2881 projects for "security" with 2 filters applied:

  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 1
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed. Executing the program with command-line arguments causes bigram to generate a random bigram table to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Pecker Scanner

    A static source code analyser for vulnerabilities in PHP.

    A scanner named pecker, written in php,It can check dangerous functions with lexical analysis. to scans files for malicious PHP Code. Github : https://github.com/cfc4n/pecker
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Off-the-Record (OTR) Messaging allows you to have private conversations over instant messaging by providing encryption, authentication, deniability, and perfect forward secrecy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Schuler's OpenCL Scrypt

    My personal version of OpenCL Scrypt tunned for my own video card.

    I've been doing some changes to the OpenCL Scrypt implementation and I've decided to share it. You may use it at your own risk. This implementation seems to be 5% faster in an ATI R9 video card. The original source code has been copied from https://github.com/ckolivas/cgminer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 5
    Web Console

    Web Console

    Web-based application to execute shell commands.

    Web Console is a web-based application that allows to execute shell commands on a server directly from a browser. The application is very light, does not require any database and can be installed in about 3 minutes.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Artemisa
    Artemisa is a honeypot for VoIP (SIP) networks. It is designed to connect to a VoIP domain as a user-agent backend in order to detect malicious activity at an early stage and also adjust the policies of the enterprise in real-time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    linopub

    Remove most publicity

    System base on Hosts file to cut communication of all ADS server ! système basé sur la redirection par le fichier Hosts de Linux
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Botnet Detectors Comparer

    Compares botnet detection methods

    Compares botnet detection methods by computing the error metrics by reading the labels on a NetFlow file. The original NetFlow should have a new column for the ground-truth label, and a new column with the prediction label for each botnet detection method. This program computes all the error metrics (TPR, TNR, FPR, FNR, Precision, Accuracy, ErrorRate, FMeasure1, FMeasure2, FMeasure0.5) and output the comparison results. It also ouputs a png plot. The program can compare in a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    innocence-java

    Replace text with POS equivalent text, in a reversible fashion.

    Program takes (currently) english text sentences, and replaces each word in a given sentence with another word having the same Part of Speach (POS) tag. This creates a new sentence containing none of the original words. This new sentence can then be transmitted to a remote user, and using the same software, "de-crypted" into yielding the original sentence. The software relies on having a known "seed" value for the random number generator, which is known only by the sender and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Azrar

    Azrar

    Encryption addressing long-term data secrecy

    Most of today's cryptographic standards will be broken with tomorrow's computational power. Azrar is a user-friendly tool for the encryption/decryption of single files - preferably compressed archives - addressing long-term data secrecy. Thus, Azrar provides the possibility to use webspace for secure data transfer between two communication/transfer partners (encryption only, network transfer not yet included in current version). Data in encrypted files are secret/private indefinitely. To...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Fileprivacy

    Fileprivacy

    Fileprivacy easily encrypts your files

    Fileprivacy is a small tool which easily encrypts and decrypts files with common algorithms like AES, Blowfish, Triple DES and RSA. You can either use passwords or keyfiles. Since Fileprivacy is coded in Java it should run on all popular operating systems. #######BETA 2####### Bugfix - Beta 1 stopped working if filename was too short or long - added .exe file ####### NOTE ####### This is an early beta implying there are some issues left. The Keygenerator stops working if you...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    *NOTE* Project moved to github.com/cgiwrap/cgiwrap More secure user access to cgi scripting. Runs scripts as the user who owns them. Initial inspiration for suexec. CGIwrap however is server independent.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 13
    web4thejob.org

    web4thejob.org

    Open source to productivity

    Web4thejob is an open source java framework for the rapid development of data-centric web applications. It is ideal for those who seek a component-based event-driven full-stack web development framework, capable of producing elegant desktop-style web applications that can automate any business domain. The framework addresses the automation needs of any business domain introducing "joblets". A joblet encapsulates the relational schema of a business domain using modern orm technology....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    QPass password manager
    QPass is easy to use, open source password manager application with built-in password generator. You can store in it's database such data as passwords and logins which will be encrypted using AES-256 with PBKDF2(number of iterations set by user). Each entry can include additional information about entry such as name, url adress and description.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 15

    Java Sandbox Library

    Runs untrusted code in a safe, sandboxed environment easily.

    This library helps developers easily run untrusted code in a safe, sanboxed environment. It's easy to use and is similar to Java's existing "AccessController.doPriviledged()" methods, so users who are familiar with the standard Java class will already be able to use the library. It is extremely customizable, so you can fine-tune exactly which permissions you wish to grant your untrusted code. It also includes many classes to to the hard work for you and has support for multi-threaded...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Designed to use what is known about users via the /etc/passwd file on unix/linux systems to generate a dynamic dictionary or csv file of more accurate guesses as to what their possible password may be, to look for bad password protection practices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A port of TurboPower OnGuard to CLX and Linux platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    SSH Access Manager

    SSH Key Management solution

    SSH Access Manager is a comprehensive access security management platform that permits IT professionals to easily establish and maintain an enterprise-wide SSH access security solution from a central location. It enables a team of system administrators to centrally manage and deploy ssh keys. This app is intended to be used in rather large environnements where access to unix accounts are handled with ssh keys. SSH Access Manager allows you to maintain user public keys. You can organise...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    ettercap
    Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis. Development has been moved to GitHub, https://github.com/Ettercap/ettercap
    Leader badge
    Downloads: 134 This Week
    Last Update:
    See Project
  • 20
    TACACS+ protocol client library and PAM module in C. This PAM module support authentication, authorization (account management) and accounting (session management)performed using TACACS+ protocol designed by Cisco.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    MathX

    MathX

    Fixed-length Arithmetic-types library

    MathX is a fixed-length arithmetic-types written in pure c++ templates. The goal is to provide signed-integer, unsigned-integer, IEEE-754 float-point and fixed-point types, all with specific number of bits. To this moment, only signed-integer and unsigned-integer are completed for little-endain architecture. Any compiler that support c++03 or c++11 can successfully compile MathX. Refer to README for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Free-SA

    Free-SA is report generating tool for web, proxy and mail log files

    Free-SA is logs processor and report generating tool. It can be used to control traffic usage, to evaluate conformance to the Internet access security policies, to investigate security incidents, to evaluate web server efficiency and to detect troubles with server configuration.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23
    Hide & Reveal
    Composed of a Java steganographic library and GUI to use steganography. Primarily intended for research communities on security and steganography to implement new dissimulation and steganalysis algorithms. More information at www.hidereveal.org
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Proxyp

    Proxyp

    Multithreaded Proxy Enumeration Utility

    Proxyp is a small multithreaded Perl script written to enumerate latency, port numbers, server names, & geolocations of proxy IP addresses. This script started as a way to speed up use of proxychains, which is why I've added an append option for resulting live IP addresses to be placed at the end of a file if need be. Requires IP::Country module and root/administrator privileges. "No man is free who is not master of himself" --Epictetus "For a man to conquer himself is the first...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Secure Hash Algorithm variant of the nist maintained Secure Hash Algorithm. this is a 1024 bit digest. Comments suggestions always welcome. Rick Removed old downloads as they are long outdated. The update is the last version I worked on. Algorithm is based on the SHA2 digest. I may work on an updated version for c++11
    Downloads: 0 This Week
    Last Update:
    See Project