Showing 12 open source projects for "network security"

View related business solutions
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • Loan management software that makes it easy. Icon
    Loan management software that makes it easy.

    Ideal for lending professionals who are looking for a feature rich loan management system

    Bryt Software is ideal for lending professionals who are looking for a feature rich loan management system that is intuitive and easy to use. We are 100% cloud-based, software as a service. We believe in providing our customers with fair and honest pricing. Our monthly fees are based on your number of users and we have a minimal implementation charge.
    Learn More
  • 1
    ODM

    ODM

    Device Manager for ONVIF-based Network video devices.

    ODM is a ONVIF protocol implementation of Network Video Client (NVC) to manage Network Video Transmitters (NVT), Network Video Storage (NVS) and Network Video Analytics (NVA) devices. Implements Discovery, Device, Media, Imaging, Analytics, Events and PTZ services. Write in C# and uses ffmpeg for media decoding.
    Leader badge
    Downloads: 8,382 This Week
    Last Update:
    See Project
  • 2

    Guardian Eye

    Privacy-first video surveillance software for Windows and Linux. No cl

    Guardian Eye is a privacy-focused video surveillance software designed for homeowners, parents, and small businesses who value their data security. Why Guardian Eye? 100% Privacy - No cloud - Everything stays on YOUR computer - No accounts - No registration required - No tracking - Zero telemetry or data collection - Local only - Your footage never leaves your network Smart Features - AI Motion Detection - Intelligent alerts, reduce false positives - Multi-Camera Support - ONVIF, RTSP, USB webcams - Event Recording - Save only what matters - Remote Access - Secure local network access Cross-Platform - Windows 10/11 (x64) - Linux (Ubuntu 20.04+, Fedora 35+, Debian 11+) - ARM support planned (Raspberry Pi) Pricing - Free version - 2 cameras, all core features - Home ($29) - 4 cameras, one-time payment - Pro ($79) - Unlimited cameras, one-time payment - No subscriptions - Pay once, use forever Documentation: https://getguardianeye.com Support: https://get
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Command Line

    Command Line

    Your Personal Hacking Terminal.

    Command Line is an Open-Source Software for Pentesters and Ethical Hackers it contains many Functionalities which helps Ethical Hackers. It is CLI Based Application use for checking Networks and IP's it also supports functionalities like downloading Packages from Internet Including YouTube.It is also used for Port scanning, IP-Finding it is also useful for checking ping and net speed with the functionality of scanning the net speed by selecting the best server. It also has Host IP finding...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    Polarity Browser

    Polarity Browser

    A fast, secure, stable web browser powered by Chromium and Trident.

    Polarity is a dual engine browser powered by both Chromium and Trident that focuses on system efficiency by bringing low RAM and low CPU usage. This browser was also programmed to be optimized for Windows with an Android version available. Browse the web with an uncomplicated UI that is highly customizable with themes, apps, and extensions from the Polarity Store, GreasyFork, OpenUserJS, and UserStyles. Polarity also comes with a built in password manager which safely encrypts all data to...
    Downloads: 64 This Week
    Last Update:
    See Project
  • HOA Software Icon
    HOA Software

    Smarter Community Management Starts Here

    Simplify HOA management with software that handles everything from financials to communication.
    Learn More
  • 5
    ISP UNLOCKER

    ISP UNLOCKER

    Unlock Your ISP and access all your restricted websites

    Main Functions Links to official domain names only Users can visit linked sites or enter there on sites Easy and user-friendly interface All data is encrypted over the network Non-installer runs from CD HDD or USB Pen Auto updates System requirements Windows 7 SP1 (x86 and x64) Windows 8 (x86 and x64) Windows 8.1 (x86 and x64) Windows 10 (x86 and x64) .NET Framework 4.6.1 Requires Administrator Privileges Processor Intel or AMD x86 or 64 bit 1 GHz or faster processor 1GB of RAM At least 100 megabytes (MB) available space on the hard disk An active internet connection We have set a few website restrictions within the app for security reasons and to stop browser-based Bruteforce attacks all banks and payment gateways are restricted and will not load from within the app
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    chrome-cut-cli

    chrome-cut-cli

    command line tool to scan, detect, stream and control chrome cast

    Basic command line tool to async scan, detect, stream and control chrome cast devices. Great for pranking someone with a chrome cast device in your local network. Plus there is a GUI version here. https://sourceforge.net/projects/chrome-cut/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Chrome-Cut

    Chrome-Cut

    Python3 tool to scan, detect and control chromecast devices

    Basic GUI, CLI tool programmed in Python 3.4 and QT5. It gives you the ability to detect, scan and send some useful HTTP requests "Commands" to endless amount of chromecast devices. As well as the ability to loop the commands so the process of repeating it will be automated with a set duration in-which the looping will be done.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Networking Tools

    This Program Contains Many Useful Network Tools

    This programs contains the following programs: ------------------------------------------------------------------ 1-Wi-Fi Connector : Connects To Available Wi-Fi Network. 2-Router Password Cracker : To Crack Router's Gateway Password. 3-IP Trace : Trace The IP Address For Any Website. 4-IP Tracker : Gets Your WAN IP Address. 5-Lan Messenger : Chat Between Computers On Same LAN Network. 6-Email Sender : For Sending E-mails Using SMTP Server. 7-Email Viewer : For Receiving E-mails...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    MRelay

    Host to Host Network Acceleration and Encryption

    MRelay splits and distributes the traffic of a single TCP connection to several connections and merges the data at the other end. Using this approach, it is possible to achieve high throughput between two points on the network regardless of the delay between two points. MRelay can optionally encrypt the data and exchange some http headers before the relay process to make the traffic look like a regular http file download. This can be used to overcome the highly restrictive firewalls that are...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Pest Control Management Software Icon
    Pest Control Management Software

    Pocomos is a cloud-based field service solution that caters to businesses

    Built for the pest control industry, but also works great for Mosquito Control, Bin Cleaning, Window Washing, Solar Panel Cleaning, and other Home Service Businesses in need of an easy-to-use software that helps you simplify routing, scheduling, communications, payment processing, truck tracking, time tracking, and reporting.
    Learn More
  • 10
    iSpy Camera Security Software

    iSpy Camera Security Software

    Worlds leading motion detection, recording and alerting software

    iSpy uses your USB webcams, IP cams, capture cards, desktops and microphones to detect and record movement or sound and provides security, surveillance, monitoring and alerting services. Media is recorded directly to H264 mp4 files or AVI files. iSpy can stream live and recorded video over the local network, over the web using the ispyconnect portal and to mobile devices and third party software (like gadgets and MediaPortal). iSpy also includes a server project that lets you connect to USB webcams and microphones running on other computers. ...
    Downloads: 45 This Week
    Last Update:
    See Project
  • 11
    A Win32 API based graphical desktop sharing system, it support LZMA compress, MD5 password check, 64bits file transfer, 8bits instruction fast protocol and windows's pack intelligence for reduce useless transfer band.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Virago is a multi-webcam video surveillance software for GNU/Linux systems.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next