Open Source Windows Security Software - Page 68

Security Software for Windows

View 1532 business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 1
    Clipperz Password Manager
    Clipperz is a web based password manager. Local encryption within the browser guarantees that no one except you can read your data. A true zero-knowledge (or host-proof) web app!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Cloud Custodian

    Cloud Custodian

    Rules engine for cloud security, cost optimization, and governance

    Cloud Custodian enables users to be well managed in the cloud. The simple YAML DSL allows you to easily define rules to enable a well-managed cloud infrastructure, that's both secure and cost-optimized. It consolidates many of the ad-hoc scripts organizations have into a lightweight and flexible tool, with unified metrics and reporting. Custodian supports managing AWS, Azure, and GCP public cloud environments. Besides just providing reports of issues, Custodian can actively enforce the security policies you define. Setup off-hours to save you money, by turning-off resources when they're not being used. Garbage collects unused resources by looking into utilization metrics. Custodian can be run locally, on an instance, or Serverless in AWS Lambda. Cloud Custodian is open source and free for everyone to use. Use Custodian to build complex workflows or simple queries, millions of policies can be constructed using our easy-to-read DSL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    CloudBrute

    CloudBrute

    Awesome cloud enumerator

    A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, Linode). The outcome is useful for bug bounty hunters, red teamers, and penetration testers alike. While working on HunterSuite, and as part of the job, we are always thinking of something we can automate to make black-box security testing easier. We discussed this idea of creating a multiple platform cloud brute-force hunter.mainly to find open buckets, apps, and databases hosted on the clouds and possibly app behind proxy servers. Cloud detection (IPINFO API and Source Code) Supports all major providers. Black-Box (unauthenticated). Fast (concurrent), modular and easily customizable, cross Platform (windows, linux, mac), user-agent randomization, proxy randomization (HTTP, Socks5).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    CloudFoundry UAA

    CloudFoundry UAA

    CloudFoundry User Account and Authentication (UAA) Server

    The UAA is a multi tenant identity management service, used in Cloud Foundry, but also available as a stand alone OAuth2 server. Its primary role is as an OAuth2 provider, issuing tokens for client applications to use when they act on behalf of Cloud Foundry users. It can also authenticate users with their Cloud Foundry credentials, and can act as an SSO service using those credentials (or others). It has endpoints for managing user accounts and for registering OAuth2 clients, as well as various other management functions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 5
    CloudKey is a multi-user password manager. It allows multiple users to store passwords, PINs, usernames, etc... in a searchable database for retrieval from anywhere. Project still in development, not all features are available yet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    CloudSafe

    CloudSafe

    Smart and safe cloud-based credential manager

    CloudSafe is a credential manager that can store all your access informations (applications, sites, gadgets, ...), in your Google Drive account: all data are encrypted with a master password (AES-128) and all netowork operations are protected by your Google Account and HTTPS connections. The source code is open and you are free to check the security solution.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Clouseau for SQL Server is designed to aid system administrators (SAs) and Microsoft SQL Server database administrators (DBAs) in the identification and resolution of various vunerabilities found within Microsoft's enterprise database server:
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Cnc's IP Data Volume Report

    Logs IP to IP contact, number of packets, bytes.

    Cnc's IP Data Volume Report: Logs IP to IP contact, number of packets, bytes, time of contact, Ethernet too! View via local web interface. Very simple for those who want to view who your computer is contacting the most!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    CoDec is a Java package for encoding and decoding ASN.1 data structures. CoDec supports the Basic Encoding Rules (BER) as well as the Distinguished Encoding Rules (DER) and provides a library with data structures for many cryptographic standards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Add Two Lines of Code. Get Full APM. Icon
    Add Two Lines of Code. Get Full APM.

    AppSignal installs in minutes and auto-configures dashboards, alerts, and error tracking.

    Works out of the box for Rails, Django, Express, Phoenix, and more. Monitoring exceptions and performance in no time.
    Start Free
  • 10
    Web Server Protection and Analysis Tool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Code Honor

    Code Honor is a software which gives you privacy in keeping your text

    Code Honor is a software which gives you privacy in keeping your text file which you do not want to share with everyone. But the speciality lies here. It does not hide or simply puts a password rather it changes your text into numbers you assign which again can be converted back into normal text. The application of this software is that when you need to share your text publicly keeping its privacy preserved.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A criteria selection for guiding and assuring activities concerned with the analysis of digital evidence, It covers legal, police and operational aspects. It is not a technical manual for computer forensic analysis, It is a criteria-based manual.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this program has a graphical user interface, an Enigma like subsystem must be devised for data whitening. For content encryption, the use of Java's facilities is being considered as a long term option. This project's initial sourcecode is related to : http://www.fourmilab.ch/codegroup/ http://winmorse.com/ https://bitbucket.org/bgneal/cpp-enigma http://www.whence.com/minimodem/ For the User Interface http://www.oracle.com/technetwork/java/javafx/tools/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Codex - Password Manager

    Codex - Password Manager

    Administrador de contraseñas para todas sus cuentas. Fácil y seguro.

    Codex nació para una presentación final de OOP. La idea principal es diseñar una forma fácil y segura de administrar sus cuentas web, con herramientas como ezLink y copiar / pegar doble clic hace que su fecha sea más segura de usar, ver y guardar. Está hecho en C ++ y se actualizará pronto para la gestión web y más.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A small program designed to code and decode strings of letters based on DNA.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This project is designed to further enhance a method of encrypting URL variables in Cold Fusion Applications. The application itself is not the main bulk of the project. The main bulk of the project is the encryption and decryption routines that go on i
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    CommCA - A Community-driven Certificate Authority for distribution of free X.509 digital certificates for personal email and server use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Commando
    Commando is a military-grade secure communication system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    DISCONTINUATION OF PROJECT. This project will no longer be maintained by Intel. Intel will not provide or guarantee development of or support for this project, including but not limited to, maintenance, bug fixes, new releases or updates. Patches to this project are no longer accepted by Intel. If you have an ongoing need to use this project, are interested in independently developing it, or would like to maintain patches for the community, please create your own fork of the project. ====>Due to the age of the code, the cryptography should not be used in any new products.<==== This repository may be deleted on or after June 30, 2020. CDSA is a security middleware specification and reference implementation that is open source, cross-platform, interoperable, extensible, and freely exportable
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Common role (ComoRo) lets you manage all roles for your applications in a centralized way, being the natural extension to single-sign-on (sso). Comoro recommends the use of a SSO system, like CAS.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    e3 = jabber + java + plugins + svg ||| web start link: http://complat.sourceforge.net/jnlp
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    CompLock will lock your computer COMPLETELY, only allowing access to the letters and numbers,for password. There is also a option that will lock all access to computer, and should stop remote access from controlling your computer.Beta 1/30/09 report bugs
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Compare Backup Drive Hashes

    A spreadsheet to aid in detecting ransomware-corrupted files

    This project offers an Excel spreadsheet, available for download through the Files tab (above). The spreadsheet allows the user to compare two sets of file hashes, such as the hashes for files on two different data drives. The spreadsheet's Instructions tab provides step-by-step guidance through that comparison process. The purpose of the file hash comparison is to identify files whose contents have changed. For example, the files on an up-to-date data drive may be compared against the files previously found on that data drive, or on a backup drive. Identifying changed files may be useful as a precaution against ransomware. The Support tab (above) links to a blog post discussing uses of the spreadsheet for that purpose. See also https://raywoodcockslatest.wordpress.com/2022/04/10/ransomware-spreadsheet/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Compensato
    Compensato is full suite of diagnostic and troubleshooting tools (focused on troubleshooting Windows environments at the moment) that runs from an Ubuntu based Linux live environment. Once booted a browser winow will launch and the program will automatically look for a Windows installation to work with. You should be able to have this Windows installation visible to the system either internally or externally.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Complex Password Generator 2.3

    Complex Password Generator 2.3

    Generates complex passwords for use in your different accounts.

    Generates very complex passwords for use in your various different accounts so you know they are safe. You can even generate a list of random passwords and export them to a txt file! You can run this program on the homepage, but for more features I suggest that you download it.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB