Showing 5196 open source projects for "linux is"

View related business solutions
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 1

    pwdex

    Web-based password exchange, sharing and storage system.

    Web-based password exchange, sharing and storage system. It has 2 types of passwords: private and shared. Shared ones can be shared to individual users or to groups of users. The system is written in Ruby using Sinatra framework. Storage backend is any database (e.g. MySQL, sqlite), encryption is done via AES-256.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Small Pack

    A shell

    A shell
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    OpenVaccine

    Immunize your USB storage devices against viruses!

    Tool for protect USB storage device with FAT-32 partitions from malware infection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    pgpry is a Pthread-based password recovery program for private OpenPGP keys. Numerous options for restricting the key space are offered, including regular expression filtering and prefix/suffix filters.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    SAFER Honeypot
    The SAFER Honeypot (Spoofing Active Fingerprints with Enhanced Replies) is a low-interaction virtual honeypot that is compatible with Nmap's second generation OS fingerprint database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    GPU Cisco ASA password cracker

    GPU Cisco ASA password cracker

    Software for Cisco ASA password cracking with NVIDIA GPU acceleration
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Configuration Management Manual for using openSuSE Linux in the Enterprise
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Store several passwords with a single portable program. Just remember only one password. It's up to you to decide how many password you want to store, and which name you want to give to that password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    web-script written in php, helps setting up proftpd itself with mysql authentication, logging and TLS. provides a frontend for user administration
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully managed relational database service for MySQL, PostgreSQL, and SQL Server Icon
    Fully managed relational database service for MySQL, PostgreSQL, and SQL Server

    Focus on your application, and leave the database to us

    Cloud SQL manages your databases so you don't have to, so your business can run without disruption. It automates all your backups, replication, patches, encryption, and storage capacity increases to give your applications the reliability, scalability, and security they need.
    Try for free
  • 10
    Steganography Tool
    LSB Steganography tool which provides hide ASCII infomation within 24-bit Bitmap images
    Downloads: 8 This Week
    Last Update:
    See Project
  • 11
    SQLi Aid is a sleek, compact penetration testing tool for hacking method of Structure Query Language Injection. SQLi Aid comes with a manual, you'll need it. This program aids and suggests for you but will not do all the work for you, that's no fun.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    CesTa (Code Enhancing Security Transformation and Analysis) is a tool for enhancing security by program transformations. Focused on Smart Cards (Java Card in particular), powered by Ant, ANTLR and StringTemplates.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    An opensource chrome javascript extension/user-script, that records key strokes in the browser, and sends them to an external listener, cannot be detected by any anti-virus at the moment. Written Completely in javascript and php.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Fast, easy, simple. Advanced mode and based on questions to the user, a different way to generate passwords secure and efficient.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    cPanel Setup, Secure and Plugins
    cPInstall is a small bash script created at first for UnderHost customer then released to public. Its purpose is to give access to install, optimize, secure any common cPanel plugin within one click. Useful for novice and helpful for advanced users. http://underhost.com - Offshore Hosting Solutions New version coming soon!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Some tools collection to do assessment and penetration testing against IPv6. It's completed with article which fully explained about this ipv6hackit.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    VB6 KeyLog

    A simple keylogger for visual basic 6

    A simple keylogger written in VB6. Source included. No viruses - of course. Don't take my word, read through the source and build yourself! It was written by mj-thompson, a 15 year old, to show off to computer teachers :p FOR LEGAL USE ONLY.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    eCryptfs Parser is a GUI for Linux and Windows that recursively parses the headers of every eCryptfs file found in a given directory. It will tell you what encryption algorithm was used, the original filesize, signature used etc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    A syslogd supporting on-demand disk buffering, TCP, writing to databases, configurable output formats, high-precision timestamps, filtering on any syslog message part, on-the-wire message compression, and the ability to convert text files to syslog.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    mcrypt, and the accompanying libmcrypt, are intended to be replacements for the old Unix crypt, except that they are under the GPL and support an ever-wider range of algorithms and modes.
    Leader badge
    Downloads: 893 This Week
    Last Update:
    See Project
  • 22
    Password strength testing Java API utilizes Java platform independence and threading mechanisms. Provides a way to conduct custom brute force and dictionary stregth tests.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Embeds text and files in images with optional encryption. Easy-to-use UI, error reporting, and self-update (beta)
    Leader badge
    Downloads: 26 This Week
    Last Update:
    See Project
  • 24
    This project aims at developing a easy software for the protection of SCP-ECG files and also control the access to the protected files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Using encryption to secure your code or text. Click File->Run to run your code using Ruby, see the pop up for output. Never save your text or code to disk unencrypted. Don't forget your password. Encryption is error-persistent.
    Downloads: 0 This Week
    Last Update:
    See Project