Showing 18 open source projects for "network security"

View related business solutions
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place. Icon
    Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place.

    For healthcare Providers and Facilities

    Incredable streamlines and simplifies the complex process of medical credentialing for hospitals and medical facilities, helping you save valuable time, reduce costs, and minimize risks. With Incredable, you can effortlessly manage all your healthcare providers and their credentials within a single, unified platform. Our state-of-the-art technology ensures top-notch data security, giving you peace of mind.
    Learn More
  • 1
    ODM

    ODM

    Device Manager for ONVIF-based Network video devices.

    ODM is a ONVIF protocol implementation of Network Video Client (NVC) to manage Network Video Transmitters (NVT), Network Video Storage (NVS) and Network Video Analytics (NVA) devices. Implements Discovery, Device, Media, Imaging, Analytics, Events and PTZ services. Write in C# and uses ffmpeg for media decoding.
    Leader badge
    Downloads: 8,382 This Week
    Last Update:
    See Project
  • 2

    Guardian Eye

    Privacy-first video surveillance software for Windows and Linux. No cl

    Guardian Eye is a privacy-focused video surveillance software designed for homeowners, parents, and small businesses who value their data security. Why Guardian Eye? 100% Privacy - No cloud - Everything stays on YOUR computer - No accounts - No registration required - No tracking - Zero telemetry or data collection - Local only - Your footage never leaves your network Smart Features - AI Motion Detection - Intelligent alerts, reduce false positives - Multi-Camera Support - ONVIF, RTSP, USB webcams - Event Recording - Save only what matters - Remote Access - Secure local network access Cross-Platform - Windows 10/11 (x64) - Linux (Ubuntu 20.04+, Fedora 35+, Debian 11+) - ARM support planned (Raspberry Pi) Pricing - Free version - 2 cameras, all core features - Home ($29) - 4 cameras, one-time payment - Pro ($79) - Unlimited cameras, one-time payment - No subscriptions - Pay once, use forever Documentation: https://getguardianeye.com Support: https://get
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    KDE-Services

    KDE-Services

    Full features for Dolphin's right click menu on KDE Plasma [5.x|6.x]

    Full features for Dolphin's (File Manager) right click contextual menu on KDE Plasma [5.x|6.x]. Specially designed for OS based on Red Hat.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Command Line

    Command Line

    Your Personal Hacking Terminal.

    Command Line is an Open-Source Software for Pentesters and Ethical Hackers it contains many Functionalities which helps Ethical Hackers. It is CLI Based Application use for checking Networks and IP's it also supports functionalities like downloading Packages from Internet Including YouTube.It is also used for Port scanning, IP-Finding it is also useful for checking ping and net speed with the functionality of scanning the net speed by selecting the best server. It also has Host IP finding...
    Downloads: 6 This Week
    Last Update:
    See Project
  • Comet Backup - Fast, Secure Backup Software for MSPs Icon
    Comet Backup - Fast, Secure Backup Software for MSPs

    Fast, Secure Backup Software for Businesses and IT Providers

    Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
    Learn More
  • 5
    Polarity Browser

    Polarity Browser

    A fast, secure, stable web browser powered by Chromium and Trident.

    Polarity is a dual engine browser powered by both Chromium and Trident that focuses on system efficiency by bringing low RAM and low CPU usage. This browser was also programmed to be optimized for Windows with an Android version available. Browse the web with an uncomplicated UI that is highly customizable with themes, apps, and extensions from the Polarity Store, GreasyFork, OpenUserJS, and UserStyles. Polarity also comes with a built in password manager which safely encrypts all data to...
    Downloads: 64 This Week
    Last Update:
    See Project
  • 6
    motionEyeOS

    motionEyeOS

    A video surveillance OS for single-board computers

    motionEyeOS is a Linux distribution that turns a single-board computer into a video surveillance system. The OS is based on BuildRoot and uses motion as a backend and motionEye for the frontend. Compatible with most USB cameras as well as with the Raspberry PI camera module. Motion detection with email notifications and working schedule. JPEG files for still images, AVI files for videos. Connects to your local network using ethernet or wifi. File storage on SD card, USB drive or network SMB...
    Downloads: 40 This Week
    Last Update:
    See Project
  • 7
    ISP UNLOCKER

    ISP UNLOCKER

    Unlock Your ISP and access all your restricted websites

    Main Functions Links to official domain names only Users can visit linked sites or enter there on sites Easy and user-friendly interface All data is encrypted over the network Non-installer runs from CD HDD or USB Pen Auto updates System requirements Windows 7 SP1 (x86 and x64) Windows 8 (x86 and x64) Windows 8.1 (x86 and x64) Windows 10 (x86 and x64) .NET Framework 4.6.1 Requires Administrator Privileges Processor Intel or AMD x86 or 64 bit 1 GHz or faster processor 1GB of RAM At least 100 megabytes (MB) available space on the hard disk An active internet connection We have set a few website restrictions within the app for security reasons and to stop browser-based Bruteforce attacks all banks and payment gateways are restricted and will not load from within the app
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    chrome-cut-cli

    chrome-cut-cli

    command line tool to scan, detect, stream and control chrome cast

    Basic command line tool to async scan, detect, stream and control chrome cast devices. Great for pranking someone with a chrome cast device in your local network. Plus there is a GUI version here. https://sourceforge.net/projects/chrome-cut/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Chrome-Cut

    Chrome-Cut

    Python3 tool to scan, detect and control chromecast devices

    Basic GUI, CLI tool programmed in Python 3.4 and QT5. It gives you the ability to detect, scan and send some useful HTTP requests "Commands" to endless amount of chromecast devices. As well as the ability to loop the commands so the process of repeating it will be automated with a set duration in-which the looping will be done.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Create and run cloud-based virtual machines. Icon
    Create and run cloud-based virtual machines.

    Secure and customizable compute service that lets you create and run virtual machines.

    Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
    Try for free
  • 10

    Networking Tools

    This Program Contains Many Useful Network Tools

    This programs contains the following programs: ------------------------------------------------------------------ 1-Wi-Fi Connector : Connects To Available Wi-Fi Network. 2-Router Password Cracker : To Crack Router's Gateway Password. 3-IP Trace : Trace The IP Address For Any Website. 4-IP Tracker : Gets Your WAN IP Address. 5-Lan Messenger : Chat Between Computers On Same LAN Network. 6-Email Sender : For Sending E-mails Using SMTP Server. 7-Email Viewer : For Receiving E-mails...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    MRelay

    Host to Host Network Acceleration and Encryption

    MRelay splits and distributes the traffic of a single TCP connection to several connections and merges the data at the other end. Using this approach, it is possible to achieve high throughput between two points on the network regardless of the delay between two points. MRelay can optionally encrypt the data and exchange some http headers before the relay process to make the traffic look like a regular http file download. This can be used to overcome the highly restrictive firewalls that are...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    iSpy Camera Security Software

    iSpy Camera Security Software

    Worlds leading motion detection, recording and alerting software

    iSpy uses your USB webcams, IP cams, capture cards, desktops and microphones to detect and record movement or sound and provides security, surveillance, monitoring and alerting services. Media is recorded directly to H264 mp4 files or AVI files. iSpy can stream live and recorded video over the local network, over the web using the ispyconnect portal and to mobile devices and third party software (like gadgets and MediaPortal). iSpy also includes a server project that lets you connect to USB webcams and microphones running on other computers. ...
    Downloads: 45 This Week
    Last Update:
    See Project
  • 13
    guarder

    guarder

    ipcguader is an embeded software system for IP Camera

    ipc guader is an embeded software system for IP Camera which provides the whole function of IPC like audio/video streaming server, alarm process, PTZ control, local/remote storage, two-way voice, DDNS, P2P service. Funcitions list: Liveview:local liveview(BNC out), network liveview, support IE/Firefox/safari Recording:recording to MicroSD/u-disk/NAS MediaServer:support rtsp/rtp and own protocol streaming server. WebServer:set image/streaming/audion/ptz/network/wireless/event...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    snavtclient is free open source network client program for CCTV security surveillance digital video recorders (DVR) manufactured by the AV TECH Corporation. For more information please see software web site: http://snavtclient.epipe.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    ­A useful collection scripts (backup, security, system management, games, network, etc.). This project development in Bash + Zenity.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    A Win32 API based graphical desktop sharing system, it support LZMA compress, MD5 password check, 64bits file transfer, 8bits instruction fast protocol and windows's pack intelligence for reduce useless transfer band.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Virago is a multi-webcam video surveillance software for GNU/Linux systems.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    WebLOQ IO is a Java NIO framework which allows for tens of thousands of concurrent TCP/IP connections through a very small thread pool (assuming proper OS and network settings). There is built in support for SSL and non-SSL connections.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next