Showing 2861 open source projects for "security"

View related business solutions
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 1

    stenc

    SCSI Tape Encryption Manager

    SCSI Tape Encryption Manager - Manages encryption on LTO 4 and LTO 5 tape drives with hardware-based encryption. Program should work on any other SSP capable tape drives. Built specifically for Linux and AIX. Now supports key change auditing and key descriptors (uKAD). Check the Project News under the Develop section for more information. Project source code has moved to https://github.com/scsitape/stenc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    check vpn

    check vpn

    check if your vpn is falling down

    This tool check every x seconds your public ip adress, if it changes (vpn fall down for example) it stops one or several programs. When the VPN crash this tool can send a mail, play a sound. - This tool work on Windows and Linux. - You need to install JAVA 1,8 on your operating system - Download checkvpn.zip and unzip it - Double click on checkvpn.jar - Click on the button « Update ip » when the VPN is stopped to get your public ip address. - Type the programs separated by semicolon...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Small C# web-application for single-sign-in based on B2XCore. Support of multiple security-provider.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A slightly reduced strength bulk encryption. In exchange for the reduced strength, you get the ability to rsync the encrypted files, so that local changes in the plaintext file will result in (relatively) local changes to the cyphertext file.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    HTMF is a Java Hard Token Management Framework used to manage the complete livecycle of an organizations Smartcards and/or USB dongles. It communicates with the tokens through a PKCS11 interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    secure rm

    srm is a command-line program to delete files securely.

    srm (secure rm) is a command-line compatible rm(1) which overwrites file contents before unlinking. The goal is to provide drop in security for users who wish to prevent recovery of deleted information, even if the machine is compromised.
    Leader badge
    Downloads: 15 This Week
    Last Update:
    See Project
  • 7
    Wi-PWN

    Wi-PWN

    ESP8266 firmware for performing deauthentication attacks

    ESP8266 firmware for performing deauthentication attacks, with ease. Wi-PWN is a firmware that performs death attacks on cheap Arduino boards. The ESP8266 is a cheap microcontroller with built-in Wi-Fi. It contains a powerful 160 MHz processor and it can be programmed using Arduino. A deauthentication attack is often confused with Wi-Fi jamming, as they both block users from accessing Wi-Fi networks. The 802.11 Wi-Fi protocol contains a so-called deauthentication frame. It is used to...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8

    Anond

    Experiments with anonymous routing

    Anond is a ongoing experiment striving to provide transparent IP-level anonymization using virtual network interfaces, peer-to-peer and overlay network techniques. Anond is an implementation of an anonymous routing protocol with ideas taken from the paper "Anonymous overlay network supporting authenticated routing" by Roman Schlegel and Duncan S. Wong.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    rtl2832-entropyd

    Use an rtl2832 USB dongle to generate random data for the linux kernel

    rtl2832_entropyd is a program that is designed to feed entropy into the linux /dev/random kernel entropy pool. It automatically forks and runs as a daemon, unless one of the testing options, -o or -t, are selected. Then it never forks. To use it, you need an rtl2832 USB dongle. They are relatively cheap (< $10 on ebay), and are actually used to listen to a broad range of radio transmissions. This application exploits the radio noise in the atmosphere to extract entropy. The kernel...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 10

    iptables-bash_completion

    Programmable completion code (bash) for ip[6]tables (netfilter.org)

    This is the programmable completion specification (compspec) for the iptables program (netfilter.org).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Scandiff is a tool used to find the differences between two nmap scan logs and display results to the user. Scandiff detects changes in port status, operating system, scantime, nmap version, and more. Supports nmap grepable and XML output formats
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A Linux port of the OpenBSD/FreeBSD Cryptographic Framework (OCF). This port aims to bring full asynchronous HW/SW crypto acceleration to the Linux kernel, OpenSwan, OpenSSL and applications using DES, 3DES, AES, MD5, SHA, PublicKey, RNGs and more.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    OPTOSS NG-NetMS

    OPTOSS NG-NetMS

    OPTOSS Next Gen Network Management System (NG-NetMS)

    Why to pay tens of thousands $$$ for your network management software? Get visibility into your networks and complex processes inside with NG-NetMS now! NG-NetMS is a new end-to-end network management platform for your Linux servers, Cisco, Juniper, HP and Extreme routers, switches and firewalls. NG-NetMS is precise, quick and efficient. It collects most complete information about the network inventory, topology, map of IPv4 addresses quickly and with minimum hassle. Most...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    safelock

    safelock

    Basic AES files encryption tool

    Simple drag & drop file encryption tool. based on python and uses PyCrypto to encrypt the inputted files with AES encryption. Then sqlite database file is generated with a unique key to store the encrypted files and folders in binary blobs for later decryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Wi-Fi Cracking

    Wi-Fi Cracking

    Crack WPA Wi-Fi routers with Airodump-ng and Aircrack-ng Hashcat

    Crack Wi-Fi networks that are secured using weak passwords. It is not exhaustive, but it should be enough information for you to test your own network's security or break into one nearby. Begin by listing wireless interfaces that support monitor mode. If you do not see an interface listed then your wireless card does not support monitor mode. Start listening to 802.11 Beacon frames broadcast by nearby wireless routers using your monitor interface. WPA/WPA2 uses a 4-way handshake to authenticate devices to the network. ...
    Downloads: 39 This Week
    Last Update:
    See Project
  • 16

    turniket

    Registration passes at the turnstiles system

    system is designed to control staff access to production databases, as well as taking into account their passage of time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    JRF

    Java Remote File - RemoteInputStream and RemoteOutputStream.

    JRF is a client/server application that allows to extend local storage to other computers running the JRF Server. It has been designed for ultra-simplicity, **not for security!** It does not request for authentication when accessing files on a remote server, nor does it prevent access to files or directories. It has been designed for already-secured networks (e.g. LANs or inside VPNs), where file-sharing setup is tedious (or impossible). Basic access configuration/restriction should be performed on the OS, by changing rights of the user running the JRF Server. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Bias :: Versatile Information Manager
    Bias is a cross-platform versatile information management application / Organizer
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Chrome-Cut

    Chrome-Cut

    Python3 tool to scan, detect and control chromecast devices

    Basic GUI, CLI tool programmed in Python 3.4 and QT5. It gives you the ability to detect, scan and send some useful HTTP requests "Commands" to endless amount of chromecast devices. As well as the ability to loop the commands so the process of repeating it will be automated with a set duration in-which the looping will be done.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    auto_firewall.sh

    shell program to automatically configure freebsd as a firewall

    This shell program automatically configures FreeBSD 9.1 and above as a firewall with only 2 answers from the user. The main goals of this program are minimal user input, ease of use and sensible security defaults. It's written for the sh shell included in FreeBSD by default.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    GRASSMARLIN

    GRASSMARLIN

    Provides situational awareness of Industrial Control Systems (ICS)

    GRASSMARLIN provides IP network situational awareness of industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks to support network security. Passively map, and visually display, an ICS/SCADA network topology while safely conducting device discovery, accounting, and reporting on these critical cyber-physical systems.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22
    Bash Shell Scripting in a Minute

    Bash Shell Scripting in a Minute

    Learn Bash Shell Scripting in a Minute using this Collection of Script

    Learn Bash Shell Scripting in a Minute using this Collection of Scripts, which are Real World Examples, ranging from a simple Date Based Theme to a Standalone Kiosk Type User Input Forms. The Learning is based on a "Observe and Understand Strategy", which means you run these scripts, observe their outputs, understand the script that generates them and learn the whole thing. These Scripts cover almost all the basics of bash shell scripting and summarizes them in the last script for user...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    PLEASE GO TO https://github.com/deksai/pam_abl A PAM module that provides auto blacklisting of hosts and users responsible for repeated failed authentication attempts. Generally configured so that blacklisted users still see normal login prompts but are guaranteed to fail to authenticate.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    WSUS CWE

    Get know which WSUS client are not in sync

    PowerShell scripts for notification of WSUS client status. Default summary report from WSUS server does not notify about inactual WSUS clients. WSUS CWE collects information about errors and if client is in sync from last month.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Mail Alert Simple Mailer

    Mail Alert Simple Mailer

    Mail Alert Simple Mailer

    Mail Alert Simple Mailer is a simple command-line utility designed for IT administrators for sending e-mail from Microsoft Windows OS. It can be executed from command line, Windows batch file or PowerShell scripts. My main reason for writing this software was to handle events generated by Dell OpenManage Server Administrator (OMSA), APC PowerChute and Windows Events to send hardware status and alerts like temperature alerts, UPS battery status, powerline status and RAID controller alerts...
    Downloads: 3 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB