Open Source BSD Security Software - Page 24

Security Software for BSD

  • Level Up Your Cyber Defense with External Threat Management Icon
    Level Up Your Cyber Defense with External Threat Management

    See every risk before it hits. From exposed data to dark web chatter. All in one unified view.

    Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
    Try for Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    A C++/Qt program for use in encrypting and decrypting simple substitution cyphers. These cyphers are often found in newspapers and various puzzle books.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Automated Computer Auditing Daemon - Keep a track of what's going on with your systems: suid, sgid, world writable, hidden and unowned files monitoring as well as important file's md5sums management audits sent to your mailbox on a regular basis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Pure managed C# implementation of well-known cryptographic hash functions such as SHA-family (SHA0, SHA1, SHA2), MD-family (MD2, MD4, MD5), RIPEMD, Tiger, Haval, Snefru and others. Moved to Github: https://github.com/AndreyRusyaev/acryptohashnet
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    ADAM is the Active Defense Algorithm and Model. It is a formally defined process of determining appropriate active response actions in the event of an attack. This implementation shows that active defense can be a legitimate and responsible security tool
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    ADC

    ADC

    configuration auditing and security policy compliance

    ADC is a tool that helps security administrators to maintain policy compliance of configurations and policies on numerous systems. ADC is similar to OpenAudit or OCS, however ADC is designed to collect arbitrary data (not limited to PC inventory), thus it helps information security experts control configurations and policies on remote servers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    ADPasswordNotificator

    Active Directory password expiration notification tool

    Notifies users in the domain of an impending password expiration
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    ADiPaRT
    A Web Based Self Service Active Directory Password Reset Tool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A package of Rijndael, Twofish and Serpent encryption algorithms implemented in x86 assembly. Meant to learn basics of assembly, learn about the algorithms or to be used in a C program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    AES.g is a port of the Advanced Encryption Standard (or Rijndael) to the GPU using a mix of C++ and Cg programming languages. It is portable and built as a class-based program, using OpenGL or DirectX libraries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10

    AESA

    All-purpose Encryption and Security Adaptation

    Starting as a personal study project, I have decided to share this security project. For now, it is a JAVA program that can be used to encrypt and decrypt simple file content (ie files), possibly later evolving into a utility with user interface and/or a library
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    AGT is a powerful console frontend to iptables, supporting nearly all of the iptables extensions. All options can be specified in a configuration file with similar syntax to 'ipf' and 'ipfw'.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    AIM Sniff is a network sniffer specifically designed to pick up messages transmitted using the AIM or MSN clients and their derivatives. All information can be sent to STDOUT or a MySQL DB.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A.I. security app. Development ceased.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    ANDURAS SurfProtect is a PHP application that can be used for virus-scanning withing the application-layer (ISO/OSI) Either http and ftp protocols are already supported within the beta version.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    APing2 is an improved (and C rewritten) version of APing. [dev has ceased, we are waiting for the official NPing project to start]
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ARI (Automated Recource Identifier) is an multithread DNS query tool. Given a root domain name, a character space (alphabet) and min/max word lengths, ARI queries all possible subdomain names.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    This is a very powerfull criptography project that basicaly can be used to transmit or store secure data and study some cipher, hash and compression algorithms to understands how it works.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A set of simple shell scripts to query (via SNMP) any router in an enterprise network for a list of active ARP cache entries. These entries are then merged into a host table with timestamp of last seen entry.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    ethernet host availibality monitoring (logging to sql/file) checks active hosts with database/files active operation - contously sends out arp packets and tries to detect promiscous mode enabled machines
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    ASOPEC is a framework for dealing with security in a diverse range of environments. It abstracts security from your application with a AOP approach. It is written in Java and works in Spring and EJB3 containers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A C# module to allow ASP.Net sites to easily use the TypeKey authentication service.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    AST is a security platform written in python. It's composed by modules that can be installed and loaded on it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    AUM CSPRNG & Stream Cipher

    AUM CSPRNG & Stream Cipher

    A minimal CSPRNG reflecting the Zen of cipher design

    AUM is an extremely fast, small-state, cryptographically secure pseudo-random number generator and stream cipher. AUM exhibits uniform distribution, mixes rapidly, has no detected bias, and comes in three variants: AUM16, with an internal state array of 16+4 32-bit words; AUM32, with an internal state of 32+4 words; and AUM64 with a 64+4-word state. The former permit seeding with a key of up to 512 or 1024 bits, the latter with a 2048-bit key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    AVUpdate is an script-package to automatically update the AntiVir antivirus Software from H+BEDV on Linux/BSD Machines for which H+BEDV haven't created an auto-updater. The scripts can also update the antivir-Tree for the Antivir/Win-Feature "Intrane
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    AVirCAP is a system for manual and / or automated detection of CodeRed and Nimda type of hack attempts and virtually all other kinds of "logable" intrusion attempts. It can work stand alone or together with other additional AVirCAP machines in the LAN/W
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.