Search Results for "java security for linux" - Page 4

Showing 702 open source projects for "java security for linux"

View related business solutions
  • Get Avast Free Antivirus with 24/7 AI-powered online scam detection Icon
    Get Avast Free Antivirus with 24/7 AI-powered online scam detection

    Get protection for today’s online threats. Free.

    Award-winning antivirus protection, as well as protection against online scams, dangerous Wi-Fi connections, hacked accounts, and ransomware. It includes Avast Assistant, your built-in AI partner, which gives you help with suspicious online messages, offers, and more.
    Free Download
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    Classic HWUT - rename of previous HWUT

    Classic HWUT - rename of previous HWUT

    Software Unit Tests (Language Independent Approach)

    Automation of Unit and System Tests. Tests can be implemented in any language and on many platforms. The flexible approach enables the inclusion of many types of tests, such as memory leak checks (using valgrind), coding rule checks, complexity checks, etc. Tests are run by a simple call to hwut in a base directory of a project. In particular for C, HWUT supports make file generation using 'sos' and 'sols' modes. Remote control-able function stubs may be generated using the 'stub' mode....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    The_Deck_Linux

    Portable Penetration Testing Operating System

    It is an Portable Penetration Testing Operating System designed for Beagle Bone AI. It is an debian based operating system fully packed with all latest Hacking Tools. The Root file system used in this Deck Linux is Ubuntu 20.04 LTS. It can be installed in Beagle Board AI and can use as a replacement for Laptop, Desktop. It can be placed on a drone too. It has a pre-installed MeshDeck (written by Philip Polstra) so it can be runned in a ZigBee network. We can attacks from up to a mile away...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    XSIBackup-DC

    XSIBackup-DC

    VMWare ESXi Virtual Machine Backup, runs in free ESXi

    ©XSIBackup-DC is a C binary that runs in the ©ESXi shell and behaves as a backup and replica service. It follows the same principles as our previous ©XSIBackup editions, that is: a utility that runs in the hypervisor command line and accepts arguments and values stating which VMs to backup and where to copy them. It accepts local and remote SSH paths, thus you can backup and replicate VMs to local datastores or to remote repositories in any additional ©ESXi or Linux server. Download...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    android-backup-processor

    Android adb backup extractor and packer

    Leader badge
    Downloads: 184 This Week
    Last Update:
    See Project
  • MongoDB 8.0 on Atlas | Run anywhere Icon
    MongoDB 8.0 on Atlas | Run anywhere

    Now available in even more cloud regions across AWS, Azure, and Google Cloud.

    MongoDB 8.0 brings enhanced performance and flexibility to Atlas—with expanded availability across 125+ regions globally. Build modern apps anywhere your users are, with the power of a modern database behind you.
    Learn More
  • 5
    git-secret

    git-secret

    A bash-tool to store your private data inside a git repository

    There’s a well-known issue with deploying and configuring software on servers: generally, you have to store your private data (such as database passwords, application secret-keys, OAuth secret keys, etc) outside of the git repository. If you do choose to store these secrets unencrypted in your git repo, even if the repository is private, it is a security risk to copy the secrets everywhere you check out your repo. These files are not version controlled. Filenames, locations, and passwords...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6

    android-backup-toolkit

    Collection of several utilities to work with android backups

    Project name: android-backup-toolkit URL: https://sourceforge.net/p/android-backup-toolkit/ License: various (see individual projects) Authors: various (see individual projects) This project is simply a compilation of the six following projects, both latest source code and binaries: * android-backup-extractor: https://sourceforge.net/projects/adbextractor/ * android-backup-splitter: https://sourceforge.net/p/adb-split/ *...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    Sn1per

    Sn1per

    Attack Surface Management Platform | Sn1perSecurity LLC

    Sn1per Professional is an all-in-one offensive security platform that provides a comprehensive view of your internal and external attack surface and offers an asset risk scoring system to prioritize, reduce, and manage risk. With Sn1per Professional, you can discover the attack surface and continuously monitor it for changes. It integrates with the leading open source and commercial security testing tools for a unified view of your data.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 8
    EMAGNET

    EMAGNET

    Automated hacking tool to find leaked databases with 97.1% accuracy

    Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password. Before using Emagnet, please remember that with great power comes great responsibility. Pastebin patched the vulnerability I previously used in order to get recent uploads, so at the moment it is not possible to get recently uploaded files, you are now limited to all syntaxes exempt the default one (95% get's uploaded as 'text' and this is removed from all recent upload lists). Bruteforce...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Rootkit Hunter, security monitoring and analyzing tool for POSIX compliant systems.
    Leader badge
    Downloads: 395 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    opsi

    opsi

    open source client management system, software deployment

    opsi is a Client Management System for Windows and Linux clients based on Linux servers. opsi is used for automatic OS installation, software depolyment, hard- and software inventory, distributed software depots.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    umi-project

    umi-project

    Just bring Linux for a better world

    U M I, pronounce "ou" "ème" "aie" to an approach of "you & I" expression, is meant to be a derivative of Ubuntu, a Linux distribution. U M I is a system that wants generalist, simple and tailored to your needs. M I perhaps as "Maths Infos", "Mission Impossible", "Micro Imagination", "Museum Incarnation", ..., "Mandela Ideologie", ...,"Magne Isapèt" :), ... ; but in reality M I for "Me Inside", inside Linux, inside Debian, inside Ubuntu. This project designates all logistics associated...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    LabMACOSX
    LabMACOSX: Is a laboratory of applications written in Applescript language. Brutosx is brutus.pl remote login and password bruteforce cracker inserted inside the application Brutosx (need only of Net::Telnet Perl module are required get them at CPAN, while the list of users and passwords, and the service is inserted inside the application). SSHOSX is ssh application client to establish an ssh connection from client to server, Nmaposx is nmap port scanner invoked from the application Nmaposx...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Mastering the Lightning Network

    Mastering the Lightning Network

    Mastering the Lightning Network (LN)

    Mastering the Lightning Network is an O'Reilly Media book, by authors Andreas M. Antonopoulos (@aantonop), Olaoluwa Osuntokun (@roasbeef), Rene Pickhardt (@renepickhardt). It was published on Dec 21, 2021, in paperback and e-book, by O'Reilly Media. It is available everywhere that books are sold. This repository contains the manuscript of the book as published by O'Reilly Media, tagged as firstedition_firstprint. The book describes the Lightning Network (LN), a Peer-to-Peer protocol running...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    XSIBackup-Classic

    XSIBackup-Classic

    Local and over IP backups for ©VMWare ©ESXi 5.1 to 6.7

    ...-backup.html Free VMWare backup solution for the ESXi hypervisor. Linux style command line tool. Crontab with configurable disk space autoprovision, set the room you want to reserve for your backups and rotate them. Full backups may be done with vmkfstools or by means of Rsync and its Delta algorithm (read: https://33hops.com/blog_xsibackup-rsync-considerations.html), to a local datastore or over TCP/IP tunneled through SSH, so any transfer over IP is secure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    DracOS GNU/Linux Remastered
    What is DracOS GNU/Linux Remastered ? DracOS GNU/Linux Remastered ( https://github.com/dracos-linux ) is the Linux operating system from Indonesia , open source is built based on Debian live project under the protection of the GNU General Public License v3.0. This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering. Use a GUI-based tools...
    Downloads: 37 This Week
    Last Update:
    See Project
  • 16
    A series of open source files and programs available to use for developing programs to work with the WowWee Robotics RSMedia Robot. These include a USB serial console, a cross-compiler, a firmware dump program, text-to-speech and source code.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    f8x

    f8x

    红/蓝队环境自动化部署工具

    大多数场景下,在不同的云购买一些 vps 服务器用于部署红 / 蓝队设施,不能做到开箱即用,使用此工具可以快速部署所需要的各类服务。同时兼顾到本地 VM 虚拟机的需求,可以选择走 socket 代理进行安装部署,Proxychains-ng 也会自动安装,只需做好 Proxychains-ng 配置即可。 https://github.com/ffffffff0x/f8x
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Whoami Project

    Whoami Project

    Enhanced privacy, anonymity for Debian and Arch based distributions

    In its simplest and shortest definition, Whoami is a user-friendly privacy/anonymity tool with its ease of use and simple interface. Whoami uses 9+ different modules to ensure the highest possible level of anonymity also solves possible problems without disturbing you with the Bug fixer module, which is in development.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    internet-control

    internet-control

    Control how long your childs computer is connected to the internet

    ... of the multiplayer mode and the social interaction via the internet are missing. As this program is aimed at average parents I placed great emphasis on user-friendliness; both the graphical user interface and the command line interface are easy to use and well explained. NOTE: This was my first coding project. By design it is a potential SECURITY RISK. Now I know better, so I abandoned this project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    [LINUX] Pwnagotchi Connection Share

    [LINUX] Pwnagotchi Connection Share

    Simple bash script for connection sharing.

    ...: In order to make that script working you need to follow the commented instructions inside code. For more info: https://pwnagotchi.ai/configuration/#connecting-to-pi0w-with-microusb-cable-on-linux-host *designed for pwnagotchi but works on any raspberry. Telegram: @xNigredo Pwnagotchi Italia: https://t.me/pwnagotchiitalia
    Downloads: 7 This Week
    Last Update:
    See Project
  • 21
    VPLE

    VPLE

    Vulnerable Pentesting Lab Environment

    VPLE (Linux) Vulnerable Pentesting Lab Environment VPLE is an Intentionally Vulnerable Linux Virtual Machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing Labs. In VPLE bunch of labs are Available. NOTE:- "Only run in VMWare Pls Don’t run in VirtualBox" The default login and password is administrator: password. List Of All Labs in one VM:- 1. Web-DVWA 2. Mutillidae 3. Webgoat 4. Bwapp 5. Juice-shop 6...
    Downloads: 59 This Week
    Last Update:
    See Project
  • 22
    Sudomy

    Sudomy

    Sudomy is a subdomain enumeration tool to collect subdomains

    Sudomy is a subdomain enumeration tool to collect subdomains and analyze domains performing advanced automated reconnaissance (framework). This tool can also be used for OSINT (Open-source intelligence) activities. Easy, light, fast and powerful. Bash script (controller) is available by default in almost all Linux distributions. By using bash script multiprocessing feature, all processors will be utilized optimally. Subdomain enumeration process can be achieved by using active method or passive...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 23
    MaskPhish

    MaskPhish

    Introducing "URL Making Technology" to the world

    MaskPhish is not any Phishing tool. It's just a proof of concept of "URL Making Technology". It is a simple Bash Script to hide phishing URLs under a normal-looking URL (google.com or facebook.com). It can be integrated into Phishing tools (with proper credits) to look the URL legit. Hiding phishing links in normal-looking trust-able links is a bigger part of social engineering. By using this method the attacker owns the trust of the victim, and the victim treats the phishing link as a...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 24
    VENOM C2 shellcode

    VENOM C2 shellcode

    C2 shellcode generator/compiler/handler

    The script will use msfvenom (metasploit) to generate shellcode in different formats ( C# | python | ruby | dll | msi | hta-psh | doc | apk | macho | elf | deb | mp4 | etc ) injects the shellcode generated into one template (example: python) "the python function will execute the shellcode into ram" and uses compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file. It also starts a handler to receive the remote connection (shell or meterpreter) venom...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Mobilinux - Linux for Android

    Mobilinux - Linux for Android

    This application will allow you to install and run Linux on Android !

    ... official mirrors online over the internet. The application requires superuser rights (ROOT).Installing a new operating system takes about 15 minutes. The recommended minimum size of a disk image is 1024 MB (with LXDE), and without a GUI - 512 MB. Noroot Method: Install MOBICONSOLE addon and then install the linux on a non-rooted phone.
    Leader badge
    Downloads: 90 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.