Showing 14 open source projects for "linux malware detect"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 1
    2FAS Auth Browser Extension

    2FAS Auth Browser Extension

    Source code for 2FAS Auth Browser Extension

    2FAS Auth Browser Extension is a cross-browser plugin that integrates the 2FAS multi-factor authentication platform directly into the user’s web browsing workflow, helping streamline login flows by interfacing with web pages and 2FA token generation in a seamless way. Once installed in browsers like Chrome, Firefox, or others that support standard extension APIs, it can detect 2FA prompts on login forms and offer to fill or suggest one-time passwords generated by your 2FAS mobile clients or...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Super Grub2 Disk

    Super Grub2 Disk

    Boots into many systems and GRUB2 ones!

    Super GRUB2 Disk helps you to boot into most any Operating System (OS) even if you cannot boot into it by normal means.
    Leader badge
    Downloads: 1,692 This Week
    Last Update:
    See Project
  • 3

    StackTraceSealer

    Aid in finding infinite loops in Java programs on production systems

    StackTraceSealer is a JConsole plugin with its own Java Agent Library that can be used to seal stack frames on a thread stack trace to detect whether these frames have changed or they have remained the same all the time to aid in finding an infinite loop on a production system when all you have is a long seemingly constant stack trace in the thread dump.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Tria Sistema Operatiu

    Tria Sistema Operatiu

    Helps you find, download & burn the best Operating System for any PC

    Tria O.S. detects hard & soft specs of the PC where you run it, you can load this info or specify it manually to let the program inform you what would be the best operating system for a specific PC, with the specified hardware, and then see the difference by adding RAM, a SSD hard drive, changing the graphics card ... etc. REQUIREMENTS: For Linux, you need GAMBAS 3.3 or later, so you will have to install the gambas3 package before installing. 90's EDITION needs 160 MB (192 MB on...
    Downloads: 19 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 5
    Simple Software-restriction Policy

    Simple Software-restriction Policy

    Control which folders programs can be run from.

    A software policy makes a powerful addition to Microsoft Windows' malware protection. In particular, it is more effective against ransomware than traditional approaches to security. If you know about the Linux 'execute permission' bit then you'll understand what this is for. The mode of operation is somewhat different in that execute permission is granted to folders and subfolders rather than individual files, but the intention is the same, to stop undesirable or unknown software from launching unless you OK it. ...
    Downloads: 43 This Week
    Last Update:
    See Project
  • 6
    ( pro ping )pinger network alert monitor

    ( pro ping )pinger network alert monitor

    Pinger alert, STATICTICAL TABLES, send EMAILs or SMS by SMS GATEWAY

    Thank you for your DONATIONS for Pinger alert, STATICTICAL TABLES, send EMAILs or SMS by SMS GATEWAY. Look on the tab files, select and download the version of the operating system that you need of this slight textual code that requires no system update. Network monitoring analyzer, network scanner with ping, traceroute and beeper alert and warning mail sender. Capable of scanning IP INFINIT, automatic detection of the source of network interruptions without GUI interface configurations....
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Compensato
    Compensato is full suite of diagnostic and troubleshooting tools (focused on troubleshooting Windows environments at the moment) that runs from an Ubuntu based Linux live environment. Once booted a browser winow will launch and the program will automatically look for a Windows installation to work with. You should be able to have this Windows installation visible to the system either internally or externally.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Access Road

    Access Road

    Simulator of access controls

    ...The focus is on IT weak configurations, executing environments (malware analysis) and people authorizations. Reliability and the ability to explain the results are the main objectives. A 80 pages tutorial is provided. A powerful framework allows new simulations to be added. Access Road simulates and explains, combining complete modeling, visual results and detailed texts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Admin Console
    ...Although Microsoft doesn't force this issue, it is good policy to do day to day work on the computer with a regular user account. Doing this can almost eliminate the possibility of getting viruses, malware, or other junk on the computer. This comes at a price though since the Windows system doesn't have an "su" command like the Unix/Linux OS does*. Because of this, a user not logged in as the administrator will need to log out of the machine and then back in as the administrator to do upgrades, installs, etc. Admin Console removes this step, by creating a "workspace" that runs with alternate credentials. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 10
    zCI Computer Inventory System
    zCI is an free and open source web-based computer inventory system. It has client software for Windows and Linux. Both can detect monitor serial number, computer serial number, software information and etc. zCI also includes peripheral inventory and owne
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    WinPatchMgmt will use Microsoft's MBSA and office inventory tools to generate scripts for updating windows clients for OS and all supported office versions. Later versions will integrate with Winventory or open-audIT (winventory.sourceforge.net).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Software repository of the hack://src project. Includes security related software for crypto, vulnerability/patch notification & management, and ultra low level system access for stealth forensics & intrusion detection or malware removal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    netleak is a collection of small perlscripts that detects connectivity between network segments. It is mostly useful to detect "leaks" in large organizations that have private network segments physically separated from the Internet.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Indexes a set of files contained on many supports (directories, CDs, archives -such as zips, tarballs...-, ...) using several indexing methods (file name/date/length/CRC...) to detect dupplicates, find and trash old useless backups.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB