Open Source BSD Security Software - Page 21

Security Software for BSD

  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    Exploits some of the known vulnerabilities of Oracle. Includes SID Enumeration, Passwords tests [common/ dictionary]. Supports attachment of malformed shell codes with TCP packets for crashing the remote server or gain DBA privileges on it.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    PBNJ - a suite of tools to monitor changes on a network over time.
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    PDit is a PHP Auditing and Analyzing Tool, it will cover the most common and significant vulnerabilities that can be found in a php pages/scripts.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    The PKI Framework (PKIF) is a cross-platform library for performing PKIX-compliant certificate processing. It includes support for SCVP, OCSP, CMS and Timestamps. It uses Windows CAPI, NSS or Crypto++ for cryptographic services and hardware support.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Level Up Your Cyber Defense with External Threat Management Icon
    Level Up Your Cyber Defense with External Threat Management

    See every risk before it hits. From exposed data to dark web chatter. All in one unified view.

    Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
    Try for Free
  • 5
    PWSLIB3

    PWSLIB3

    Password Safe encrypted databases, Java library

    Java module to create, read and write Password Safe V3 encrypted databases. The package is a mature offspring from project JPasswords and can be used with Java 1.8. There is an API document available.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Paranoid Android is a security enhancer for Mac OS X. Whenever an application asks the operating system to open a URI, Paranoid Android steps in and asks the user for confirmation before it can be opened.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    PortFusion

    PortFusion

    Distributed reverse / forward proxy and tunneling solution for TCP.

    PortFusion is a minimalistic, cross-platform, transport-layer distributed reverse / forward proxy for TCP written in Haskell + LLVM and released under GPLv3. A single package that makes the most of each platform by tapping into their unique capabilities, combining this power with an intuitive interface, beautiful design and Haskell's excellent support for unprecedented levels of concurrency and parallelism. It strives for the smallest source code size (< 500 lines) while delivering maximum throughput with near zero overhead.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Proxyp

    Proxyp

    Multithreaded Proxy Enumeration Utility

    Proxyp is a small multithreaded Perl script written to enumerate latency, port numbers, server names, & geolocations of proxy IP addresses. This script started as a way to speed up use of proxychains, which is why I've added an append option for resulting live IP addresses to be placed at the end of a file if need be. Requires IP::Country module and root/administrator privileges. "No man is free who is not master of himself" --Epictetus "For a man to conquer himself is the first and noblest of all victories." --Plato "I count him braver who overcomes his desires than him who conquers his enemies; for the hardest victory is over self." --Aristotle "The first and greatest victory is to conquer yourself; to be conquered by yourself is of all things most shameful and vile." --Plato BlackArch: bit.ly/1qBX0pz n0where: bit.ly/1pk3kBs Hacktools: bit.ly/TDesQ1 Seclist: bit.ly/1boeEYe
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Efficient open proxy scanner software suite for Undernet IRC(u).
    Downloads: 1 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    RemoteWAP gives you the ability to take control of a Linux Operating System from anywhere with a WAP enabled mobile phone. This project is being developed in Java. There is plans to support other Operating Systems such as Windows, Solaris, *BSD
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Rinecrypt uses the Gladman implentation of the AES algorithm Rijndael and a SHA256 hash among other things, to encrypt/decrypt a file with a user supplied passsword.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    SIPve

    SIPve

    Videovigilancia, Control de Acceso y Carnetización

    Sistema Integrado de Protección Venezolano con capacidades de Videovigilancia, Control de Acceso y Carnetización para el resguardo físico de instalaciones.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    The overall objective of the SWEB project is to develop a secure, interoperable, open, affordable platform upon which secure cross border government services will be built.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    SD4L is a suite of Linux tools including a graphical user interface which allow the creation of, and access to ScramDisk as well as TrueCrypt encrypted container files. In particular, SD4L provides a Linux driver which enables mounting of containers.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    SecFlow - Secure Flow Analyzation for Java and .NET
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    A privacy and security aware mailing list manager, perfect for allowing closed groups to interact on the Internet without interference from outsiders and former insiders.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Signelf is a toolset written in c++ for signing elf binaries, specifically linux shared object, though in theory, any elf binary may be signed. It uses openssl's libcrypt to RSA sign the library, and the same to validate the signature.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    SonicLog Cruncher
    Perl logfile analyzer for DELL Sonicwall Firewall logfiles. This Perl program (Windows /Linux / Mac), creates an HTML file containing: hits per protocol, mean, median and variance on hourly and weekday basis, RBL statistics, IPS stats, VPN stats, virus stats, surfing statistics, CFS blocked sites stats.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Script to automatically update /etc/hosts.deny due to use of an illegal username or excessive bad passwords. Written to prevent the success of a brute force attack.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    TBFAA/encoder
    A program that encrypts multiple files. It uses new encryption algorithms, such as a Three-Block Feistel chiper, ArchFurry's algorithm and a new hash function. Licensed under the ISC.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    Utilities for measuring characteristics of cryptographic hash functions: avalanche property, (partial) collision search, Maurer's universal statistical test, Filiol's Mobius ANF statistical analisys. EdonC, EdonR, MD5 and SHA-1 hash-plugins included.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    This project is not going to create a new distribution for network security related jobs, but provide several metapackages based on Debian platform to help security geeks who can easily install related open source software.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    TorK is an Anonymity Manager for the KDE Desktop. Browse anonymously on Konqueror/Firefox/Opera. Send anonymous email via the MixMinion network. Use ssh/irc/IM anonymously. Control and monitor your anonymous traffic on the Tor network.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    Ircproxy is transparent IRC content-filtering application. It may be used whenever there is a need of monitoring IRC connections.It may be used to deny specific connections or to behold suspicious IRC traffic.
    Downloads: 1 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.