Open Source Security Software - Page 4

  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 1
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Derived from TrueCrypt 6.3 release, I added some command line options to "TrueCrypt Format.exe" to allow TrueCrypt volumes to be created without using the graphical user interface
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    The Cryptix ASN.1 Kit aims at facilitating the task programmers face in coding, accessing and generating java-bound, both types and values, defined as ASN.1 constructs, or encoded as such.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Crypto

    A powerful data encrypting tool.Encrypt data inside files.

    Crypto encrypts data inside any file.Not only the data is encrypted but also hidden.You can choose any type of file and hide your valuable data inside it.But the host file's size does not increase.So none can notice that you have Gigabytes of secret data inside a tiny 10kb text file.Try it now.Totally free.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Get the most trusted enterprise browser Icon
    Get the most trusted enterprise browser

    Advanced built-in security helps IT prevent breaches before they happen

    Defend against security incidents with Chrome Enterprise. Create customizable controls, manage extensions and set proactive alerts to keep your data and employees protected without slowing down productivity.
    Download Chrome
  • 5
    CryptoDock

    CryptoDock

    CryptoDock is a tool that hosts various crypto. algorithms.

    CryptoDock is free multi-platform application written in Java that hosts various hash and modern cryptographic algorithms you can use to protect your sensitive data on your computer. Available cryptographic algorithms: 1. NLSE-1 2. One Time Pad 3. AES Available hashing algorithms: 1. MD5 2. SHA-1 3. SHA-256 4. SHA-512 IMPORTANT: In order to run CryptoDock you need to have Java installed on your computer. Java is free and can be downloaded from - http://www.java.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    CryptoPy is a pure python implmentation of cryptographic algorithms and applications. The algorithms are developed for readability more than speed. The collection now includes IEEE 802.11i specific algorithms that generated the test vectors for 802.11i.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Login Alert is a small one click wizard GUI that sets up scripts on your Ubuntu/Debian Linux box. SSH Brute Force prevention through iptables, SSH and local login email alert notifications, able to install fail2ban and denyhost with a tick of the mouse.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Dotnet library for PC/SC-based access to Mifare Desfire smartcards. It is based on copyrighted opensource SpringCard SDK. Please check project wiki for license limitations
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This program is meant to cleanup your computer system of unwanted adaware and temporary internet files. Optionally you can also clear cookies and history.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Photo and Video Editing APIs and SDKs Icon
    Photo and Video Editing APIs and SDKs

    Trusted by 150 million+ creators and businesses globally

    Unlock Picsart's full editing suite by embedding our Editor SDK directly into your platform. Offer your users the power of a full design suite without leaving your site.
    Learn More
  • 10
    PHP script to protect DIV content (e.g. private data) from indexation by bots, spammers etc...The content is encrypted in the source and decrypted by entering the key in the CAPTCHA.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    EAESCrypt

    Extended AES Cryptography

    EAEScrypt is a utility that is designed to protect sensitive data using secure encryption. It uses the Advanced Encryption Standard (AES) as published by the Federal Information Processing Standards Publications (FIPS PUBS) and issued by the National Institute of Standards and Technology (NIST). The official version of AES allows only 128-bit, 192-bit or 256-bit keys, and EAESCrypt is fully compliant with FIPS-197 when using these values. But EAEScrypt can use any key size from 128-bit to 2048-bit. EAESCrypt is a command line utility. The instaler for Windows 7 provides some basic functionality in the context menu for the files in Windows Explorer, to encrypt and decrypt them, as well as to manage the encryption keys. Go to the EAESCrypt Web Site to download the installer and the source code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    EbraSha Dos Attacker

    EbraSha Dos Attacker

    Create Simple Dos Attack On A Networks

    EbraSha Dos Attacker Create By Ebrahim Shafiei For Create Simple Dos Attack On A Networks
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Engrane3D is a fully working LiveCD OS powered by Slackware/Slax with a personalized set of tools to set, configure clusters, tools for hosting serving, a built-in parallel 3D renderer and a nice set of compilers and libs (SDL,MPI, Mesa).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Enigma critta file

    Enigma critta file

    Software per crittare qualsiasi tipo di file con una chiave privata

    Enigma critta file è un software nato per crittare qualsiasi tipo di file con una chiave privata o pubblica. Per chiave privata si intende una parola o frase (max 127 caratteri) che viene utilizzata dal programma per crittare/decrittare il file selezionato, impostata dall'utente nell'aposita casella. Per chiave pubblica si intende un modo per crittare un file senza conoscere la chiave. Una volta crittato un file con una chiave pubblica non sarà più possibile decrittarlo, solo chi ha generato la chiave pubblica sarà in grado di farlo. Pertanto se si desidera che una qualunche persona ci mandi un messaggio cifrato, basta distribuire la propria chiave pubblica. Sistemi operativi supportati : Windows™ x86 / 64bit
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    FIRECOPS++ is a firewall, connection tracker and packet customizer system for Microsoft Windows developed under the .NET framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Free Agents DIDS is a distributed intrusion detection system that you place on each host on your network. Agents intercommunicate with aes encryption, automatically alert you, and secure your network for free!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Free Tiger

    Free fast implementation of tiger and the TTH algorithms

    Free Tiger aims to provide a fast C implementation of the tiger and TTH hash algorithms in order to provide a performing hasher. It also aims to provide pure implementations of tiger and when possible TTH in other languages for reference.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    GNet Server - Network compression client/server software. Compresses data over slow networks to save on the cost of bandwidth. Server is developed for Unix and Windows platforms, The client will run on Windows based PCs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    HOBA - No Passwords at all!

    HOBA - No Passwords at all!

    HTTP Origin Bound Authentication (HOBA)

    An implementation of http://tools.ietf.org/html/draft-ietf-httpauth-hoba that allows users to do web authentication without any passwords at all. This is for web site admins. Main client is JS. Check it out at https://hoba.ie/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    HausmiSEP

    An open workshop for secure application

    Hausmi Security Enabled Platform is a series of frameworks created mainly in C++ on POSIX, designed to develop secure and powerful component based server systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    IPRARU

    IPRARU

    Computer security tool for the information gathering stage

    Computer security tool for the information gathering stage, obtaining the IP address through redirection and social engineering.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Inscribe | Data Security and Privacy

    Inscribe | Data Security and Privacy

    Inscribe is a easiest tool to encrypt your valuble data from everyone

    Make your data encrypted in a few clicks! Inscribe by Crypto Ststems helps you cut down development time by providing you with a flexible data encryptor interface. Inscribe is one of the easiest data encryptor tools available today. It also gives you the freedom to encrypt as much data as you like given the fact that it is a desktop app.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Intrusion Detection and Defense System

    Intrusion Detection and Defense System for windows

    Its a light weight Intrusion detection and defense system works with windows firewall to protect any windows operating system from attacks that are intended to hack the server or provide any operational damage. By keeping eye on network activities and event viewer logs, ServerCloak capture and log any failed/denied inbound calls from IPv4 as well as IPv6. Once the calls reaches its limit, the service immediately tells windows firewall to block the attacking IP by adding a denial inbound firewall rule. This software is specially developed to protect windows server from hackers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Juggernaut v1000 Beta v1.2

    Juggernaut v1000 Beta v1.2

    Juggernaut v1000 Anti-Cryptography

    Juggernaut v1000 can crack MD4, MD5, MD6, SHA1, SHA256, SHA384, SHA512, HMAC-MD5, HMAC-SHA1 and also all the Base-64 version of them in minutes... but the cracking process depends in your password wordlist/dictionary.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    SyncShare Server is a secure messaging and real-time collaboration platform. Build solutions to connect people, data, and applications through firewalls and mobile devices. It handles all networking, security issues and lets one focus on the business
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.