Get Avast Free Antivirus with 24/7 AI-powered online scam detection
Get protection for today’s online threats. Free.
Award-winning antivirus protection, as well as protection against online scams, dangerous Wi-Fi connections, hacked accounts, and ransomware. It includes Avast Assistant, your built-in AI partner, which gives you help with suspicious online messages, offers, and more.
Free Download
Simplify IT and security with a single endpoint management platform
Automate the hardest parts of IT
NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints for more than 20,000 customers.
The NinjaOne automated endpoint management platform is proven to increase productivity, reduce security risk, and lower costs for IT teams and managed service providers. The company seamlessly integrates with a wide range of IT and security technologies. NinjaOne is obsessed with customer success and provides free and unlimited onboarding, training, and support.
Pace-IDS is an Intrusion Detection system designed to replace Tripwire, in that it is faster, and more effective of detecting trojan activity, and is easier to configure. All you have to do usually is simply change one variable to your email address.
Pace Check is a utility that searches through system logs and finds cases where someone has tried to gain access to your server (non-legit), then it saves them to a log, mails them to you, or sends them to stdout. It supports http, ftp, and others.
The Registry Server (jUDDI) offers a mechanism for humans or software applications to advertise and discover Web services. The Java Web Services Developer Pack (Java WSDP) Registry Server implements Version 2 of the Universal Description, Discovery and I
Found at www.itadmins.net in the Projects area. The complete Linux Administrators CD. For normal system and network administration, security, forensics tools and utilities.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
secheck is a script which imitates currently existing log checkers but with a focus on security. secheck does some basic system security checking, then emails to output to a given user.
Packet2sql will convert any text file/log file which contains ipchains packet logs into a stream of SQL inserts which can be used as the base for a firewall-analyzing database application.
rcf is an ipchains-based firewall with support for over 50 protocols, masquerading, portforwarding, IP accounting and various protections. Unlimited public, private, DMZ and MZ interfaces are supported. Rules are defined per interface and DMZ/MZ clusters.
AVUpdate is an script-package to automatically update the
AntiVir antivirus Software from H+BEDV on Linux/BSD Machines for
which H+BEDV haven't created an auto-updater.
The scripts can also update the antivir-Tree for the Antivir/Win-Feature "Intrane
MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
rTables was written primarally for security reasons and it's main purpose is firewalling. The tables are easily defined via user settable variables, thus making rTables very easy to configure. rTables also contains support for an "untrusted" LAN a
Bypass is an IP forwarding/tunneling tool which can be used where limited bypassing of a firewall is necessary, but relaxing the restrictions in the actual firewall is not an option. The aim is for bypass to be automatic and transparent.
Unsploitable is an emergency patcher, providing critical security patches and updates for commonly exploited vulnerabilities in common operating systems, services, and applications.
Unsploitable specifically targets exploits provided by penetration testing frameworks such as Metasploit.
Unsploitable is tool for the Metasploit Framework. Unsploitable should work with any MSF product (including: OpenSource, Express, or Pro).
Defensive Tools For The Blind (DTFTB) is a collection of Windows and Linux tools that automate: post exploitation, backdoor, and rouge access discovery, for defenders.
DTFTB allows a system defender to quickly and precisely locate common backdoor tendencies and system misconfigurations used by an attacker to maintain access.
Additionally DTFTB provide automated access-denial tools, that prohibit the introduction of new backdoors to a system.
DTFTB is primarily geared towards CTF...
AttackTreeMonkey is an XSLT script that calculates values in an attack tree (using Libxslt or Saxon) and outputs XHTML. Attack trees are a way of modelling security systems and how they fail (see Bruce Schneier in Dr Dobbs Journal; 1999).
Open-source tool for Linux that can be used as part of live information gathering during an incident response to allow for after the fact in depth analysis of the running system.
Makes it easier to build a Linux system where the whole hard drive is encrypted (except for the MBR), and where the system must be booted from a USB memory stick which holds slightly customized boot code and the passphrase-protected keys.
Ldapmenu is a tool for managing an LDAP database for PSOIX users. It works in Linux, Sun, Tru64, HP-UX all from one console. It offers user/group/host/application management. This is a tool but also contains OpenLDAP setup instructions.