Open Source Python Security Software - Page 20

Python Security Software

View 5752 business solutions

Browse free open source Python Security Software and projects below. Use the toggles on the left to filter open source Python Security Software by OS, license, language, programming language, and project status.

  • Cut Data Warehouse Costs up to 54% with BigQuery Icon
    Cut Data Warehouse Costs up to 54% with BigQuery

    Migrate from Snowflake, Databricks, or Redshift with free migration tools. Exabyte scale without the Exabyte price.

    BigQuery delivers up to 54% lower TCO than cloud alternatives. Migrate from legacy or competing warehouses using free BigQuery Migration Service with automated SQL translation. Get serverless scale with no infrastructure to manage, compressed storage, and flexible pricing—pay per query or commit for deeper discounts. New customers get $300 in free credit.
    Try BigQuery Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1

    SPyMap Portscanner

    A python based portscanner, using scapy

    A portscanner written in python, using the scapy libraries. Originally intended to be a clone of Nmap, it is growing into its own creation, intended to be a part of a much larger project later on.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    SRAN-Anti-Virus Multi Format Anti Virus DataBase Easy to Use & More Detection Thai menu
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    STAT is a framework for building modular, stateful signature-based intrusion detection systems. STAT provides a means to develop sensors which operate in different domains and environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    STP

    MOVED TO GITHUB. Code here is STALE.

    THE STP CODE HAS MOVED TO GITHUB. THE CODE HERE IS STALE. PLEASE CHECKOUT THE FOLLOWING WEBSITE: http://stp.github.io/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Ship AI Apps Faster with Vertex AI Icon
    Ship AI Apps Faster with Vertex AI

    Go from idea to deployed AI app without managing infrastructure. Vertex AI offers one platform for the entire AI development lifecycle.

    Ship AI apps and features faster with Vertex AI—your end-to-end AI platform. Access Gemini 3 and 200+ foundation models, fine-tune for your needs, and deploy with enterprise-grade MLOps. Build chatbots, agents, or custom models. New customers get $300 in free credit.
    Try Vertex AI Free
  • 5

    SauceWalk Proxy Helper

    Enumeration and automation of file discovery for your sec tools.

    SauceWalk is a freeware(.exe)/Open Source(.py) tool for aiding in the enumeration of web application structure. It consists of 2 parts a local executable (walk.exe) and a remote agent. Walk.exe iterates through the local files and folders of your target web application (for example a local copy of Wordpress) and generates requests via your favourite proxy (for example burp suite) against a given target url. The remote agent can be used to identify target files and folders on a live system via a PHP script on the target server(ASP/JSP coming soon). The advantage of this tool is that it allows access to files and folders (for example include or plugin folders) which are not usually seen via a spider or crawler to be security tested with traditional tools. The Py version is on its way soon.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Secure Email List Services (SELS) provides software for private email discussion lists compatible with common email clients. SELS enables list members to exchange encrypted messages without exposing plaintext messages on the list server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    The Secure Remote Log Monitor (SRLM) project provides client and server utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Secure VPC Network Generator

    Secure VPC Network Generator

    Deploys a secure VPC on AWS with public/private subnets using Terraform. This tool provides a calculator and generator for AWS VPC Terraform configurations. It allows you to quickly scaffold a secure VPC with multiple subnets. Quick Start To use this tool, run the generator: bash # Generate a VPC with 3 subnets python lab_runner.py vpc-gen --cidr 10.10.0.0/16 --subnets 3 --output my_vpc.tf
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    SecureSandbox

    SecureSandbox

    EaseFilter Secure Sandbox Example

    EaseFilter Secure Sandbox was developed by a set of file system filter driver software development kit which includes file access control filter driver, transparent file encryption filter driver and process filter driver. The EaseFilter Secure Sandbox encompasses file security, file encryption, file monitoring, data loss prevention and process monitoring and protection. EaseFilter file system filter driver is a kernel-mode component that runs as part of the Windows executive above the file system. The EaseFilter file system filter driver can intercept requests targeted at a file system or another file system filter driver. By intercepting the request before it reaches its intended target, the filter driver can extend or replace functionality provided by the original target of the request. The EaseFilter file system filter driver can log, observe, modify, or even prevent the I/O operations for one or more file systems or file system volumes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 10
    SecureShareExample

    SecureShareExample

    EaseFilter File Secure Sharing Example

    EaseFilter DRM Secure File Sharing example was implemented with the Transparent File Encryption and Control Filter Driver SDK. The shared file was encrypted with a unique 256-bits key, store the file access policies in a central server, share the encrypted files with fully control. You can grant, revoke or expire the file access at any time, even after the file has been shared. Digital Rights Management (DRM) enforces how files can be viewed, copied, printed, shared, or modified. Instead of granting blanket access, DRM attaches enforceable usage policies to content. With EaseFilter DRM, you can: Restrict access to authorized users, devices, and applications only. Block forwarding, uploading to unauthorized cloud services, or syncing to personal drives. Apply time-based access (expiration dates) and geo/device restrictions. Maintain tamper-evident audit trails for compliance and forensics.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Security Advisor is a program designed to analyze and report security issues beyond application vulnerabilities. The program will analyze system and network configurations to recommend ways for improving security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Security Monkey

