Showing 209 open source projects for "defense"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Photo and Video Editing APIs and SDKs Icon
    Photo and Video Editing APIs and SDKs

    Trusted by 150 million+ creators and businesses globally

    Unlock Picsart's full editing suite by embedding our Editor SDK directly into your platform. Offer your users the power of a full design suite without leaving your site.
    Learn More
  • 1
    AzureAD Attack Defense

    AzureAD Attack Defense

    This publication is a collection of various common attack scenarios

    AzureAD-Attack-Defense is a community-maintained playbook that collects common attack scenarios against Microsoft Entra ID (formerly Azure Active Directory) together with detection and mitigation guidance. The repository is organized into focused chapters — for example: Password Spray, Consent Grant, Service Principals in Azure DevOps, Entra Connect Sync Service Account, Replay of Primary Refresh Token (PRT), Entra ID Security Config Analyzer, and Adversary-in-the-Middle — each written...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Kata Containers

    Kata Containers

    Build a standard implementation of lightweight Virtual Machines (VMs)

    Kata Containers is an open source container runtime, building lightweight virtual machines that seamlessly plug into the container ecosystem. Kata Containers is an open source community working to build a secure container runtime with lightweight virtual machines that feel and perform like containers, but provide stronger workload isolation using hardware virtualization technology as a second layer of defense. Since launching in December 2017, the community successfully merged the best parts...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    SafeLine

    SafeLine

    Serve as a reverse proxy to protect your web services from attacks

    SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits. A web application firewall helps protect web apps by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web apps from attacks such as SQL injection, XSS, code injection, os command injection, CRLF injection, LDAP injection, XPath injection, RCE, XXE, SSRF, path traversal, backdoor, brute force, HTTP-flood, bot abuse, among others. By...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    Apache APISIX

    Apache APISIX

    The cloud-native API gateway

    ... is especially suitable for API management under micro-service system. You can use Apache APISIX as a traffic entrance to process all business data, including dynamic routing, dynamic upstream, dynamic certificates, A/B testing, canary release, blue-green deployment, limit rate, defense against malicious attacks, metrics, monitoring alarms, service observability, service governance, etc.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    Cryptol

    Cryptol

    Cryptol: The Language of Cryptography

    Cryptol is a domain-specific language (DSL) for specifying and verifying cryptographic algorithms. Developed by Galois, Cryptol provides a high-level mathematical syntax for describing cryptographic primitives and enables formal verification of algorithm properties. It is used in academic, research, and defense sectors to validate correctness and security through symbolic execution and model checking, ensuring critical cryptographic code is free of design flaws.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    GOAD (Game of Active Directory)

    GOAD (Game of Active Directory)

    game of active directory

    GOAD (Gather Open Attack Data) is a security reconnaissance framework for collecting, enriching, and visualizing open-source intelligence (OSINT) around hosts, domains, and certificates. It automates queries to certificate transparency logs, passive DNS, subdomain enumeration, web endpoints, and other public threat feeds. The tool aggregates results into structured formats and can produce interactive graphs to highlight relationships between entities (e.g. domain → IP → cert → ASN). Analysts...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    Arcjet

    Arcjet

    Arcjet JS SDKs. Rate limiting, bot protection, email verification

    Arcjet helps developers protect their apps in just a few lines of code. Implement rate limiting, bot protection, email verification, and defense against common attacks. Native security for Bun, Next.js, Node.js, SvelteKit, Vercel, Netlify, Fly.io, and other modern platforms. Customizable protection for signup forms, login pages, API routes, and your whole app. Test security rules locally. Protection that works in every environment. No agent is required.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    macOS Security Compliance

    macOS Security Compliance

    macOS Security Compliance Project

    ...), National Aeronautics and Space Administration (NASA), Defense Information Systems Agency (DISA), and Los Alamos National Laboratory (LANL).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Santa

