Showing 37 open source projects for "code::block"

View related business solutions
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    ModSecurity Nginx Connector

    ModSecurity Nginx Connector

    ModSecurity v3 Nginx Connector

    ...In practice, it provides a portable, policy-driven security layer at the edge without modifying application code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    vRain

    vRain

    Chinese Ancient eBooks Generator

    ...It encapsulates login, session management, and request sequencing so repetitive actions can be executed reliably on a schedule. A configuration-driven approach lets users store multiple accounts, adjust intervals, and toggle features without modifying code. The program surfaces clear logs and result summaries so you can verify outcomes or spot failures that need manual intervention. Deployment is intentionally lightweight, making it suitable for laptops, low-power servers, or containers. While it removes the drudgery from daily online routines, it’s designed to be used responsibly in accordance with platform policies and local regulations.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    BoringSSL

    BoringSSL

    Mirror of BoringSSL

    ...Google products that use BoringSSL ship their own copies and update them as needed, enabling faster iteration without legacy constraints. BoringSSL includes comprehensive API documentation, build instructions, and guidance for porting code from OpenSSL.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    fwknop

    fwknop

    Single Packet Authorization, Port Knocking

    fwknop stands for the "FireWall KNock OPerator", and implements an authorization scheme called Single Packet Authorization (SPA). This method of authorization is based around a default-drop packet filter (fwknop supports iptables and firewalld on Linux, ipfw on FreeBSD and Mac OS X, and PF on OpenBSD) and libpcap. SPA is essentially next-generation port knocking (more on this below). The design decisions that guide the development of fwknop can be found in the blog post "Single Packet...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 5
    Anti-Spam SMTP Proxy Server

    Anti-Spam SMTP Proxy Server

    Anti-Spam SMTP Proxy Server implements multiple spam filters

    The Anti-Spam SMTP Proxy (ASSP) Server project aims to create an open source platform-independent SMTP Proxy server which implements auto-whitelists, self learning Hidden-Markov-Model and/or Bayesian, Greylisting, DNSBL, DNSWL, URIBL, SPF, SRS, Backscatter, Virus scanning, attachment blocking, Senderbase and multiple other filter methods. Click 'Files' to download the professional version 2.8.1 build 24261. A linux(ubuntu 20.04 LTS) and a freeBSD 12.2 based ready to run OVA of ASSP V2 are...
    Leader badge
    Downloads: 41,675 This Week
    Last Update:
    See Project
  • 6
    PacketFence
    A network access control (NAC) system featuring a captive-portal for registration and remediation, wired and wireless management, 802.1X support, isolation of devices, integration with IDS; it can be used to secure networks from small to large. Source code is hosted here: https://github.com/inverse-inc/packetfence Issue tracker is hosted here: https://github.com/inverse-inc/packetfence/issues
    Downloads: 22 This Week
    Last Update:
    See Project
  • 7
    EnigmaLike
    EnigmaLike is an Enigma-like encoding tool for text files that encodes word-by-word using a dictionary/code book/encryption reel set-up. EnigmaLike is written using PerlTk and has instructions in PDF format. For Linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Linux Exploit Suggester 2

    Linux Exploit Suggester 2

    Next-Generation Linux Kernel Exploit Suggester

    ...It inspects the target kernel and OS release, compares that information against a curated database of known kernel vulnerabilities, and reports which exploit primitives are plausibly applicable to the host. The script can optionally download exploit proof-of-concept code from public exploit repositories to accelerate validation in controlled environments. It supports wildcard matching for kernel strings to broaden detection coverage and colorizes its output for easier reading in terminal sessions. Typical usage is simple and lightweight: run the script on the target (or pass a manual kernel string) and review the ranked list of candidate exploits and references.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    __Alien Cipher

    __Alien Cipher

    A bespoke symmetric cipher.

