Showing 306 open source projects for "security tools"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    Linux user-space implementation of Aladdin's eToken R2 device driver
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    HTML5 app development in .NET

    HTML5 app development in .NET

    Rapidly create HTML5 mobile web enterprise applications in .NET

    With its WYSIWYG designer and familiar C# programming model, Visual WebGui is the natural choice for Visual Studio developers who want to create enterprise-class HTML5 apps for any mobile device or desktop.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Guard Stone is an Open Source Security Platform, which enables to integrate and deploy open source security tools. Some of Guard Stone's focus areas include Firewall, VPN, Mail Gateway Filters, Web Filters, Web Application Security, Routing etc;
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Wave Framework

    Wave Framework

    Open Source API-centric PHP Micro-framework

    Wave is a PHP micro-framework that is built loosely following model-view-control architecture and factory method design pattern. It is made for web services, websites and info-systems and is built to support a native API architecture, caching, user control and smart resource management. Wave is a compact framework that does not include bloated libraries and features and is developed keeping lightweight speed and optimizations in mind. While not necessary for using Wave Framework, it comes by...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 5
    Open Jungo

    Open Jungo

    Open software persistence model

    Open Jungo is a flexible entity persistence model that makes it easy to create object-centric components with minimal coding. Unlike most current entity frameworks, Jungo does not require developers to structure their code in any particular way or specify database structures. Open Jungo supports most major proprietary and open source databases as well as well as a built-in highly efficient zero-configuration object-oriented database systems. It requires no external dependencies and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    jeftoolkit

    useful tools

    Contained many useful tools , e.g. email sending, encryption/decryption, code formatter, code segment, file segment ... os platform unlimited.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    The sandbox libraries (libsandbox & pysandbox) are an open-source suite of software components for C/C++ and Python developers to create automated profiling tools and watchdog programs. The API's are designed for executing and instrumenting simple (single process) tasks, featuring policy-based behavioral auditing, resource quota, and statistics collecting. The sandbox libraries were originally designed and utilized as the core security module of a full-fledged online judge system for ACM/ICPC training. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    DENRIT

    DENRIT

    Perform anonymous and non-anonymous pentesting.

    DENRIT allows remote administration of anonymous networks (TOR, I2P and FreeNet). Also, contains a pentesting module to execute commands using a selected anonymous network, pentesting with TOR or TCP Follows a client/server model with well-defined communication interfaces. SSH is used to allow remote clients to access the machine and manage any anonymous network that is installed there, plus allows penetration testing anonymously (or non-anonymously) using tools such as Metasploit...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    ORDO vers.1.0

    AES-128, Linux, OpenBSD, Assembly-Language

    Small cryptographic command line tool for LINUX and OpenBSD (x86) completely in 32-Bit Assembly Language. ORDO encrypt/decrypt files (max. size 2 GB) with AES-128-Algorithm (Rijndael) in CBC-Mode (Cipher-Block-Chaining). No libs are included, only system-calls are used. ORDO is under BSD License.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 10
    openSCADA

    openSCADA

    openSCADA® is an open source SCADA system written in JAVA

    openSCADA is an open source Supervisory Control And Data Acquisition System. It is platform independent and based on a modern system design that provides security and flexibility at the same time. openSCADA is flexible. It is not an out of the box solution, but a set of tools that can be combined in many different ways. It provides development libraries, interface applications, mass configuration tools, front-end and back-end applications. openSCADA is ready to rock. It is used 24/7 in several installations around this world. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 11

    TxtStyle

    Command-line tool for colorizing log files based on regex.

    TxtStyle is a command line tool colorizing output of console programs. It makes it easier to visually scan log files or can simply be used to prettify output of console applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    silvertunnel - Java lib+browser for TOR
    silvertunnel.org is a project that provides an end-user browser, a Java library and additional Java security tools to easily access anonymity networks such as the Tor (torproject.org) network. Secure and easy to use. Tor4Java and Tor Browser. Attention: see project status on page https://sourceforge.net/p/silvertunnel/discussion/962278/thread/83dc2d02/#
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Yasca

    Source Code Analyzer

    Yasca is an open source program which looks for security vulnerabilities, code-quality, performance, and conformance to best practices in program source code, integrating with other open-source tools as needed. Yasca has been migrated to Github, and is available at http://scovetta.github.com/yasca and http://github.com/scovetta/yasca.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15

    Easy CRUD

    Easy CRUD is an Application Arquitecture

    Easy CRUD is an application arquitecture that can be extended through external modules (plugins) using Qt. This arquitecture is designed to provide the basic tools to create CRUD forms, Configuration forms and Report forms. Also it includes the root module (mod_root), its function is to allow the ROOT user to control the access privileges of the system's user, the ROOT user can limit the normal users privileges, this is useful for systems that requires security levels.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Motinha

    Motinha

    Information Gathering and Network Exploitation Framework

    Motinha is a Simple Information Gathering and Network Exploitation Framework coded in Python. Here we have a bridge between the final user and the most futurists’ tools on the Internet to find juice info around any network, website, domain, company or persons and in some cases exploit some features to have fun , now let’s Shut Up And Hack!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17

    pipedump

    Proxies data from stdin/stdout/stderr and logs it in pcap files.

    The pipedump forks a process and then executes the specified command, acting as a proxy for STDIN, STDOUT, and STDERR. Debug data and data sent to STDIN are recorded as a IPv6 UDP packets traversing from ::1 to ::. Data received from STDOUT and STDERR are recorded as a IPv6 UDP packets traversing from :: to ::1. STDIN is recorded as port 19840, STDOUT as port 19841, STDERR as port 19842 and debug information as port 65535. The captured data is recorded in a file which can be...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    AntiDef

    Anti defacement command line tool

    AntiDef is written in order to handle with defacement attacks. This tool written in Java in a fast-and-dirty manner; However is works. This tool is working straight forward. Server administrator should run the application with the following specific parameters: path to the copy of the web site (source), path to the application directory, path to log directory and few more optional parameters. This tool compares the source and the destination files, then copies the "defaced" files if...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19

    DAL4j

    Data Access Layer 4 Java

    Welcome to Data Access Layer for Java (DAL4j) a set of command line tools and framework used to reverse engineer a MySQL or SQLServer database schema into a set of JPA Entity Beans. DAL4j can be useful for scenarios where there is an existing database schema but a technology other that JPA is used to interact with the database. DAL4j can provide an easy way to migrate your code base from other technologies such as JDBC or Hibernate to JPA. The beans generated can be 1 or two types:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Foi comprovado que senhas como: datas de nascimento, números de telefone, numero de cartões de crédito... são fáceis de serem descobertas (hackeadas), por isso existe o Password Generator, para gerar senhas que são difíceis de descobrir. O Sistema funciona como um gerador RANDOM, que cria instantaneamente uma série de possibilidades de combinações que o sistema julga ser mais difícil para programas e hackers descobrirem.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Malware Classifier

    Malware Classifier

    Perform quick, easy classification of binaries for malware analysis.

    Adobe Malware Classifier is a command-line tool that lets antivirus analysts, IT administrators, and security researchers quickly and easily determine if a binary file contains malware, so they can develop malware detection signatures faster, reducing the time in which users' systems are vulnerable. Malware Classifier uses machine learning algorithms to classify Win32 binaries – EXEs and DLLs – into three classes: 0 for “clean,” 1 for “malicious,” or “UNKNOWN.” The tool was developed...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    fastest

    Automate your software testing, the fastest way!

    Fastest stands for 'Fast Automated Software test'. * This is a compilation of various open source tools complemented with a set of useful programs that help a Software Test Engineer perform the test automation with ease. * It can be envisioned as a toolkit that every test engineer would need! * Currently implemented in Java * Test Automation is not just about writing test cases in a particular programming language. There are a lot more activities that need to be accomplished in...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Qlnmp

    Qlnmp

    Qlnmp

    Qlnmp 2.0 Stable Released! What is Qlnmp? Qlnmp is an auto-install deployment tool which is used the source code to compile and optimize, for Nginx+Mysql+PHP environment on Linux; and include Apache (Selectable options) as the backend to handle the dynamic document and Pure-ftp (Selectable options) & PHP Extentions (Selectable options), management tools etc. Support for Centos 5.X, 32-bit and 64-bit.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    Cryptkeeper

    Cryptkeeper Secuirty tool

    In this program you will find tools like : Rawdata tool , file encryption , text encryption , program updater , program protecter , password manager , program settings , defult settings , settings viewer and the last is the file hashing. the file hashing you can use 6 hashing types for the file encryption 1 since i ran out of time for it , and the text encryption has 17 different types 12 encrypt and 5 hashing types. some uses encryption keys and some dont. there are AES , 4DES...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Ninja Phishing Framework
    it’s a free and open source phishing framework that helps the social-engineers in phishing attacks. and it’s includes alot of phishing pages and more stuff that helps you in phishing. the application is coded in PHP,XHTML,CSS,and Javascript.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB