Showing 3 open source projects for "security tools"

View related business solutions
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 1
    XSIBackup-Classic

    XSIBackup-Classic

    Local and over IP backups for ©VMWare ©ESXi 5.1 to 6.7

    VMWare backup and replication for ESXi vSphere virtual machines to datastore or differential over IP. No agents, self capable, runs in the hypervisor host, ESXi 5.1, ESXi 5.5 & ESXi <=6.7 compatible, hot backups. Consists in a cron programmable service running in the hypervisor. Hot backups, fully functional, standalone, ideal for dedicated servers. Full version supports quiescing, differential backup, deduplication and much more... Download link:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Metasploitable

    Metasploitable is an intentionally vulnerable Linux virtual machine

    This is Metasploitable2 (Linux) Metasploitable is an intentionally vulnerable Linux virtual machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques. The default login and password is msfadmin:msfadmin. Never expose this VM to an untrusted network (use NAT or Host-only mode if you have any questions what that means). To contact the developers, please send email to msfdev@metasploit.com
    Leader badge
    Downloads: 13,286 This Week
    Last Update:
    See Project
  • 3
    A VM containing a turn-key solution for continuous integration with source code control, build management, automated testing, security analysis, defect tracking, and project management, all using open source tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB