Open Source Windows Security Software - Page 32

Security Software for Windows

View 1532 business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 1
    ComboFix

    ComboFix

    Scan for and remove malware and spyware

    Combofix is a freeware program that scans and removes malware and spyware from computers running Windows XP, Vista, 7, and 8. It was created by sUBs and is designed for advanced users. Combofix can remove malware that other products cannot. It backs up your registry hives, quarantines files, and creates a log of its actions.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 2
    Embeds text and files in images with optional encryption. Easy-to-use UI, error reporting, and self-update (beta)
    Leader badge
    Downloads: 11 This Week
    Last Update:
    See Project
  • 3
    Open-Hashtool

    Open-Hashtool

    Comfortable hash-tool for texts and files

    Open-Hashtool is an easy2use Qt based application, which can be used to calculate the hash (MD4; MD5; SHA-1; SHA-224; SHA-256; SHA-384; SHA-512; SHA3-224; SHA3-256; SHA3-386; SHA3-512) of texts and files. It's compatible with Windows and Linux. But Linux users need Qt5.1 or Wine (configuration: Windows Version <= Windows 2008) to run the Open-Hashtool. Please read the Wiki for compiling instructions.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4

    PwnPi

    A Pen Test Drop Box distro for the Raspberry Pi

    PwnPi is a Linux-based penetration testing dropbox distribution for the Raspberry Pi. It currently has 200+ network security tools pre-installed to aid the penetration tester. It is built a stripped down version of the Debian Wheezy image from the Raspberry Pi foundation's website and uses Openbox as the window manager. PwnPi can be easily setup to send reverse connections from inside a target network by editing a simple configuration file.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5
    SSL Diagnos

    SSL Diagnos

    SSL Strength Evaluation and Test Utility

    SSL Diagnos is used to test SSL strength; get information about SSL protocols (pct, ssl2, ssl3, tls, dtls) and cipher suites. It can also be used for testing and rating ciphers on SSL clients. It has also specific support for pop3s, sip, smtp and explicit ftps. Tests for heartbleed (including dtls). Furthermore a separate tool, SSLPressure, not using openssl can be used to check the whole spectrum of possible SSL protocols on a server. Can also be used for testing ssl for mssql-servers (was added since nessus did not support this) and contains mitm poc for stripping ssl from mssql-connections.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    USB Paranoiac

    USB Paranoiac

    USB Security Scanner on Linux

    This program allows you to examine suspicious USB storage devices before plugging them into your Windows computer. This is not an antivirus; it does not have heuristic or automatic detection-cleanup features. Just so you know, executable files are worth your attention. You decide whether they're dangerous or not. https://github.com/shampuan/USB-Paranoiac
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Web Application Protection

    Web Application Protection

    Tool to detect and correct vulnerabilities in PHP web applications

    WAP automatic detects and corrects input validation vulnerabilities in web applications written in PHP Language (version 4.0 or higher) and with a low rate of false positives. WAP detects the following vulnerabilities: - SQL injection using MySQL, PostgreSQL and DB2 DBMS - Reflected cross-site scripting (XSS) - Stored XSS - Remote file inclusion - Local file inclusion - Directory traversal - Source code disclosure - OS command injection - PHP code injection WAP is a static analysis tool that performs taint analysis to detect vulnerabilities, tracking malicious users inputs and checking if they reach calls of sensitive functions. It has a low rate of false positives because has implemented a data mining module to predict false positives when detects vulnerabilities. The output of the tool is: - shows the vulnerabilities found and how they are corrected - new files with the corrections
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    XorCryptWin

    XorCryptWin

    XOR Encryptor for Windows

    XOR encryption software for Windows. Generates random key files which it then uses to mimic the One-Time Pad encryption technique. Distributed together with RandFileGen, a program that can generate random files of any size and is extensible by plugins.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    Archive Extractor
    To use this tool, you need to have WinRar installed at the path "C:\Program Files\WinRAR" (which is typically set by default). Alternatively, you can have 7z installed at the path "C:\Program Files\7-Zip" (this is usually set by default as well). Please note that if you only have 7z installed, you will not be able to extract .rar files, but only .zip or .7z files. This tool is primarily designed to extract files from password-protected Rar/Zip/7z archives, although it also works on unprotected archives. You can extract one or more archives of different types at a time. It is important to note that the passwords must be known; this is NOT a "cracking software" or "password recovery tool."
    Downloads: 8 This Week
    Last Update:
    See Project
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 10
    ClamSentinel Portable

    ClamSentinel Portable

    ClamSentinel Portable is a real-time scanner for ClamWin Portable

    Original author: Andrea Russo and Robert Scroggins ClamSentinel Portable is ClamSentinel, configured and launched according to the PortableApps.com Format. It uses ClamWin's virus database, so ClamWin is required. If you have ClamSentielPortable next to ClamWinPortable, then ClamSentinel will detect ClamWin's database. For example, if ClamSentinelPortable is installed in folder A (/A/ClamSentinelPortable/App,etc) and ClamWinPortable is also in folder A (/A/ClamWinPortable/App,etc), then it will detect it.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 11

    CryptKeeper

    Encryption/Decryption Application

    Basic text file encryption & decryption. Can encrypt text files with or without formatting. CryptKeeper is the upgraded version of EnCREEPtor.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 12
    Ghost of Death
    Ghost of Death is an app to spoof your OS. It's meant to spoof scanning apps, like nmap or Metasploit. You must be admin/root. 2-28-26: Addressed a couple of bugs. Totally reworked Linux version. This app won't get a perfect match in the spoof, but it won't let them know your OS. 3-1-26: Tweaked on the Linux version some more. 3-2-26: That last Linux version was messed up, new one works, theoretically. 3-3-26: After much labor it's done. It has Windows, Mac and Android now. Windows comes closest for the spoof, but none of the profiles will let them know your running Kali.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 13
    A project that creates dummy ports and reports to the user when a connection is made. These dummy ports can have a fake service which tricks port scanners. Also, the user is notified when they are being port scanned or being DoS'd
    Downloads: 8 This Week
    Last Update:
    See Project
  • 14
    IP Availability Scanner

