171 projects for "x11" with 2 filters applied:

  • Level Up Your Cyber Defense with External Threat Management Icon
    Level Up Your Cyber Defense with External Threat Management

    See every risk before it hits. From exposed data to dark web chatter. All in one unified view.

    Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
    Try for Free
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • 1
    Live Security/Forensics Linux Distribution, built from scratch and packed full of tools useful for vulnerability analysis, penetration tests, and forensic analysis.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    1. project name eXPimenttk (e-SecureOffice) 2.Language Java (req. - at least j2re) 3.target platform - Cross-platform software 4.problem we want to sole- Encryption, Decryption software, File eraser, Messenger, Mailer,Remailer,FireWall 5 target - user
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Sandfish is a small encryption/decryption tool written in Delphi/Kylix.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    OSA::net project main goal is to create an extensible, scalable framework for management of security related devices in middle-sized and large computer networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 5
    ThreatMan is an IDMEF compliant threat manager application which makes use of a multi-tier architecture. It aims in event and vulnerability correlation from alerts sent by IDSs, firewalls and other IDMEF compliant applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    The John Darm project aims at developping a software that can tests a brute force attack on weak UNIX passwords. It s a multi-client application that dispatches the calculations between the different clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    JPassGen is an usefull strong password generator for secure login protection. (GPL / Java Swing / JNLP)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    sntm is a Qt based GUI snort monitor. Currently, it is capable of monitoring multiple snort sensors in a centralized monitor screen. Each snort sensor creates a SSL encrypted communication thread to connect to the moniter server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    P.A.T.H is a collection of tools for inspecting and hijacking network connections written in Perl. By now it includes a packetgenerator, a rst deamon, a sniffer, an ICMP redirection tool, an ARP redirection tool, an IDS testing tool and an automatic hij
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    A C++/Qt program for use in encrypting and decrypting simple substitution cyphers. These cyphers are often found in newspapers and various puzzle books.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A stable and fast Linux/Unix toolset to aid in the security and ease of use of *Nix.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    TkSftp - an X wrapper for the OpenSSH sftp console client
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    <b>IVJ MUD (Masive Multiplayer Text Game) is a SSL-based soft:<br>-Client (GUI)<br>-Server (GUI)<br>-Applet (GUI)<br>-Protocol (SSL-based, use of localization files that store strings to reduce trafic and allow for instant i18n.<br> LOOKING FOR HELP!</b
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Yet another alarms program with features as file modification alarm (maybe useful for security auditories), alarms file saving possibility and of course time and date alarms. This time written in java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    tcpamp is a simple GUI for tcpdump and tcpreplay written in Qt/C++. Features: save tcpdump expression in XML format, intuitive dump expression maker, friendly replay interface, multi-platform (Qt based).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    SIPES (Security Incident Pollicy Enforcement System) aims to provide an automated e-mail,XML and PKI based system for automated security policy enforcement based on statefull risk assesment and open exchange formats.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Wellenreiter is a GTK/Perl program that makes the discovery, penetration and auditing of 802.11b wireless networks as easy as possible. All three major wireless cards (Prism2 , Lucent, and Cisco) are supported. Usability is one of the main goal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Password generator. The user can choice the characters, write the results in text file, make pronunceable passwords, choice the number of digits and codes. Visual version made in Java and non-visual version in C. Great performance.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Steganopic is a steganography program that hides information in a multitude of file formats without any apparent change to the original file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    Remote Nmap (Rnmap) package contains both client and server programs. Actual idea for this sofware is that various Rnmap clients can connect to one centralized Rnmap server and do their portscannings. Server utilize Nmap scanner.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    QT based Linux web security tool that it is designed to test targets for weak passwords using crack, leech and URL testing functions. Plugins allow potentially any protocol (eg http, ftp) or server to be attacked, while remaining anonymous using proxys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Features of Cyberarmy.com brought direct to your desktop. They don't want it, so this projects kinda dead, wish I hadn't started it so early haha. Any ideas for an alternate purpose (not an IM client): jwinsatt@adelphia.net
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    To develop an auditing package that is compliant with the U.S. Government’s C2 standards for security and, if possible, provides a mechanism for allowing the information collected to be admissible as evidence in a court of law.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Bootable CD Forensics/Virus Scanning/Recovery/PenTesting platform
    Downloads: 10 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.