Showing 170 open source projects for "security"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • All-in-one security tool helps you prevent ransomware and breaches. Icon
    All-in-one security tool helps you prevent ransomware and breaches.

    SIEM + Detection and Response for IT Teams

    Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
    Learn More
  • 1
    Flask App Builder

    Flask App Builder

    Simple and rapid application development framework

    Simple and rapid application development framework, built on top of Flask. includes detailed security, auto CRUD generation for your models, google charts and much more. Automatic permissions lookup, based on exposed methods. Inserts on the Database all the detailed permissions possible on your application. Public (no authentication needed) and Private permissions. Role-based permissions. Authentication support for OpenID, Database and LDAP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Pipenv

    Pipenv

    Python Development Workflow for Humans

    ...Pipenv provides convenient solutions to a number of problems. It allows you to use pip and virtualenv together; use the upcoming Pipfile and Pipfile.lock instead of a problematic requirements.txt; automatically exposes security vulnerabilities; and streamlines your development workflow by loading .env file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    AWS IoT Device SDK for Python

    AWS IoT Device SDK for Python

    SDK for connecting to AWS IoT from a device using Python

    ...By connecting their devices to AWS IoT, users can securely work with the message broker, rules, and the device shadow (sometimes referred to as a thing shadow) provided by AWS IoT and with other AWS services like AWS Lambda, Amazon Kinesis, Amazon S3, and more. It is a complete rework, built to improve reliability, performance, and security. We invite your feedback! The SDK is built on top of a modified Paho MQTT Python client library. Developers can choose from two types of connections to connect to AWS IoT. For MQTT over TLS (port 8883 and port 443), a valid certificate and a private key are required for authentication. For MQTT over the WebSocket protocol (port 443), a valid AWS Identity and Access Management (IAM) access key ID and secret access key pair are required for authentication.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Jenkins-Zero-To-Hero

    Jenkins-Zero-To-Hero

    Install Jenkins and configure Docker

    Jenkins-Zero-To-Hero is a hands-on learning repository that teaches Jenkins from scratch, starting with installation and moving all the way to building end-to-end CI/CD pipelines. The course is designed around running Jenkins on an AWS EC2 instance, guiding you through installing Java, configuring Jenkins, and exposing it safely via security group rules. From there, it covers installing plugins like Docker Pipeline, configuring Docker as an agent, and wiring up multi-stage and multi-agent pipelines. The folder structure includes practical examples such as java-maven-sonar-argocd-helm-k8s and python-jenkins-argocd-k8s, showing real CI/CD flows that build, test, analyze, containerize, and deploy apps to Kubernetes via Argo CD in a GitOps style. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • 5
    Django Wiki

    Django Wiki

    A wiki system with complex functionality for simple integration

    ...Do not make your own hard copy of this repository in order to fiddle with internal parts of the wiki -- this strategy will lead you to lose out on future updates with highly improved features and plugins. Possibly security updates as well!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Tencent Cloud Code Analysis

    Tencent Cloud Code Analysis

    Static code analysis

    Tencent Cloud Code Analysis (TCA for short, used internally by the R&D code CodeDog ) is a cloud-native, distributed, high-performance comprehensive code analysis and tracking platform that integrates many analysis tools, including server, web and client The three components have integrated a number of self-developed tools, and also support the dynamic integration of analysis tools of various programming languages ​​in the industry. Obtain the Tencent Cloud code analysis platform by...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Errbot

    Errbot

    Chatbot daemon that connects to your favorite chat services

    ...Errbot is being used in a lot of different contexts, chatops (tools for devops), online gaming chatrooms like EVE, video streaming chatrooms like livecoding.tv, home security, etc. Extending Errbot and adding your own commands can be done by creating a plugin, which is simply a class derived from BotPlugin. The docstrings will be automatically reused by the !help command. We aim to give you all the tools you need to build a customized bot safely, without having to worry about basic functionality. As such, Errbot comes with a wealth of features out of the box. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    GIXY

    GIXY

    Nginx configuration static analyzer

    Gixy is a tool to analyze Nginx configuration. The main goal of Gixy is to prevent security misconfiguration and automate flaw detection. Currently supported Python versions are 2.7, 3.5, 3.6 and 3.7. Gixy is well tested only on GNU/Linux, other OSs may have some issues. You can find things that Gixy is learning to detect at Issues labeled with "new plugin". By default Gixy will try to analyze Nginx configuration placed in /etc/nginx/nginx.conf.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Wifipumpkin3

    Wifipumpkin3

    Powerful framework for rogue access point attack

    wifipumpkin3 is powerful framework for rogue access point attack, written in Python, that allow and offer to security researchers, red teamers and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack.
    Downloads: 8 This Week
    Last Update:
    See Project
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • 10
    Wapiti

    Wapiti

    Wapiti is a web-application vulnerability scanner

    Wapiti is a vulnerability scanner for web applications. It currently search vulnerabilities like XSS, SQL and XPath injections, file inclusions, command execution, XXE injections, CRLF injections, Server Side Request Forgery, Open Redirects... It use the Python 3 programming language.
    Leader badge
    Downloads: 79 This Week
    Last Update:
    See Project
  • 11
    HydraDragonAntivirus

    HydraDragonAntivirus

    Dynamic and static analysis with Sandboxie for Windows, including EDR

    Dynamic and static analysis with Sandboxie for Windows, including EDR, ClamAV, YARA-X, custom machine learning AI, behavioral analysis, NLP-based detection, website signatures, Ghidra, Suricata, Sigma, and much more than you can imagine
    Downloads: 15 This Week
    Last Update:
    See Project
  • 12
    Portfolio Secure 22 [I.S.A]

    Portfolio Secure 22 [I.S.A]

    Portfolio Secure 22 [Improved.Simplified.Alternative]

    'Portfolio Secure' is an desktop application developed using python 3.6.8 and other add-on libaries. Can secure files or folders by encrypting into a unreadable file (.enc) . Portfilio secure has two parts: 1) Folder Guardian - converts folders into unreadable file (.enc) 2) File Guardian - converts files into unreable file (.enc) Compatible only for windows OS.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    PyKCS11: a complete PKCS#11 wrapper for Python, created using the SWIG compiler. API documentation: http://pkcs11wrap.sourceforge.net/api/
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14
    Whatsapp Automation

    Whatsapp Automation

    automation on the whatsapp and send messege all contect automation

    A WhatsApp message sender with activation security, personalized messaging, attachments, and automation via Selenium. Includes Twilio-based activation, encrypted data, and a user-friendly interface using Tkinter.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 15
    TorBot

    TorBot

    Dark Web OSINT Tool

    Contributions to this project are always welcome. To add a new feature fork the dev branch and give a pull request when your new feature is tested and complete. If its a new module, it should be put inside the modules directory. The branch name should be your new feature name in the format <Feature_featurename_version(optional)>. On Linux platforms, you can make an executable for TorBot by using the install.sh script. You will need to give the script the correct permissions using chmod +x...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    flom

    flom

    Free Lock Manager

    ...FLoM supports different types of abstract resources: simple, numeric, set, hierarchical and transactional sequence. libflom, the library shipped with FLoM, allows you to develop your own application using a simple C, C++, Java, Perl, PHP or Python client API. SSL/TLS security for network communication, X.509 certificates for peer to peer mutual authentication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    nodejsscan

    nodejsscan

    nodejsscan is a static security code scanner for Node.js applications

    Static security code scanner (SAST) for Node.js applications powered by libsast and semgrep. nodejsscan is a static security code scanner for Node.js applications.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    EasyAuth

    EasyAuth

    Create a centralized Authentication and Authorization token server

    ...Easily secure FastAPI endpoints based on Users, Groups, Roles or Permissions with very little database usage. Centralized Auth - Single location for Users & Permissions to share across apps. Granular Endpoint Security - Verify user identity, and define explicitly who and what each user or group of users may access. Admin GUI - easy management of users, permissions, tokens, OAuth, and more! Advanced JWT - Token Based Client authorization with built-in invalidation capabilities. Google Oauth - Easy to configure google login. Integrated Login & Cookie Management - Users are not just authenticated and authorized, they are re-directed on token expiration to login pages via the cookie system and sent back to the last location afterward.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Wemake Django Template

    Wemake Django Template

    Bleeding edge django template focused on code quality and security

    What this project is all about? The main idea of this project is to provide a fully configured template for django projects, where code quality, testing, documentation, security, and scalability are number one priorities. This template is a result of implementing our processes, it should not be considered as an independent part. When developing this template we had several goals in mind. Development environment should be bootstrapped easily, so we use docker-compose for that. Development should be consistent, so we use strict quality and style checks. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    AWS Jupyter Proxy

    AWS Jupyter Proxy

    Jupyter server extension to proxy requests with AWS SigV4 authentican

    A Jupyter server extension to proxy requests with AWS SigV4 authentication. This server extension enables the usage of the AWS JavaScript/TypeScript SDK to write Jupyter frontend extensions without having to export AWS credentials to the browser. A single /awsproxy endpoint is added on the Jupyter server which receives incoming requests from the browser, uses the credentials on the server to add SigV4 authentication to the request, and then proxies the request to the actual AWS service...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    Packj

    Packj

    Stops Solarwinds-, ESLint-, and PyTorch-like attacks

    Packj is a security tool that analyzes open-source packages for potential security risks, supply chain attacks, and malicious behaviors. It helps developers vet dependencies before using them in projects, reducing vulnerabilities in software development.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Python script to get the last 5 minutes of accepted traffic logs via the trendmicro email security API and send them to a syslog server Script Python para obtener los ultimos 5 minutos de logs de trafico aceptado por medio de la API de trendmicro email security y enviarlos a un servidor de syslog Crontab */5 * * * * /usr/local/bin/python3.9 /home/user/tmes-syslog_0.02.py 2>&1 > /home/user/errores.txt ------------ # API documentation # Getting Started with Trend Micro Email Security APIs # https://docs.trendmicro.com/en-us/enterprise/trend-micro-email-security-rest-api-online-help/getting-started-with.aspx # Obtaining the API Key # https://docs.trendmicro.com/en-us/enterprise/trend-micro-email-security-rest-api-online-help/getting-started-with/obtaining-the-api-ke.aspx # List Mail Tracking Logs # https://docs.trendmicro.com/en-us/enterprise/trend-micro-email-security-rest-api-online-help/supported-apis/logs/list-mail-tracking-l.aspx
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Name-That-Hash

    Name-That-Hash

    Identify MD5, SHA256 and 300+ other hashes

    Name-That-Hash is a modern hash identification system that tells you what type of hash you are looking at, supporting MD5, SHA-256, and more than 300 other hash types. It is designed as a successor and improvement to older tools like HashID and Hash-Identifier, focusing on up-to-date hash databases and better usability. One of its core ideas is popularity-aware ranking: when you feed in a hash, it prioritizes likely real-world types such as NTLM over obscure ones like Skype hashes, instead...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    HASS Configurator

    HASS Configurator

    Configuration UI for Home Assistant

    The HASS Configurator is a small web app (you access it via a web browser) that provides a filesystem browser and text-editor to modify files on the machine the configurator is running on. It has been created to allow easy configuration of Home Assistant. It is powered by Ace editor, which supports syntax highlighting for various code/markup languages. YAML files (the default language for Home Assistant configuration files) will be automatically checked for syntax errors while editing. The...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    dirsearch

    dirsearch

    Web path scanner

    An advanced command-line tool designed to brute force directories and files in webservers, AKA web path scanner. Wordlist is a text file, each line is a path. About extensions, unlike other tools, dirsearch only replaces the %EXT% keyword with extensions from -e flag. For wordlists without %EXT% (like SecLists), -f | --force-extensions switch is required to append extensions to every word in wordlist, as well as the /. To use multiple wordlists, you can separate your wordlists with commas....
    Downloads: 4 This Week
    Last Update:
    See Project