    Security Monkey

    Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs

    Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time. Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. Support is available for OpenStack public and private clouds. Security Monkey can also watch and monitor your GitHub organizations, teams, and repositories. It provides a single UI to browse and search through all of your accounts, regions, and cloud services. The monkey remembers previous states and can show you exactly what changed, and when. Security Monkey can be extended with custom account types, custom watchers, custom auditors, and custom alerters. It works on CPython 2.7. It is known to work on Ubuntu Linux and OS X. Security Monkey accesses accounts to scan via credentials it is provided.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Started as part of the Google Summer of Code 2005, this tool adjusts security settings on Linux systems, including firewall and SELinux policies. This tool aims to replace the system-config-securitylevel tool from Red Hat and Fedora Core systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The principal target of Segovia is to generate reports for a set of Security Testing tools. This reports show the different found vulnerabilities in a graphical way. Also they explain the most common reasons and the solution of these vulnerabilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A peer-to-peer chat program that uses public key encryption (via Gnu Privacy Guard) to keep your conversations from the eyes of packet sniffers (*Cough* Carnivore *Cough*)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Setra

    Password protected zip file cracker.

    Setra is a cross-platform command line utility used to brute-force password protected zip file. It is written in the Python programming language.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    ShaSeSha

    Implementations of Shamir's Secret Sharing algorithm

    Javascript, Python, C++ implementations of Shamir's Secret Sharing algorithm. This is very much a work in progress, and while the functionality is there to split and join, it needs work, cleanup, documentation, profiling and testing. It is only provided in the hopes it may be useful. I make absolutely NO guarantees or warranties, not even of merchantability, either expressed or implied, and do not make any claims about the security or reliability of this project. I do not authorize it's use for anything that is wrong or generally in violation of appropriate laws, or that infringe on other's rights.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    SharPyShell

    SharPyShell

    Tiny and obfuscated ASP.NET webshell for C# web applications

    SharPyShell is a tiny and obfuscated ASP.NET web shell that executes commands received by an encrypted channel compiling them in memory at runtime. SharPyShell supports only C# web applications that run on .NET Framework >= 2.0. SharPyShell is a post-exploitation framework written in Python. The main aim of this framework is to provide the penetration tester with a series of tools to ease the post-exploitation phase once exploitation has been successful against an IIS webserver. This tool is not intended as a replacement for the frameworks for C2 Server (i.e. Meterpreter, Empire, etc..) but this should be used when you land on a fully restricted server where inbound and outbound connections are very limited. In this framework, you will have all the tools needed to privesc, net discovery, and lateral movement as you are typing behind the cmd of the target server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Shell OS
    Build by Rajib Acharyya(Spid3r64) ANONIMITY Metasploit Armitage Cobalt Strike & veil WIRELESS SECURITY SNIFFERS PYTHON,PERL & RUBY FORENSICS BRUTE FORCE & DDOS ANDROID TOOLS Based on : Ubuntu 12.04 LTS(32bit) (Custom Backbox) user:root pass:india Kernel version =>3.8.0-29 generic Desktop environment's => xfce,conky,Docky Version 1.0(full) Extra Softwares inbuilt => Skype,Virtualbox,Filezila,Chromium Browser,XDM(Xtreme Download Manager) ,Gimp,Python...many more Credit List: Pedro Ubuntu(r00tsect0r) For Netool.sh Asif Iqbal (cobalt strike) w0lf3nst3in3 Rohit Verma(Startx) Navonil Sanpui(M3ghnath) Team BHS
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Soicmp is a remote shell system, similar to telnet or netcat that allows a user to connect to a remote shell daemon, by using ICMP protocol instead of classical TCP. http://soicmp.sourceforge.net/ http://billiejoex.altervista.org/Prj_Py_soicmp.shtml
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Sherlock Roams is a Python-based password auditing tool for Un*x-based systems. It uses a brute force approach on the shadow file (or the regular password file if that fails) to determine which users on your system have obviously insecure passwords.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Sigma

    Sigma

    Main Sigma Rule Repository

    Welcome to the Sigma main rule repository. The place where detection engineers, threat hunters and all defensive security practitioners collaborate on detection rules. The repository offers more than 3000 detection rules of different type and aims to make reliable detections accessible to all at no cost. Sigma is an open-source tool for defining generic detection rules for security event logs, enabling security professionals to detect threats across platforms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Signal Sciences Site Management Tool

    Signal Sciences Site Management Tool

    Signal Sciences Site Manager

    Signal Sciences Site Manager.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A simple security tool to test for the integrity of a computer installation. SdT constructs a signature of the current system state and checks installation state with a previously made signature. Is intended to work on a compromised system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The Simple Ubuntu Vulnerability Scanner lets you check an Ubuntu system for vulnerabilities.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB