Open Source Linux System Software - Page 6

System Software for Linux

View 1430 business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 1
    Xplico

    Xplico

    Xplico is a Network Forensic Analysis Tool (NFAT)

    Xplico is a Network Forensic Analysis Tool (NFAT). The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP, MGCP, MEGACO, RTP), IRC, WhatsApp... Xplico is able to classify more than 140 (application) protocols. Xplico cam be used as sniffer-decoder if used in "live mode" or in conjunction with netsniff-ng. Xplico is used also in CapAnalysis: http://www.capanalysis.net
    Downloads: 47 This Week
    Last Update:
    See Project
  • 2
    Developing Open Source AntiVirus Solutions
    Downloads: 21 This Week
    Last Update:
    See Project
  • 3
    ngrep strives to provide most of GNU grep's common features,applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular expressions to match against data payloads of packets. SUPPORT/REPORTING BUGS: please use https://github.com/jpr5/ngrep/issues Thank you!
    Downloads: 13 This Week
    Last Update:
    See Project
  • 4
    SING stands for 'Send ICMP Nasty Garbage'. It is a tool that sends ICMP packets fully customized from command line. Its main purpose is to replace the ping command but adding certain enhancements (Fragmentation, spoofing,...)
    Downloads: 13 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    MailCleaner

    MailCleaner

    Anti Spam SMTP Gateway

    MailCleaner Open Source Edition is now discontinued but will continue under the spamtagger project https://github.com/SpamTagger [antispam] MailCleaner is an anti-spam / anti-virus filter SMTP gateway with user and admin web interfaces, quarantine, multi-domains, multi-templates, multi-languages. Using Bayes, RBLs, Spamassassin, MailScanner, ClamAV. Based on Debian. Enterprise ready. MailCleaner is an anti spam gateway installed between your mail infrastructure and the Internet. It includes a complete GNU/Linux OS and a graphical web interface for user and administrative access. It comes in the form of virtual machine templates.. - fully compatible with any SMTP mail server (Exchange, Zimbra, O365,...)
    Downloads: 8 This Week
    Last Update:
    See Project
  • 6
    BerserkArch

    BerserkArch

    A bleeding-edge, security-centric Arch-based Linux distribution.

    BerserkArch is a security-focused, performance-tuned Linux operating system (OS) based on Arch Linux, designed for developers, hackers, and technical users. A bleeding-edge, security-centric Arch-based Linux distribution crafted for hackers, developers, and nerds alike. Following the Arch Linux philosophy, it is designed to be highly customizable, allowing users to build their environment with only the components they need, rather than having a lot of pre-installed software like some other security distributions (e.g., Kali Linux). As an Arch-based distribution, it benefits from the rolling release model, providing users with the latest software versions and kernel updates. BerserkArch is a dist "designed to make you powerful" for specific use cases like reverse-engineering binaries and automating exploits, rather than being an easy-to-use distribution for general beginners.
    Downloads: 35 This Week
    Last Update:
    See Project
  • 7
    Simplebackup is a cross-platform backup program. It reads a configuration file then builds a compress backup set, finally places the compressed files into another location (a directory, a remote http,ftp,sftp server or even one or more email accounts).
    Downloads: 19 This Week
    Last Update:
    See Project
  • 8
    The Nemesis Project is designed to be a command line based, portable human IP stack for UNIX-like and Windows systems. The suite is broken down by protocol, and should allow for useful scripting of injected packets from simple shell scripts.
    Downloads: 18 This Week
    Last Update:
    See Project
  • 9
    CapAnalysis

    CapAnalysis

    PCAP from another point of view

    CapAnalysis is a web visual tool for information security specialists, system administrators and everyone who needs to analyze large amounts of captured network traffic. Analyze TCP and UDP streams Support multible datasets Perform deep packet inspection Support filtering capability Source Code: https://github.com/xplico/CapAnalysis
    Downloads: 31 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Libnids - NIDS E-component, based on Linux kernel. This library provides IP defragmentation, TCP reassembly and port scan detection.
    Downloads: 17 This Week
    Last Update:
    See Project
  • 11
    blackhat-global

    blackhat-global

    Blackhat-Global-Lite OS Debian Buster based custom distro

    We are excited to announce the availability of Blackhat-Global OS Lite. We’ve condensed the full Blackhat-Global experience into a streamlined operating system that’s fast, user-friendly, desktop-oriented operating system based. Which is available immediately for download. Blackhat-Global Lite is a Debian (Buster) customized Linux-based distribution, built for Penetration Testers. The solution we’ve committed to is lightweight that provides users a perfect blend of power condensed into Blackhat-Global OS Lite without sacrificing our product's functionality. Blackhat-Global OS Lite is offered as XFCE4 desktop edition tailored to address the needs of a variety of pentesters users with more than 2000 penetration testing tools. Blackhat-Global OS Lite can be installed permanently as a robust and fully configurable operating system on a laptop or desktop system, or it can be run effectively as a live installer and supports the addition of persistent storage for thos
    Leader badge
    Downloads: 28 This Week
    Last Update:
    See Project
  • 12
    Clusternet

    Clusternet

    [CNCF Sandbox Project] Managing your Kubernetes clusters

    An open-source project that helps users manage multiple Kubernetes clusters as easily as ‘visiting the Internet’ (thus the name ‘Clusternet’). It is a general-purpose system for controlling Kubernetes clusters across different environments as if they were running locally. Manage multiple Kubernetes clusters (running on public cloud, private cloud, hybrid cloud, or at the edge) from a single management cluster. Deploy Helm Charts, all Kubernetes built-in resources (like Deployments) and CRDs to manage clusters with two-tier application configuration for cluster-specific values.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Doorkeeper

    Doorkeeper

    Doorkeeper is an OAuth 2 provider for Ruby on Rails / Grape

    Doorkeeper is a gem (Rails engine) that makes it easy to introduce OAuth 2 provider functionality to your Ruby on Rails or Grape application. Doorkeeper is an oAuth2 provider built in Ruby. It integrates with Ruby on Rails and Grape frameworks. The installation process depends on the framework you're using. Doorkeeper follows Rails maintenance policy and supports only supported versions of the framework. Currently, we support Ruby on Rails 5 and higher. Extensions that are not included by default and can be installed separately. These applications show how Doorkeeper works and how to integrate with it. Start with the oAuth2 server and use the clients to connect with the server. See list of tutorials in order to learn how to use the gem or integrate it with other solutions/gems.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Kanidm

    Kanidm

    Kanidm: A simple, secure, and fast identity management platform

    Kanidm is a simple and secure identity management platform, allowing other applications and services to offload the challenge of authenticating and storing identities to Kanidm. The goal of this project is to be a complete identity provider, covering the broadest possible set of requirements and integrations. You should not need any other components (like Keycloak) when you use Kanidm - we already have everything you need. To achieve this we rely heavily on strict defaults, simple configuration, and self-healing components. This allows Kanidm to support small home labs, families, small businesses, and all the way to the largest enterprise needs. If you want to host your own authentication service, then Kanidm is for you.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Kubeapps

    Kubeapps

    A web-based UI for deploying and managing applications in Kubernetes

    Kubeapps is an in-cluster web-based application that enables users with a one-time installation to deploy, manage, and upgrade applications on a Kubernetes cluster. Deploy and Manage your Favorite Kubernetes Packages. Browse and deploy packages from public and private registries. Perform day-two operations such as upgrades or rollbacks seamlessly. Create and manage different catalogs isolating them in different namespaces and clusters just using a single Kubeapps instance. Leverage RBAC and OAuth2/OIDC to authenticate and authorize users in Kubeapps.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Leapp

    Leapp

    Leapp is the DevTool to access your cloud

    Let Leapp manage your Cloud credentials locally. Improve your workflow with the only open-source desktop app and CLI you’ll ever need. Your all-in-one solution to assign IAM Cloud access across teams. Cloud credentials are available with a click. Data stored locally encrypted in your System Vault. Work with your Cloud Identities from a single place. Automatic temporary Cloud credentials generation and rotation. Pick your Cloud Provider to add a Leapp Session. Choose from supported access methods or leverage your federated identity with SAML 2.0 compliant identity providers. Automatically provision your sessions from AWS Single Sign-On via Leapp Integration. Start your Session, and Leapp will automatically generate secure short-lived credentials for you. All sensitive data are stored in your local System Vault and used only when needed to provide best-in-class security.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    SafeLine

    SafeLine

    Serve as a reverse proxy to protect your web services from attacks

    SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits. A web application firewall helps protect web apps by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web apps from attacks such as SQL injection, XSS, code injection, os command injection, CRLF injection, LDAP injection, XPath injection, RCE, XXE, SSRF, path traversal, backdoor, brute force, HTTP-flood, bot abuse, among others. By deploying a WAF in front of a web application, a shield is placed between the web application and the Internet. While a proxy server protects a client machine’s identity by using an intermediary, a WAF is a type of reverse-proxy, protecting the server from exposure by having clients pass through the WAF before reaching the server. A WAF protects your web apps by filtering, monitoring, and blocking any malicious HTTP/S traffic traveling to the web application.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Tracee

    Tracee

    Linux Runtime Security and Forensics using eBPF

    Tracee is a runtime security and observability tool that helps you understand how your system and applications behave. It is using eBPF technology to tap into your system and expose that information as events that you can consume. Events range from factual system activity events to sophisticated security events that detect suspicious behavioral patterns.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    coroot

    coroot

    Open-source observability for microservices

    Collecting metrics, logs, and traces alone doesn't make your applications observable. Coroot turns that data into actionable insights for you. Enable system observability in minutes, no code changes required. Each release is automatically compared with the previous one, so you'll never miss even the slightest performance degradation. With integrated Cost Monitoring, developers can track how each change affects their cloud bill. Understand your cloud costs down to any given application. Doesn't require access to your cloud account or any other configurations. Analyze any unexpected spike in CPU or memory usage down to the precise line of code. Don't make assumptions, know exactly what the resources were spent on. Easily investigate any anomaly by comparing it to the system's baseline behavior.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    LKL is a userspace keylogger that runs under Linux on the x86 arch. LKL logs everything that passes through the hardware keyboard port (0x60). It translates keycodes to ASCII with a keymap file.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 21
    Remote Desktop (RD) Connection Manager
    Remote Desktop (RD) Connection Manager allows easy working with remote desktops and servers. It supports: Citrix ICA, Microsoft Windows terminal services (RDP), VMRC, VNC as well as VDI: VMWare Workstation, VMWare ESX and ESXi servers, Microsoft Hype
    Downloads: 11 This Week
    Last Update:
    See Project
  • 22

    cryptmount

    Linux encrypted filesystem management tool

    cryptmount allows management and user-mode mounting of encrypted filing systems on GNU/Linux systems. Filesystems & crypto-swap can be on either raw block devices or ordinary files, with device-mapper (dm-crypt) and loopback devices setup automatically.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 23
    Bypass is an IP forwarding/tunneling tool which can be used where limited bypassing of a firewall is necessary, but relaxing the restrictions in the actual firewall is not an option. The aim is for bypass to be automatic and transparent.
    Downloads: 25 This Week
    Last Update:
    See Project
  • 24
    The OVAL Interpreter is a freely available reference implementation that demonstrates the evaluation of OVAL Definitions. Based on a set of OVAL Definitions the interpreter collects system information, evaluates it, and generates a detailed OVAL Results file. Developed to demonstrate the usability of OVAL Definitions and to ensure correct syntax and adherence to the OVAL Schemas by definition writers, it is not a fully functional scanning tool nor an enterprise scanning tool. It is a simplistic, command-line application that has the ability to execute OVAL Content on an end system. To learn more about organizations that provide OVAL content and tools or otherwise support the OVAL Language, please see the OVAL Adoption Program (http://oval.mitre.org/adoption/).
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 25
    CacheGuard-OS

    CacheGuard-OS

    Web Gateway Appliance

    CacheGuard-OS, amongst other functions, embeds a Web Gateway allowing you to have control over what type of Web content is allowed in your organization, by whom and when. The Web Gateway works as a transparent or explicit Web proxy and blocks malware and other unwanted contents such as ads or adult websites at gateway even in an encrypted format (HTTPS). In addition, its caching capability allows you to cache bandwidth-intensive traffic such as YouTube or Windows updates in order to save your bandwidth. CacheGuard Web Gateway is distributed as an open source OS called CacheGuard-OS that you can install on a virtual or hardware machine of your choice. Once installed on a machine, CacheGuard-OS transforms that machine into a network appliance. In addition to the Web Gateway, CacheGuard-OS includes multitude of other services such as VPN, WAF and WAN optimization. CacheGuard products are especially designed to address SME requirements by providing functional solutions.
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project