    Released under 'Creative Commons v3' license Alien Cipher is an endeavour to build my own symmetric cipher. The primary aim is to simply learn the fundamentals and finer details of cryptography in general and build working examples of my ideas in code. The code is shared here for posterity (future folk) in the guise that it may help others also on the path to cryptography. This code demo uses a 256bit rolling hash table (8x8bytes) at its heart to mix together pre-defined parameters in a way that allows the cipher to produce encoded output that is locked to a key of arbitrary length without padding. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 10
    Network Tracking Database

    Network Tracking Database

    Track your ARP/MAC table changes and so much more

    The Network Tracking Database (NetDB for short) tracks all changes to the MAC address tables on your switches and the ARP tables on your routers over time stored in MySQL. It supports extensive switch, VLAN and vendor code reports from a CLI or Web App. NetDB can generate CSV reports, track the usage of static IP addresses, record neighbor discovery data and much more. There is now a VM "appliance" with easier upgrades available in the Files section. See the http://netdbtracking.sourceforge.net for more details.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    PAC Manager
    PAC is a Perl/GTK replacement for SecureCRT/Putty/etc (linux ssh/telnet/... gui)... It provides a GUI to configure connections: users, passwords, EXPECT regular expressions, macros, etc. You like 'SecureCRT/SSHMenu'? Check this tool and let me know
    Leader badge
    Downloads: 114 This Week
    Last Update:
    See Project
  • 12
    ...Based on html form authentication and cookie authentication session. Cookie session are stored in memcache deamon. Can be used has an simple "Single Signe-On" (SSO). All the code source and the bug tracking has migrated to github: https://github.com/ZenProjects/Apache-Authmemcookie-Module All the documentation are here: https://zenprojects.github.io/Apache-Authmemcookie-Module/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Linux Exploit Suggester

    Linux Exploit Suggester

    Linux Exploit Suggester; based on operating system release number

    ...The tool intentionally keeps its logic simple: it performs string matching and warns that patched or back-ported kernels can mislead results, so its output should be treated as pointers for further verification rather than definitive proof of exploitable code. Sample output demonstrates common exploit names, CVEs, and direct exploit-db / vendor links to aid triage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Bastille Linux

    This tool locks down Linux and UNIX systems.

    Bastille Linux is a Hardening and Reporting/Auditing Program which enhances the security of a Linux box, by configuring daemons, system settings and firewalling. It currently functions on most major Linux distributions and HP-UX. In the past, it has hardened Mac OSX as well. We are working on a code update to modern Linux distributions.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 15
    DEEEP

    DEEEP

    Detector of Integer Vulnerabilities in Software Portability

    DEEEP is a open source static analysis tool to detect, in C programs, integer vulnerabilities caused by the bad adaption of aplications from ILP32 to LP64. It uses the tools Lint and Splint, and runs over Open Solaris and Linux operating systems. This tool semantically analyses source code. More precisely, it does type checking, data-flow analysis, and it automatically correlates the results of these two types of analysis. Type checking is used for finding bugs on the way integers are handled, and data-flow analysis is used to see if hazardous functions (eg. memcpy, strcpy) are accessible from outside the program. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Forensic Scripts

    Forensic scripts for evidence acquisitions, analysis and more

    This project contains various scripts and code snippets that can easily be deployed by an incident responder or forensic analyst to aid them in either acquiring or analyzing critical data. You can contact me at: interrupt08@users.sf.net or visit my blog, fork(), at https://forksec.wordpress.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    ssh_ninja

    SSH Protector

    ssh_ninja will watch the secure or auth log file depending on distribution for a configured number of login attempts to accounts and issue an IPTables drop statement to block and IP
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Ragnarok
    A cascading encryption system that prevents reverse engineering of hashes even with the source code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A package of scripts to watch for snort alerts, change / create firewall rules to block high priority alerts, and record recent blocks. It will increase block times based on previously recorded blocks
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Perl Password Generator using LINUX /dev/urandom, randomized by time signature and hash final masking. Usage: /usr/bin/perl mkpw-hash-alpha.pl [--hash=MD5/SHA1/SHA256/SHA512] [--length=integer<17] [--cycles=integer=1...3]
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 22
    Simple Intrusion Detection System which monitors failed access (SSH and Dovecot) attempts. If hack attempt is detected above the configurable threshold level then a number of actions are taken to block the IP and alert administrators of the attempts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    GNIPS is a network intrusion prevention system for Linux using Snort and iptables. It alerts user of incoming attacks on their network and allows them to block any offending hosts. It's also possible to configure GNIPS to send out alert emails.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Running as a daemon it monitors /var/log/messages(configurable) for bastille iptables and PSAD scan alerts with a max threshold (configurable) It will block ip on iptables instantly and send abuse email out. Requires a few perl modules (tries to install)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    BogoSec is a utility that calculates source code security quality metrics. A flexible framework interprets the results of existing scanners to compute these metrics. BogoSec is useful to track security quality across releases and competing packages.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next