    Santa

    A binary authorization system for macOS

    ... and server. Santa is built to help protect users by stopping the spread of malware and analyzing what's running on a computer, but is by no means a total security system. Ideally Santa works as a part of a defense-in-depth strategy, and other measures should be in place to protect hosts.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 10
    Rebuff

    Rebuff

    LLM Prompt Injection Detector

    A self-hardening prompt injection detector. Rebuff is designed to protect AI applications from prompt injection (PI) attacks through a multi-layered defense. Rebuff is still a prototype and cannot provide 100% protection against prompt injection attacks. Add canary tokens to prompts to detect leakages, allowing the framework to store embeddings about the incoming prompt in the vector database and prevent future attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Latte

    Latte

    The safest & truly intuitive templates for PHP

    The first truly secure and intuitive templates for PHP. The most common critical vulnerability in websites is Cross-Site Scripting (XSS). It allows an attacker to insert a malicious script into a page that executes in the browser of an unsuspecting user. It can modify the page, obtain sensitive information or even steal the user's identity. Templating systems fail to defend against XSS. Latte is the only system with an effective defense, thanks to context-sensitive escaping. Latte is based...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Mindustry

    Mindustry

    An open-source sandbox tower defense game

    Mindustry is a tower-defense sandbox factory game. Build supply chains of conveyor belts to fuel your turrets, produce materials for building, and defend your structures from waves of enemies.
    Downloads: 83 This Week
    Last Update:
    See Project
  • 13
    BadBlood

    BadBlood

    Flls Microsoft Active Directory Domain with a structure

    ... varied scenarios. The project is driven by a single entry script (Invoke-BadBlood.ps1) and a collection of modular components that create OUs, seed users and groups, set ACLs, configure LAPS scenarios, and generate other attack/defense artifacts for lab use. Because it modifies a real AD forest, BadBlood requires high privileges (Domain Admin and Schema Admin) to run and the README warns strongly that it is not responsible for cleanup if used in production.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    99 Nights In The Forest Script / Keyless

    99 Nights In The Forest Script / Keyless

    99 Nights Script No Key: Kill Aura, Auto Combat, Auto Craft, & other

    Download 99 Nights In The Forest Script | Keyless for free. 99 Nights Script Keyless : Kill Aura, Auto Farm, Auto Craft, & other. Transform into any creature, fly or noclip freely, see clearly with fullbright, teleport instantly, move faster with infinite jump, auto-gather and refill resources, and dominate battles with built-in killaura, defense boosts, and more.
    Downloads: 620 This Week
    Last Update:
    See Project
  • 15
    Hollow Knight Silksong Cheat Menu

    Hollow Knight Silksong Cheat Menu

    Hollow Knight Silksong Cheat + Mod Menu . Free Download

    Silksong Mod Menu Plus is a universal cheat menu for Hollow Knight: Silksong. It adds an AI assistant, teleport system, ability management, and a wide range of cheat functions, giving you full control over the game. 📌 Advantages Perfect for both experimenting and casual play. Clean and user-friendly interface. Works alongside other mods. Enable/disable anytime without restarting. 🔹 Cheat Features in Silksong Mod Menu Plus 🛡️ Survival & Combat ⚡ Mobility & Exploration 🔧...
    Leader badge
    Downloads: 242 This Week
    Last Update:
    See Project
  • 16
    Plants vs Brainrots Script

    Plants vs Brainrots Script

    Plants Vs Brainrots Script - Auto Farm, Auto Sell, Teleport

    Plants vs Brainrots is a Lua-based script that reimagines the classic Plants vs Zombies formula with a humorous and creative twist. Instead of fighting ordinary zombies, you’ll face off against chaotic Brainrots – strange, unpredictable enemies that bring new challenges to the battlefield. This script is designed for modders, developers, and Lua learners, offering both a playable framework and an open space for experimentation. It can serve as a fun game prototype, a learning project for...
    Leader badge
    Downloads: 282 This Week
    Last Update:
    See Project
  • 17
    GpgFrontend

    GpgFrontend

    A Free, Easy-to-Use, Cross-Platform OpenPGP Crypto Tool.

    GpgFrontend is a Free, Open Source, Powerful, Easy-to-Use, Compact, Cross-Platform OpenPGP Crypt Tool. Also, it's one of the excellent GUI Frontends for Modern GnuPG (gpg). By using GpgFrontend, you can quickly encrypt and decrypt text or files. You can also digitally sign your text or files.GpgFrontend does not need to depend on any server, therefore it may be one of the last lines of defense in protecting your privacy. Please use this tool to transmit or store information that you regard...
    Downloads: 20 This Week
    Last Update:
    See Project
  • 18
    UUSEC WAF

    UUSEC WAF

    AI and semantic technology Web Application Firewall

    UUSEC WAF Web Application Firewall is an industrial grade free, high-performance, and highly scalable web application and API security protection product that supports AI and semantic engines. It is a comprehensive website protection product launched by UUSEC Technology, which first realizes the three-layer defense function of traffic layer, system layer, and runtime layer.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Phish Alert  Button for Outlook

    Phish Alert Button for Outlook

    Free Outlook plugin to report phishing emails with one click

    ... and newer versions, requires minimal setup and works in both on-premise and Microsoft 365 environments. Features: – One-click phishing email reporting – Compatible with Outlook 2013 and later – Simple configuration and fast deployment – Sends reports to a custom email address – Fully customizable: customize button name, ribbon and other details. Empower your users to become part of your phishing defense strategy with the free Phish Alert Button for Outlook.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 20
    Adaptive Intelligence

    Adaptive Intelligence

    Adaptive Intelligence also known as "Artificial General Intelligence"

    Adaptive Intelligence is the implementation of neural science, forensic psychology , behavioral science with machine-learning and artificial intelligence to provide advanced automated software platforms with the ability to adjust and thrive in dynamic environments by combining cognitive flexibility, emotional regulation, resilience, and practical problem-solving skills.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    ... 🔐 and the importance of understanding malicious tools for defense and prevention strategies. Fire Your Cannon Now! This is for EDUCATIONAL PURPOSES ONLY thanks!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Mech Station Beta

    Mech Station Beta

    Mech Station Beta - Tower Defense like Game

    The mech platform floats through levels and progresses over time. It differs significantly from traditional Tower Defense or Survival games. One of the game's key features is the fine-tuned balance of hundreds of gameplay parameters, based on player-collected statistics. However, this feature is not yet fully implemented — it requires a server machine, which I currently don’t have due to personal circumstances. If anyone can provide a server machine or a service like Google Virtual Machine...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    SecureDel

    SecureDel

    Secure File Deletion

    SecureDel is a small utility that does not require installation and can be used directly from a USB drive. The program is very lightweight, very easy to use, very fast, and uses six different deletion algorithms. It does not leave any trace in the system where it acts and performs deletions in such a way that deleted files can no longer be recovered. It generates a report after each deletion to display the processing times. SecureDel 1.2.3 Released. Good Deletion!
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    Betabot

    Betabot

    BDEF, WIE, MInfantry AI opponent

    A basic Bot for old half life 1 mod Support: -Base Defense version 1605: Betabot0001 -War In Europe beta 3: Betabot0101 -Mobile Infantry Beta 1- Training camp: betabot0200
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    mdtscan

    mdtscan

    Scans for software

    ... VOIP & printers. It does MAC lookups if you take the time to setup the configuration. It does remote registry for add remove programs. It does cursory brute force password audits upon request. It has a toy like interface. Rated Tol Barad 6 to 8 in under 7 minutes. Scans 300k machines per hour. Defense network coverage within Swiss extrapolation. I'd been requested to program this & provide it after 10 years. Requestors include MSFT, KPMG, USM, RUM, Newman Springs. License Ms-PL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.