Showing 45 open source projects for "cd"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1

    Antivirus Live CD

    4MLinux fork including ClamAV scanner

    Antivirus Live CD is an official 4MLinux fork including the ClamAV scanner. It's designed for users who need a lightweight live CD, which will help them to protect their computers against viruses. Ethernet, WiFi, PPP and PPPoE are supported by Antivirus Live CD to enable automatic updates of its virus signature databases. All partitions are mounted during the boot process so that they can be scanned by ClamAV.
    Leader badge
    Downloads: 198 This Week
    Last Update:
    See Project
  • 2
    Terrascan

    Terrascan

    Detect compliance and security violations across Infrastructure

    Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure. As you embrace Infrastructure as Code (IaC) such as Terraform, Kubernetes, Argo CD, Atlantis and AWS CloudFormation, it is important to ensure that security best practices and compliance requirements are observed. Terracan provides 500+ out-of-the-box policies so that you can scan IaC against common policy standards such as the CIS Benchmark. It leverages the Open Policy Agent (OPA) engine so that you can easily create custom policies using the Rego query language. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    nuclei

    nuclei

    Fast and customizable vulnerability scanner based on simple YAML

    Nuclei is used to send requests across targets based on a template, leading to zero false positives and providing fast scanning on a large number of hosts. Nuclei offers scanning for a variety of protocols, including TCP, DNS, HTTP, SSL, File, Whois, Websocket, Headless etc. With powerful and flexible templating, Nuclei can be used to model all kinds of security checks. We have a dedicated repository that houses various type of vulnerability templates contributed by more than 300 security...
    Downloads: 52 This Week
    Last Update:
    See Project
  • 4
    Kubescape

    Kubescape

    Kubescape is an open-source Kubernetes security platform for your IDE

    An open-source Kubernetes security platform for your clusters, CI/CD pipelines, and IDE that seperates out the security signal from the scanner noise. Kubescape is an open-source Kubernetes security platform, built for use in your day-to-day workflow, by fitting into your clusters, CI/CD pipelines and IDE. It serves as a one-stop-shop for Kubernetes security and includes vulnerability and misconfiguration scanning.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    Splunk Attack Range

    Splunk Attack Range

    A tool that allows you to create vulnerable environments

    The Splunk Attack Range is an open-source project maintained by the Splunk Threat Research Team. It builds instrumented cloud (AWS, Azure) and local environments (Virtualbox), simulates attacks, and forwards the data into a Splunk instance. This environment can then be used to develop and test the effectiveness of detections.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    ScubaGear

    ScubaGear

    Automation to assess the state of your M365 tenant against CISA

    ScubaGear is a PowerShell-based assessment tool developed by CISA to verify that Microsoft 365 tenant configuration aligns with Secure Cloud Business Application (SCuBA) baselines. It automates scanning of M365 environments like Exchange, Defender, Teams, and SharePoint, and outputs compliance reports to help administrators align with best practice security configurations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    RBAC Manager

    RBAC Manager

    A Kubernetes operator that simplifies the management of Role Bindings

    RBAC Manager is designed to simplify authorization in Kubernetes. This is an operator that supports declarative configuration for RBAC with new custom resources. Instead of managing role bindings or service accounts directly, you can specify a desired state and RBAC Manager will make the necessary changes to achieve that state.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Step Certificates

    Step Certificates

    A private certificate authority (X.509 & SSH) & ACME server

    ...Get a public key infrastructure and certificate authority running in minutes. Automate enrollment using ACME, OIDC, one-time tokens, cloud APIs and more. Use systemD timers, daemon mode, cron jobs, CI/CD, and more to automate certificate management. Build and operate systems using secure open standards (e.g. X.509, mTLS, JWT, OAuth, OIDC). step-ca is an online certificate authority for secure, automated certificate management. For people, in exchange for single sign-on ID tokens. For hosts, in exchange for cloud instance identity documents. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    gopass

    gopass

    The slightly more awesome standard unix password manager for teams

    ...By default your credentials are encrypted with GPG and versioned in git. This can be customized easily. The primary interface is the command line, making it an excellent choice for CLI fans, CI/CD systems or anything you can hook it up with. Gopass can also integrate with your browser so you can largely avoid the command line - if you want. gopass can operate without any dependencies but most users will use it with gpg and git. An external editor is required to use gopass edit. The same user experience on Linux, MacOS, *BSD or Windows. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Application Monitoring That Won't Slow Your App Down Icon
    Application Monitoring That Won't Slow Your App Down

    AppSignal's Rust-based agent is lightweight and stable. Already running in thousands of production apps.

    Full APM with errors, performance, logs, and uptime monitoring. 99.999% uptime SLA on the platform itself.
    Start Free
  • 10
    SIPVicious

    SIPVicious

    Security tools that can be used to audit SIP based VoIP systems

    SIPVicious OSS has been around since 2007 and is actively updated to help security teams, QA and developers test SIP-based VoIP systems and applications. Open-source security suite for auditing SIP based VoIP systems. Also known as friendly-scanner, it is freely available to help pentesters, security teams and developers quickly test their SIP systems. Download the latest source code from git or the latest release, send pull requests and open issues. Install the latest and greatest release...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Tailsnitch

    Tailsnitch

    A security auditor for Tailscale configurations

    ...It outputs structured reports on findings with severity levels and remediation guidance, and it can generate results in formats like JSON for downstream analysis and integration with CI/CD pipelines. Tailsnitch supports authentication via the Tailscale API (including OAuth or API keys) and provides options to filter findings, run only high-severity checks, and produce compliance artifacts like SOC 2 evidence exports.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Kubernetes Network Policy Recipes

    Kubernetes Network Policy Recipes

    Example recipes for Kubernetes Network Policies that you can just copy

    ...The recipes scale from simple “deny all traffic by default” policies to more advanced micro-segmentation patterns for multi-tier apps (frontend/backends) and platform-level isolation for CI/CD systems or service meshes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    SecretScanner

    SecretScanner

    Find secrets and passwords in container images and file systems

    ...Sometimes developers use default secrets or leave hard-coded secrets such as passwords, API keys, encryption keys, SSH keys, tokens, etc. in container images, especially during rapid development and deployment cycles in CI/CD pipeline. Also, sometimes users store passwords in plain text.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    AIAST

    AIAST

    AIAST –An advanced interactive application security tool

    ...Seamlessly integrate into CI/CD and can be applied in both application development phase and application deployment phase. By using instrumentation technique, Interactive Application Security Testing (IAST) combines the virtues of DAST – low false positive rate – and SAST – code level visibility, representing one of the most promising and fast-growing technologies in application security space, according to Gartner.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Horusec

    Horusec

    Open source tool that improves identification of vulnerabilities

    ...The tool has options to search for key leaks and security flaws in all your project's files, as well as in Git history. Horusec can be used by the developer through the CLI and by the DevSecOps team on CI /CD mats.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Kubestriker

    Kubestriker

    A Blazing fast Security Auditing tool for Kubernetes

    Kubestriker is a platform-agnostic tool designed to tackle Kubernetes cluster security issues due to misconfigurations and will help strengthen the overall IT infrastructure of any organization. It performs numerous in-depth checks on a range of services and open ports well across more than one platform such as self-hosted kubernetes, Amazon EKS, Azure AKS, Google GKE etc., to identify any misconfigurations which make organizations an easy target for attackers. In addition, it helps...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    SDRLive

    Linux live CD configured for SDR

    SDRLive (formerly LinuxSDR) is a linux live cd based on Ubuntu 18.04, and configured for use with software defined radios. A large selection of software has been preinstalled, such as GNURadio, dump1090, GQRX, cubic-sdr, etc. View the changelog on the wiki for a list of installed applications.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 18
    ISP UNLOCKER

    ISP UNLOCKER

    Unlock Your ISP and access all your restricted websites

    Main Functions Links to official domain names only Users can visit linked sites or enter there on sites Easy and user-friendly interface All data is encrypted over the network Non-installer runs from CD HDD or USB Pen Auto updates System requirements Windows 7 SP1 (x86 and x64) Windows 8 (x86 and x64) Windows 8.1 (x86 and x64) Windows 10 (x86 and x64) .NET Framework 4.6.1 Requires Administrator Privileges Processor Intel or AMD x86 or 64 bit 1 GHz or faster processor 1GB of RAM At least 100 megabytes (MB) available space on the hard disk An active internet connection We have set a few website restrictions within the app for security reasons and to stop browser-based Bruteforce attacks all banks and payment gateways are restricted and will not load from within the app
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Treater Antivirus

    Treater Antivirus

    Cloud antivirus scanner based on machine detection

    ...The application is able to detect and neutralize threats not found by the main protection program, such as Trojans, Ransomware, Worms, Dialers, Adware, Riskware, Pornware, SMS Blocks, etc. The utility does not require installation and can be launched from removable USB/CD drives as a "resuscitator" tool to unlock the computer. During the development, the interface requirements were taken into account, which has an intuitive structure and light colors in the Metro style. Different verification options By default, the antivirus program has the most possible settings and will scan all dangerous and critical system directories that are prone to infection. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20

    Cryptography Playground

    The best cryptography playground available

    The best cryptography playground available Demo @ https://8gwifi.org How to Install wget https://downloads.sourceforge.net/project/cryptography-playgroud/crypto-installer.tar tar xvf crypto-installer.tar;cd crypto-installer ./bootstart.sh Browse http://localhost:8080
    Downloads: 3 This Week
    Last Update:
    See Project
  • 21
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The...
    Downloads: 26 This Week
    Last Update:
    See Project
  • 22
    Lazesoft Windows Key Finder

    Lazesoft Windows Key Finder

    A free Windows and MS Office product key code finder and retriever.

    Lazesoft Windows Product finder is a free Windows and Microsoft Office product key code finder and retriever. It allows you to recover your CD product key for Windows or Microsoft Office for use when you are reinstalling or repairing your Windows and Microsoft Office setups. With it, you can recover your lost key for Windows 2000, XP, 2003, Vista, 2008, 7, 8, 8.1, 10 and all versions of Microsoft Office. What's new in the Version 1.7: Retrieve Windows 10 product key Retrieve Microsoft Office 2016 key Fixed bugs of decoding Microsoft Office 2013 key Supported Windows Versions: Windows 2000 SP4 Windows XP Windows Vista Windows 7 Windows 8 Windows 8.1 Windows 10 Windows Server 2003 Windows Server 2008 Windows Server 2008 R2 Windows Server 2012 Windows Server 2012 R2 Windows Server 2016 Supported Microsoft Office Versions: Microsoft Office 2000, 2003, 2007, 2010, 2013, 2016
    Leader badge
    Downloads: 1,953 This Week
    Last Update:
    See Project
  • 23
    URC ACCESS MODES v3.0

    URC ACCESS MODES v3.0

    Provides control of Various Functions with pasword protected interface

    With URC ACCESS MODES v3.0 we can have complete protection & control for our desktop/laptop with a password protected interface it has 6 best tools which includes : USB Tool & CD/DVD Tool, Registry(regedit.exe) Tool & Command Prompt(cmd.exe) Tool, Group Policy Tool(gpedit.msc) & Task Manager Tool(taskmgr.exe), With USB & CD Tools , Data Theft is Eliminated , No one can access our data without our permission since we can disable USB Mass Storage Devices such as Pen Drives , Hard Disk etc whereas your USB Peripheral Devices will work normal including USB Mouse, Keyboard, Webcam etc Also Virus Problem is Eliminated since no data is transferred it protects us from Viruses With Registry & Command Prompt Tools , Unauthorized Code Execution is Eliminated since we can disable command prompt & registry no one can write commands/registry entries manually and execute it Also Protection From Hackers since they can execute some codes via command prompt which may retrieve our data
    Leader badge
    Downloads: 26 This Week
    Last Update:
    See Project
  • 24
    Katana : Multi-Boot Security Suite
    Katana packages security / ethical hacking distributions (like Backtrack, Ophcrack, & UBCD) together with portable Windows applications (like Metasploit, NMAP, Cain & Able, & Wireshark) to run off a single USB flash drive.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 25
    Eskwela OS v2 PenTester 64bit

    Eskwela OS v2 PenTester 64bit

    PenTester's Edition is for educational and security analysis.

    This is the Eskwela OS version 2 - PenTester's Edition (64bit). This is a specialized distribution made by Eskwela OS. This is based on Ubuntu 14.04 LTS combined with some of the software available in Kali Linux. Use this distribution for educational purposes, penetration testing and security analysis.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB