Open Source Server Operating Systems Security Software - Page 3

Security Software for Server Operating Systems

  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Advisory Check is a tool for monitoring the security of installed software. It gathers security advisories using RSS/RDF/XML feeds, compares them against a list of known software, and alerts you if you're vulnerable. Let advchk read advisories for you!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Generic clustering/load-balancing platform (over a LAN or internet) using java based P2P Aorta workers that execute java "tasklets". Various tasklets can be implemented to solve fractals, process images, render webpages, crack RSA "brute force".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A security scanner coded in a tcl/tk extension for use with linux and unix systems . It automatically downloads patches and exploits how ever testing of them is left up to the user for security reasons
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Small C# web-application for single-sign-in based on B2XCore. Support of multiple security-provider.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    Another open sourced crypto library. Unlike Crypto++ and cryptix, we're language independent. We originate in 'C', add wrappers for C++ and Objective-C. When that works, we provide a JNI wrapper for Java. Following this, we seek out Python,
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Bellator

    Bellator

    Security Audit Tool

    Security Audit Program for Microsoft Windows System
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Bisker is a simple cgi scanner written in C language for GNU/linux platforms. It's an useful tool to find critical or dangerous cgis/folders/files on local and remote machines (also through proxy).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    BizTalk components for e-Invoice Set of add-on components, such as pipeline-components to address e-Invoice specific needs in the supply-chain sollution.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This program allows you to establish cryptographically secure and decentraliced conversations over untrusted telecommunication links and IRC networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 10
    Corporate Data Protection and Network Security is a IT project targeting policy-based and fully-automated data protection, encryption and transmission. We plan to create self-diagnostic risk-predict enterprise environment with artificial intelligence.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Servlet container extensions that help web developers write full featured Java web applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Set of perl scripts to analyse and check expiration of user certificates in Microsoft Windows Certification Authority. Output is in HTML with list of expiration state of latest user certificates. Expirated are marked. List can be sent by e-mail.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Cnc's IP Data Volume Report

    Logs IP to IP contact, number of packets, bytes.

    Cnc's IP Data Volume Report: Logs IP to IP contact, number of packets, bytes, time of contact, Ethernet too! View via local web interface. Very simple for those who want to view who your computer is contacting the most!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Cobrax trojan

    Cobrax Trojan - 1.0

    Troyano de conexion inversa desarrollado en C++ & Visual Basic 6.0, con codigo abierto.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Derived from TrueCrypt 6.3 release, I added some command line options to "TrueCrypt Format.exe" to allow TrueCrypt volumes to be created without using the graphical user interface
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A WordPad-like cryptography program. Includes AES, RC4, Skipjack, Twofish, Blowfish, CryptAPI, DES, Gost, XOR, and TEA.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    CryptoPy is a pure python implmentation of cryptographic algorithms and applications. The algorithms are developed for readability more than speed. The collection now includes IEEE 802.11i specific algorithms that generated the test vectors for 802.11i.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Cryptofon

    Cryptofon

    Cryptofon - a safe phone with integrated encryption.

    The Cryptofon is designed to enable safe and secure communication trough a regular PSTN line. It supports narrowband connections (~2400 bit/s and lower).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    DAD is a Windows event log and syslog management tool that allows you to aggregate logs from hundreds to thousands of systems in real time. DAD requires no agents on the servers or workstations. Correlation and analysis is driven through a web front end.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    DB_eSession class securely stores PHP sessions in a MySQL Database with lots of incorporated features for Internet or Intranet use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    DNAOnline is a web front-end to the DNA® (Distributed Network Attack®) decryption software from AccessData Corporation. It was developed by the E-Crime Investigative Technologies Lab at FSU and supported in part by NIJ grant 2005-DE-BX-K034.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    ns-slapd plugin to perform pass-through authentication of LDAP users to NT domain controllers (based on the ntUserDomainID attribute).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    The Dashboard Linux PC Project. A Linux UI for automobile multimedia. To be used for MP3's, GPS, DVDs, CD, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    This tool will query againt mssql to find any occurance of string in a database. This will help system admin to locate if any, malicious scripted had been injected to the database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    OpenPGP Keyserver written in ASP.NET (C#) This keyserver is not designed to synchronise with other servers. Suitable for deployment within a windows based organisation where sharing keys with internet keyservers is not required/desirable.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB