Showing 70 open source projects for "drcom-for-linux"

View related business solutions
  • Employee monitoring software with screenshots Icon
    Employee monitoring software with screenshots

    Clear visibility and insights into how employees work. Even remotely.

    Stay productive working at any distance from anywhere with Monitask.
  • SKUDONET Open Source Load Balancer Icon
    SKUDONET Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    SKUDONET ADC, operates at the application layer, efficiently distributing network load and application load across multiple servers. This not only enhances the performance of your application but also ensures that your web servers can handle more traffic seamlessly.
  • 1
    FHAP is a web front-end to the nmap port scanner. It makes use of Perl and a PostgreSQL database to identify system/port trends on a network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    A Lightweight P2P Threat Analysis Bus
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    The Aleph project is a simple Web API for using an access control list composed of OpenIDs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    This software is a set of tools that hides C source code in txt files. Also the software is able to restore the txt files to C source code again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
    Downloads: 0 This Week
    Last Update:
    See Project
  • AlertBot: Website Monitoring of Uptime, Performance, and Errors Icon
    AlertBot: Website Monitoring of Uptime, Performance, and Errors

    For IT Professionals and network adminstrators looking for a web application monitoring solution

    AlertBot monitors your website's full functionality around the clock so you can focus your time on more important things.
  • 5
    The CredentialCompiler suite compiles the site credentials in grid environments from several LDAP databases. It is possible to feed the credentials in both UNICORE- and Globus-based systems, based on site-specific rules.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    HoneyC is a low interaction client honeypot / honeyclient that allows identify rogue servers on the web.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Open Identity Management (OIDM)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    RubyHtpasswd - Htpasswd apache files class writen in Ruby language Features: - Add Users - Change Password - Rename users - Delete users - Display errors messages - Get encrypted passwords from the file - Get an users list
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    xmlsig is a multi-language, multi-platform implementation of XML signatures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Innovate faster with enterprise-ready generative AI—enhanced by Gemini Icon
    Innovate faster with enterprise-ready generative AI—enhanced by Gemini

    Build, deploy, and scale machine learning (ML) models faster, with fully managed ML tools for any use case.

    Vertex AI offers everything you need to build and use generative AI—from AI solutions, to Search and Conversation, to 130+ foundation models, to a unified AI platform.
  • 10
    FatNS Analyzes and Tests Name Servers. It is a PCAP-based security tool intended to sniff and detect common attacks on the DNS system, and is designed to be easily expandable with additional attack detectors.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Download code, Learn code, Share code. The Ongoing Object-oriented Perl Project. scripts, tutorials, modules, case studies, anything OOPerl --not excluding contributions of OO discipline in other programming languages.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Tattoo will provide a set of command-line scripts for analyzing raw tcpdump files or ASCII hexadecimal representations of network traffic to identify format, function, and communication model.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The Registry Server (jUDDI) offers a mechanism for humans or software applications to advertise and discover Web services. The Java Web Services Developer Pack (Java WSDP) Registry Server implements Version 2 of the Universal Description, Discovery and I
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Security analysis tools produced by The Ohio State University Network Security Group.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    LinuxBSM-2 introduces auditing features in Linux kernel to achieve better security and keep an eye on system activities. Any kernel-derived data can be audited.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    REMO is short for Rule Editor for MOdsecurity. Modsecurity is an application level firewall for the apache webserver. Remo aims to make modsecurity configuration easier.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    cinderella is a prototype for a network intrusion detection system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Cryptopus
    Cryptopus is a ruby on rails web application for storing and sharing passwords and other sensitive data. All data is stored encrypted in a database, safe from third party access.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Unsploitable

    Automatically Patch Metasploitable Vulnerabilities

    Unsploitable is an emergency patcher, providing critical security patches and updates for commonly exploited vulnerabilities in common operating systems, services, and applications. Unsploitable specifically targets exploits provided by penetration testing frameworks such as Metasploit. Unsploitable is tool for the Metasploit Framework. Unsploitable should work with any MSF product (including: OpenSource, Express, or Pro).
    Downloads: 0 This Week
    Last Update:
    See Project