    IP Availability Scanner

    Fast IP and Port Scanner

    This utility efficiently scans IP addresses and gathers host names and MAC addresses. It offers the capability to export scan results and includes features for port scanning of selected hosts. Enhanced with a multithreaded framework, the tool delivers increased speed, supporting functionalities like trigger actions and banner grabbing during port scans. For more advanced options, right-click on the displayed grids. This context menu includes options for port scanning, copying results, and network diagnostics tools like ping and traceroute. Additionally, it allows for easy access to ports using standard protocols such as SSH. A convenient feature is the ability to quickly identify the manufacturer of a MAC address with a simple mouse click. Moreover, the interface is user-friendly, enabling sorting of information by simply clicking on the column headers in the display grid. For more information, visit https://vonwallace.com Video Overview: https://rumble.com/v51z6o3-fas
    Downloads: 8 This Week
    Last Update:
    See Project
  • 15

    JPEG Metadata Remover Stripper

    View and remove fingerprint / tracking metadata from JPEG/JPG files.

    Easy way to remove all metadata from a JPG/JPEG image file. The program creates a shortcut in the right click Send-To menu. When a file is right-clicked, use Send-To > JPEG Stripper to open the program. Supports selecting multiple files. When multiple files are selected, then clicking JPEG Stripper will automatically strip the metadata from all selected files without the dialog box popping open. There is an option to create new copies of files, or overwrite the existing files. The image quality is completely preserved, the image binary data itself is not modified at all, only the metadata is stripped. The executable is compiled for .NET 4.5.2.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 16
    The JPass.org project relates to the development of a system for authenticating user's identity, more specifically, for providing identity authentication methods using non-reusable and non-reversible one-time IDs.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 17
    KeyCounter is a tool for the tray-bar that helps you to get statistics about the useage of your computers keyboard, mouse and uptime. KeyCounter is not intended to work as a keylogger.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 18
    The OVAL Utilities are a set of utilities for manipulating content written in the OVAL Language. These are general utilities that will assist anyone in using OVAL content.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 19
    ISP Toolz is providing the SLC Enterprise Security console for snort. Supports Cisco pix, snort and intruvert natively. Building additional support and API for additional device support. This is the open source version of our commercial software. This op
    Downloads: 8 This Week
    Last Update:
    See Project
  • 20
    SRAN-Anti-Virus Multi Format Anti Virus DataBase Easy to Use & More Detection Thai menu
    Downloads: 8 This Week
    Last Update:
    See Project
  • 21
    Smart-Card-Tool-pyResMan

    Smart-Card-Tool-pyResMan

    A free opensource javacard tool for java card and other smart card.

    pyResMan is a free open source smartcard tool for JavaCard and other smart card. It can be used to send APDU(s), execute APDU script(s); It can be used to debug ISO14443 protocol commands and Mifare commands with R502 SPY reader; It can also be used to manage resource of GP card. It is based on pyScard and GlobalPlatform open source projects. For more details, you can visit:
    Leader badge
    Downloads: 8 This Week
    Last Update:
    See Project
  • 22
    Velo is an open Identity and Access Management platform, with many IDM services such as provisioning, access control, password synchronization, audit & compliance, self service interfaces and much more.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 23
    WebSploit Framework

    WebSploit Framework

    WebSploit is a high level MITM Framework

    WebSploit Advanced MITM Framework [+]Autopwn - Used From Metasploit For Scan and Exploit Target Service [+]wmap - Scan,Crawler Target Used From Metasploit wmap plugin [+]format infector - inject reverse & bind payload into file format [+]phpmyadmin Scanner [+]CloudFlare resolver [+]LFI Bypasser [+]Apache Users Scanner [+]Dir Bruter [+]admin finder [+]MLITM Attack - Man Left In The Middle, XSS Phishing Attacks [+]MITM - Man In The Middle Attack [+]Java Applet Attack [+]MFOD Attack Vector [+]ARP Dos Attack [+]Web Killer Attack [+]Fake Update Attack [+]Fake Access point Attack [+]Wifi Honeypot [+]Wifi Jammer [+]Wifi Dos [+]Wifi Mass De-Authentication Attack [+]Bluetooth POD Attack Project In Github : https://github.com/websploit
    Downloads: 8 This Week
    Last Update:
    See Project
  • 24
    White Knight

    White Knight

    Machine Shutdown Security Tool

    Knock down your server into full disk encryption when a user attempts to physically attack your hardware via USB. This project seeks to provide a quick any easy low overhead solution that will shut your computer down to trigger your full disk encryption before an unsophisticated adversary has time to extract sensitive data. News: Alpha 0.04 Hotfix Update - Passwords now work! - Successfully tested against USB Rubber Ducky! This release I worked on building out a class that can be used to start offensive attacks on the target USB. Two options have been enabled for this release, the ability gather a log of all files on the incoming device & the ability to calculate the SHA1 of the incoming drive's files. I have some really cool things planned for upcoming releases that will hopefully include user defined file injection onto suspect USB. For now, if you enable logging files will be dropped into C:\ Upcoming: - Better Passwords - User Defined Counter Attacks
    Downloads: 8 This Week
    Last Update:
    See Project
  • 25
    YACP - Yet Another Cypher Project
    Downloads: 8 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB