Showing 19 open source projects for "security tools"

View related business solutions
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 1
    Prowler

    Prowler

    An open source security tool to perform AWS security assessment

    Prowler is an Open Source security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening, and forensics readiness. It contains more than 200 controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks. Prowler is a command-line tool that helps you with AWS security assessment, auditing, hardening, and incident response. It follows guidelines of the CIS Amazon Web Services...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    HestiaCP

    HestiaCP

    Hestia Control Panel | A lightweight and powerful control panel

    HestiaCP is an open-source web hosting control panel designed to manage web servers efficiently. It provides a simple and intuitive graphical interface to manage domains, web hosting, databases, email accounts, and other server-related tasks. HestiaCP is lightweight and based on the Vesta Control Panel but offers more modern features and improved security. It supports popular web servers like Nginx and Apache, making it suitable for personal and small business hosting environments.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    testssl.sh

    testssl.sh

    Testing TLS/SSL encryption anywhere on any port

    testssl.sh is a free command-line tool that checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more. testssl.sh is free and open-source software. You can use it under the terms of GPLv2, please review the License before using it. Works for Linux, Mac OSX, FreeBSD, NetBSD and WSL/MSYS2/Cygwin out of the box, no need to install or configure something, no gems, CPAN, pip or the like. OpenBSD only needs bash to be...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    gVisor

    gVisor

    Application Kernel for Containers

    ...Written in Go, it implements a Linux-compatible system call interface that runs entirely in user space, creating a secure sandboxed environment for containers. Unlike traditional virtual machines or lightweight syscall filters, gVisor follows a third approach that offers many of the security benefits of virtualization while maintaining the speed, resource efficiency, and flexibility of containers. Its key runtime, runsc, integrates seamlessly with container ecosystems such as Docker and Kubernetes, making it easy to deploy sandboxed workloads using familiar tools. By intercepting and safely handling syscalls from applications, gVisor reduces the attack surface of the host kernel, mitigating risks associated with running untrusted or potentially malicious code in containerized environments.
    Downloads: 9 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 5
    Toolbx Linux

    Toolbx Linux

    Tool for interactive command line environments on Linux

    Toolbx is a tool for Linux, which allows the use of interactive command line environments for development and troubleshooting the host operating system, without having to install software on the host. It is built on top of Podman and other standard container technologies from OCI. Toolbx environments have seamless access to the user's home directory, the Wayland and X11 sockets, networking (including Avahi), removable devices (like USB sticks), systemd journal, SSH agent, D-Bus, limits, /dev...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 6
    GitHub Action to detect license names

    GitHub Action to detect license names

    GitHub Action for license compliance: Python, JavaScript, iOS, Android

    GitHub Action for license compliance: Python, JavaScript, iOS, Android and more. Detect license names and types for Python PyPI packages. Identify license types for given license names obtained by third-party tools. Great coverage of free/libre and open source licenses of all types: public domain, permissive, copyleft. Check explicit Python dependencies list for copyleft licenses. Check all packages including transitive dependencies. Check CSV file generated by JavaScript license-checker...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    LabMACOSX
    LabMACOSX: Is a laboratory of applications written in Applescript language. Brutosx is brutus.pl remote login and password bruteforce cracker inserted inside the application Brutosx (need only of Net::Telnet Perl module are required get them at CPAN, while the list of users and passwords, and the service is inserted inside the application). SSHOSX is ssh application client to establish an ssh connection from client to server, Nmaposx is nmap port scanner invoked from the application Nmaposx...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    TraceMAC - Traceroute for MAC addresses

    TraceMAC - Traceroute for MAC addresses

    TraceMAC is a command-line Layer 2 traceroute for Cisco switches

    TraceMAC is a Windows/Linux command-line tool that allows you to trace a specific MAC address thru Cisco switches. It works by connecting to a switch using SSH, SNMP, Telnet, HTTP or HTTPS and do some "show commands" and later process the output, this will happen recursively until it finds the switch where that MAC address (PC/Printer/Etc) is directly connected. Note: It works with Cisco switches only and you must have CDP enabled at least on trunks/links between switches! Is tested...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 9
    OWASP Mobile Security Testing Guide

    OWASP Mobile Security Testing Guide

    Manual for mobile app security development and testing

    We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results. The MSTG is a comprehensive manual for mobile app security testing and reverse engineering for iOS and Android mobile security testers.
    Downloads: 6 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    CityHash

    CityHash

    Automatically exported from Google code CityHash

    ...CityHash offers multiple hash sizes—32-bit, 64-bit, 128-bit, and 256-bit variants—with the CRC-based versions leveraging hardware acceleration on CPUs that support SSE4.2 CRC32 instructions. The library emphasizes hashing performance and uniformity rather than cryptographic security, making it ideal for use in data structures like hash tables and distributed systems requiring rapid key lookups. CityHash has been rigorously tested using tools like SMHasher to ensure high-quality mixing and collision resistance across a wide range of inputs. Its speed and portability have made it a popular choice for developers needing dependable, lightweight hash functions.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    XSIBackup-Classic

    XSIBackup-Classic

    Local and over IP backups for ©VMWare ©ESXi 5.1 to 6.7

    VMWare backup and replication for ESXi vSphere virtual machines to datastore or differential over IP. No agents, self capable, runs in the hypervisor host, ESXi 5.1, ESXi 5.5 & ESXi <=6.7 compatible, hot backups. Consists in a cron programmable service running in the hypervisor. Hot backups, fully functional, standalone, ideal for dedicated servers. Full version supports quiescing, differential backup, deduplication and much more... Download link:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    DracOS GNU/Linux Remastered
    ...DracOS GNU/Linux Remastered ( https://github.com/dracos-linux ) is the Linux operating system from Indonesia , open source is built based on Debian live project under the protection of the GNU General Public License v3.0. This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering. Use a GUI-based tools-tools the software using the CLI (command line interface) and GUI (graphical user interface) to perform its operations. Now Dracos currently already up to version 3.1.5 with the code name "KUNTILANAK WITH REMASTERED".
    Downloads: 15 This Week
    Last Update:
    See Project
  • 13
    VPLE

    VPLE

    Vulnerable Pentesting Lab Environment

    VPLE (Linux) Vulnerable Pentesting Lab Environment VPLE is an Intentionally Vulnerable Linux Virtual Machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing Labs. In VPLE bunch of labs are Available. NOTE:- "Only run in VMWare Pls Don’t run in VirtualBox" The default login and password is administrator: password. List Of All Labs in one VM:- 1. Web-DVWA 2. Mutillidae 3. Webgoat 4. Bwapp 5. Juice-shop 6. ...
    Downloads: 24 This Week
    Last Update:
    See Project
  • 14
    Sudomy

    Sudomy

    Sudomy is a subdomain enumeration tool to collect subdomains

    Sudomy is a subdomain enumeration tool to collect subdomains and analyze domains performing advanced automated reconnaissance (framework). This tool can also be used for OSINT (Open-source intelligence) activities. Easy, light, fast and powerful. Bash script (controller) is available by default in almost all Linux distributions. By using bash script multiprocessing feature, all processors will be utilized optimally. Subdomain enumeration process can be achieved by using active method or...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    exd

    exd

    A command line tool to manage bytes in hex dumps or packet captures

    Command-line tool to examine or edit bytes in hex, octal, binary, or in packet capture (pcap) dumps. Exd is intended to be used in conjunction with hex dump tools such as xxd, od, hexdump, or hd, and with packet capture dump tools such as tshark and text2pcap. --- metadata tags byte hex octal binary pcap packet packet dump hexdump
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Bocker

    Bocker

    Docker implemented in around 100 lines of bash

    Bocker is a minimal, educational reimplementation of core container (Docker-like) functionality, done in about a hundred lines of Bash script. Its purpose is not to replace Docker’s full feature set, but to illustrate container primitives—namespaces, cgroups, layering, filesystem manipulation, network namespaces, etc.—in a transparent, minimal form. With bocker you can perform basic operations such as pulling an image, running a container, exec into a container, listing containers, and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Qlnmp

    Qlnmp

    Qlnmp

    Qlnmp 2.0 Stable Released! What is Qlnmp? Qlnmp is an auto-install deployment tool which is used the source code to compile and optimize, for Nginx+Mysql+PHP environment on Linux; and include Apache (Selectable options) as the backend to handle the dynamic document and Pure-ftp (Selectable options) & PHP Extentions (Selectable options), management tools etc. Support for Centos 5.X, 32-bit and 64-bit.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A useful collection of batch files and scripts for daily purposes (backup, security, system management, etc.) and development
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Collection Of Static Tools And Response Scripts
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB