    Php User Login System Extended Welcome to Pulse, a free and secure user management system written in PHP. It can be used easily: it contains a basic web interface (100% customizable), an handy installer...and the engine, of course. Pulse will make your life easier making you avoid wasting time on writing a login system for your application. The most frequently used features are already implemented into Pulse, so you can't help thinking about Machiavellian ways to realize your...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Web Crawler Security Tool

    A web crawler oriented to information security.

    Last update on tue mar 26 16:25 UTC 2012 The Web Crawler Security is a python based tool to automatically crawl a web site. It is a web crawler oriented to help in penetration testing tasks. The main task of this tool is to search and list all the links (pages and files) in a web site. The crawler has been completely rewritten in v1.0 bringing a lot of improvements: improved the data visualization, interactive option to download files, increased speed in crawling, exports list of found files into a separated file (useful to crawl a site once, then download files and analyse them with FOCA), generate an output log in Common Log Format (CLF), manage basic authentication and more! ...
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB