Open Source Mac Security Software - Page 12

Security Software for Mac

View 896 business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 1
    A client for the passcracking.com online database ob MD5 and SHA1 Hashes. It allows to generate MD5 and SHA1-Hashes from passwords and querying the database to get the password for a given hash.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Passkeyper is an encrypted password keeper program for the Sharp Zaurus and runs in the PersonalJava environment. It uses the legendary BlowfishJ implementation of Blowfish for encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    The Password tools bundle is one application combining three tools - the Analyser (shows the "strength" of your password, the Generator (generates "strong" passwords) and the Manager (stores passwords securely using Rijndael).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Peer Agent is a system that enable a group of users to carry out automated complex interaction via email services without relying on a trusted third party.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Get the most trusted enterprise browser Icon
    Get the most trusted enterprise browser

    Advanced built-in security helps IT prevent breaches before they happen

    Defend against security incidents with Chrome Enterprise. Create customizable controls, manage extensions and set proactive alerts to keep your data and employees protected without slowing down productivity.
    Download Chrome
  • 5
    A Lightweight P2P Threat Analysis Bus
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A Perl CGI JavaScript framework for implementing a MD5 based encryption Secure login on both client and server machines. The password is never stored or transmitted as plain text. Also encrypts cookies to maintain sessions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    PhpFairlySecureAuthenticationUtility Fairly Secure and *simple* to use user and group authentication library for web site security written in php.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Home of the Antispam for all fields mod ! Development board > http://www.phpbbantispam.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Plum Cave Twofish

    Plum Cave Twofish

    A version of Plum Cave that uses the ChaCha20 and Twofish ciphers

    A version of Plum Cave that employs the "ChaCha20 + Twofish-256 CBC + HMAC-SHA3-512" authenticated encryption scheme for data encryption and ML-KEM-1024 for quantum-resistant key exchange.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Plum Harbor

    Plum Harbor

    An open-source file sharing app built using Next.js and Perplexity.

    An open-source file sharing app built using Next.js and Perplexity. The app employs ML-KEM-1024, ChaCha20, Serpent-256, and HMAC-SHA512 to ensure data confidentiality and integrity. The app is also equipped with a dedicated password vault. Check it out at https://plum-harbor.netlify.app/ GitHub page: https://github.com/Northstrix/plum-harbor Codeberg page: https://codeberg.org/Northstrix/plum-harbor The app is available in English and Hebrew. German version is available here: SourceForge: https://sourceforge.net/p/plum-harbor-deutsch GitHub: https://github.com/Northstrix/plum-harbor-deutsch Codeberg: https://codeberg.org/Northstrix/plum-harbor-deutsch Deployed app: https://plum-harbor-deutsch.netlify.app/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A more modern wiki focusing on open technologies like SOAP and XML, and upon a more focused form of wiki software that incorporates the elements of traditional content creation, such as from journals, books or periodicals.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    PortFusion

    PortFusion

    Distributed reverse / forward proxy and tunneling solution for TCP.

    PortFusion is a minimalistic, cross-platform, transport-layer distributed reverse / forward proxy for TCP written in Haskell + LLVM and released under GPLv3. A single package that makes the most of each platform by tapping into their unique capabilities, combining this power with an intuitive interface, beautiful design and Haskell's excellent support for unprecedented levels of concurrency and parallelism. It strives for the smallest source code size (< 500 lines) while delivering maximum throughput with near zero overhead.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This program makes it possible to transfert files from a computer to another via SSL/TCP/IP. It is composed of a part to listening of possible requests, the server, and of one or more customers. Pure Java program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A complex log parser that allows for the scripting of actions, updating databases, on-the-fly configuration and much more. Aggregate logs from disparate systems (i.e. Apache, IPS/IDS and various sensors) and take action on events through external scripts
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Peer-to-Peer direct communication services
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Proxmox Firewall (Proxwall) is a flexible Linux firewall based on Shorewall and many other open source tools. It is designed to install on commodity hardware within minutes. It can handle complex and fast changing network environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    ProxyDetector is a free & OpenSource Proxy detector using PHP4 or PHP5. Can be used on Linux (Unix, etc) and also on Win. He also can know if an user using the TOR network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Proxyp

    Proxyp

    Multithreaded Proxy Enumeration Utility

    Proxyp is a small multithreaded Perl script written to enumerate latency, port numbers, server names, & geolocations of proxy IP addresses. This script started as a way to speed up use of proxychains, which is why I've added an append option for resulting live IP addresses to be placed at the end of a file if need be. Requires IP::Country module and root/administrator privileges. "No man is free who is not master of himself" --Epictetus "For a man to conquer himself is the first and noblest of all victories." --Plato "I count him braver who overcomes his desires than him who conquers his enemies; for the hardest victory is over self." --Aristotle "The first and greatest victory is to conquer yourself; to be conquered by yourself is of all things most shameful and vile." --Plato BlackArch: bit.ly/1qBX0pz n0where: bit.ly/1pk3kBs Hacktools: bit.ly/TDesQ1 Seclist: bit.ly/1boeEYe
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    PyGestPayCrypt is the Python implementation of GestPayCrypt and GestPayCryptHS classes for italian Banca Sella GestPay online credit card payment system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Python Port Scanner
    A Simple Port Scanner in Python. You need python installed on your pc before you can use the script!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    This is a free PHP login script that allows users to log in and sign up for pages on your website. You can have unlimited members, page, groups and permission masks. The administration panel and group panel use AJAX for fast functionality.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    RTCP is a network man-in-the-middle service for protecting TCP, enabling fault-tolerant servers to recover their connections when restarting.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Provides efficient, effective implementations of 32- and 64-bit hash functions based on Rabin fingerprints / irreducible polynomials, in Java. Also provides integration with java.security.MessageDigest API.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Downloads: 0 This Week
    Last Update:
    See Project