Showing 43 open source projects for "security"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • 1
    UseGroup

    UseGroup

    Usegroup is a user and group manager.

    This program allows you to add or remove users, define user options, add, edit or delete groups from Linux/Unix systems. Usegroup works in user or administrator mode, the interface uses the GTK dialogs of Yad or Zenity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Portable Moodle - MoodlEasy

    Portable Moodle as easy as it gets for beginners to learn LMS

    ... immediately after clicking on executable file via automatically opened browser. For security, it is recommended to use this outdated version only for learning offline and change passwords both in Moodle and PHPMyAdmin.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Automated_Quiz

    Automated_Quiz

    A Shell Script for Quizzing the whole class of students and log result

    Please download the above zip file and extract it to a secret folder and run the quiz.sh script from that folder in your terminal program, as shown in the youtube videos : https://youtu.be/kQi0XlIaT9M and https://youtu.be/prwKN5DiFp0 You may change the contents of the quiz.txt file to your liking, while maintaining the format of it. Note: Press Enter/Return key after typing on your Terminal, to proceed to the next step, while testing the quiz.sh script. Also, increase the terminal...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    internet-control

    internet-control

    Control how long your childs computer is connected to the internet

    ... of the multiplayer mode and the social interaction via the internet are missing. As this program is aimed at average parents I placed great emphasis on user-friendliness; both the graphical user interface and the command line interface are easy to use and well explained. NOTE: This was my first coding project. By design it is a potential SECURITY RISK. Now I know better, so I abandoned this project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 5
    Zero Install
    Zero Install is a decentralised cross-distribution software installation system. Create one package that works everywhere! With dependency handling and automatic updates, full support for shared libraries, and integration with native package managers
    Leader badge
    Downloads: 2,580 This Week
    Last Update:
    See Project
  • 6
    Jacksum

    Jacksum

    a free cross platform checksum utility, supports 58+ hash algorithms

    Development of this project has been moved to https://github.com/jonelo/jacksum. This site has been left for historical purposes ONLY, you find older Jacksum versions here. Please visit the GitHub site for current development. Jacksum 1.7.0 is a platform independent checksum utility (written entirely in Java) for computing and verifying (integrity check) checksums, CRC and hashes (fingerprints). It supports 58 popular hash algorithms and a lot of unique features.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    Web Security Dojo

    Web Security Dojo

    Virtual training environment to learn web app ethical hacking.

    Web Security Dojo is a virtual machine that provides the tools, targets, and documentation to learn and practice web application security testing. A preconfigured, stand-alone training environment ideal for classroom and conferences. No Internet required to use. Ideal for those interested in getting hands-on practice for ethical hacking, penetration testing, bug bounties, and capture the flag (CTF). A single OVA file will import into VirtualBox and VMware. There is also an Ansible script...
    Leader badge
    Downloads: 114 This Week
    Last Update:
    See Project
  • 8
    Spot-On
    Seriously entertaining dolphins on echo networks. The official source repository is located at https://github.com/textbrowser/spot-on. Downloads are located at https://github.com/textbrowser/spot-on/releases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    WinBOLT

    WinBOLT

    Maintenance Automation Utility

    This tool is created by a Technician for the Technicians. This will simplify your job on the Windows Operating System. Working with these systems, more often than not tasks like maintenance become perpetual. With that in mind, my ultimate goal and function of WinBOLT were simple, fool proof secure automation. WinBOLT automates the standard process of annoying Windows Updates, Malware Scans, running CCleaner etc. This tool is simple, effective and powerful. Check out our...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Neo's ebook

    Neo's ebook

    Neo's Series Technology Document

    Series Documents: Netkiller Linux ,Ubuntu, CentOS, FreeBSD, Shell ; Netkiller Developer, Version Control ; Netkiller Database, LDAP ; Netkiller Architect ; Netkiller Security ; Netkiller Cisco IOS ; Netkiller Postfix
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    smartIDS

    Lightweight intrusion detection for IoT and embedded devices.

    The aim of the project is a lightweight intrusion detection library for embedded devices which supports MSP430 and ARM Cortex based devices. Features include DSP/SIMD support, IoT and embedded protocols, distributed operation, event and history management, tool supported configuration and visualization. There is a Java port that supports less features.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Shell Keylogger

    Shell Keylogger

    Quick, simple, terminal inspired keylog tool for beginners

    Very basic, easy to read, easy to use keylogger tool. Developed for education purposes, and runs on the terminal. Includes option to run in stealth mode
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    ODS3 Virtual Machine Challenge

    ODS3 Virtual Machine Challenge

    Virtual Machine Image To Test Penetration Skills

    The ODS3 Virtual Machine Challenge are downloadable images that can be run as VMWare or VirtualBox instances. The Idea behind the challenge is to test and exercise web application penetration testing in a controlled environment. These images are great for cyber security students, penetration testers and hobbyist. Care should be taken if installed on an Internet access host as the application are purposely vulnerable to attack and exploitation.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    JPC
    The fast x86 PC emulator in 100% pure Java
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Pibox

    Pibox

    Images of pre-configured Raspberry Pi operating systems.

    ... for username/password and then change the passwords for security as well as creating any new users if you plan on using them. Notes specific to each OS will be listed in the relevant README files.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    projectbamboo

    projectbamboo

    Applications and shared infrastructure for humanities research.

    Project Bamboo began in 2008 with support of the Andrew W. Mellon Foundation, and began technology development in October 2010 after an 18-month planning phase involving more than a hundred universities in the U.S., Europe, and Australia. The Bamboo Technology Project (BTP) involved ten campuses. The BTP adapted research environments for humanities scholars; and developed/adopted infrastructure, with a focus on federated IAM, to allow librarians and technologists to better support humanities...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Export Import Directory Tool to help building metadirectory
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Holynix
    Similar to the de-ice pentest CDs and pWnOS, Holynix is an Linux vmware image that was deliberately built to have security holes for the purposes of penetration testing. Visit http://pynstrom.com/forum/ for help setting up or completing the challenge.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    Skope Surveillance Suite [DEPRECATED]

    Skope Surveillance Suite [DEPRECATED]

    Monitor Activity on your Computer by Auto Screenshot Capture

    **NOTE: This project is deprecated due to obsolete code. If you are interested, a replacement project was started at github.com/gundermanc/skope-3. It is incomplete, but mostly functional. I am looking for developers to take over this project. Welcome to Skope. Skope is the intuitive, user friendly, and free open source monitoring solution from Gundersoft. Not just a keylogger, Skope is literally a "Skope" into your computer's usage. During the Skope setup, you are prompted to type in...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Restrict Application

    Easy to use parental control

    NOTICE: THIS SOFTWARE IS NO LONGER DEVELOPED. It was initially developed for Win XP and slightly tested on Win 7. I have never tried it with Win 8 or later. I have not planned any future developments or bug fixes. Original description: Restrict Application is powerful parental control software that can easily block adult content or any other site, game or software. Restrict Application can be set to update it's configuration from remote server allowing to update configuration...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Auto File Selection

    Detect all the "important" files from your computer.

    The main aim of this project is to design and develop a mechanism that can find all the “important” files inside a computer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    One day there will be a Windows 9, coming after Windows 8 and current Windows 7. Why not starting working now on a Windows 9 similar open source OS ten years before it appears instead of still working on it 10 years after it will become obsolete?
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    This is a simple encryption tool to work with home-grown encryption algorithms. It can run as either a GUI, a command-line application, or a network proxy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    This is a module for PAM. It's purpose is to quiz a user who is attempting to log into a system with very simple questions that verify that the entity logging in is human.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The kernel network stack may behave not as expected, especially in the case of receiving packets. With Ianus it is possible to bypass the kernel network stack and to develop your own network stack in user space or other tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next