XML-Security Plug-In
. The Eclipse XML-Security Plug-In
allows you to experiment with the W3C
recommendations on digital signatures
and encryption and to learn all about
their back...
Enter
MCP Server (Rad Security)
. The RAD Security MCP Server is an MCP
server that provides AI-powered security
insights for Kubernetes and cloud
environments. It integrates with the RAD
Sec...
Enter
aws-security-viz
. Need a quick way to visualize your
current aws/amazon ec2 security group
configuration? aws-security-viz does
just that based on the EC2 security
group ingre...
Enter
Security VMS
. Features:Intuitive, Responsive and
Resource-effective . This is an
application that can also be fetched
from
https://sourceforge.net/projects/security-vms/....
Enter
InstallFix Security Suite
. Uses NSIS as a coding language to
create tiny installer-like programs that
remove cookies, junk, and adware. While
no longer in development, it remains
usefu...
Enter
Simple Security Policy Editor
. SSPE: Simple Security Policy Editor
is a simple distributed firewall with an
central ascii administration. It uses
two plain manually edited ascii-files
and ...
Enter
WS-Security Wrapper
. WS-Security Wrapper is an adapter
between XML applications and SOAP Web
services implementing WS-Security. It
handles all aspects of SOAP/WS-Security
encodin...
Enter
XML-Security Plug-In
. The Eclipse XML-Security Plug-In
allows you to experiment with the W3C
recommendations on digital signatures
and encryption and to learn all about
their back...
Enter
Acegi Security System for Spring
. Spring Security (formerly Acegi
Security) is now hosted on the Spring
Framework website:
http://www.springframework.org/spring-security/.
Audience: Developer...
Enter
visualNets Graphical Network Security
. visualNets is a log analysis utility
that graphically plots network packets
over time. Plot source or destination IP
or port addresses in a graphical format ...
Enter
SIP Proxy - VoIP Security Test Tool
. With SIP Proxy you will have the
opportunity to eavesdrop and manipulate
SIP traffic. Furthermore, predefined
security test cases can be executed to
find wea...
Enter
OWASP Security Shepherd
. The OWASP Security Shepherd project
enables users to learn or to improve
upon existing manual penetration testing
skills. Utilizing the OWASP top ten as a
ch...
Enter
Network Security Response Framework
. The Network Security Response
Framework (NSRF) allows for testing
different computer security response
engines and methodologies. It supports
simulated and r...
Enter
Linux Security Auditing Tool
. Linux Security Auditing Tool (LSAT)
is a post install security auditing
tool. It is modular in design, so new
features can be added quickly. It checks
many s...
Enter
Umbrella Security Project
. Umbrella is a security mechanism that
implements a combination of
Process-Based Access Control (PBAC) and
authentication of Digital Signed
Binaries (DSB). Um...
Enter
MCP Server (Rad Security)
. The RAD Security MCP Server is an MCP
server that provides AI-powered security
insights for Kubernetes and cloud
environments. It integrates with the RAD
Sec...
Enter
Automatic Security
. A security scanner coded in a tcl/tk
extension for use with linux and unix
systems . It automatically downloads
patches and exploits how ever testing of
them...
Enter
JPA Security
. JPA Security is an Access Control
Solution for the Java Persistence API.
JPA Security enables you to configure
access control to your JPA Entity Beans
based ...
Enter
Hcon Security Testing Framework
. HconSTF is Open Source Penetration
Testing Framework based on different
browser technologies, Which helps any
security professional to assists in the
Penetra...
Enter
SCAP Security Guide
. The purpose of this project is to
create security policy content for
various platforms, Red Hat Enterprise
Linux, Fedora, Ubuntu, Debian, SUSE
Linux Enterpri...
Enter
buck-security
. ATTENTION: buck-security has now
moved to github. Please find the lastest
relaeses at
https://github.com/davewood/buck-security/releases
This SourceForge pag...
Enter
JWT Spring Security Demo
. This is a demo for using JWT (JSON
Web Token) with Spring Security and
Spring Boot. I completely rewrote my
first version. Now this solution is
based on the ...
Enter
The Linux Basic Security Module
. The Linux BSM is an auditing tool
that aims to bring the capabilities of
Sun's Solaris Basic Security Module
to Linux. Audience: System
Administrators. P...
Enter
Inscribe | Data Security and Privacy
. Make your data encrypted in a few
clicks! Inscribe by Crypto Ststems helps
you cut down development time by
providing you with a flexible data
encryptor inte...
Enter
PHP Security Scanner
. PHP Security Scanner is a tool
written in PHP intended to search PHP
code for vulnarabilities. MySQL DB
stores patterns to search for as well as
the results ...
Enter
Acegi Security Extensions Project
. Acegi-ext aims to provide additional
capabilities to Acegi Security
Framework,such as declarative management
of ACL entries,support for Acegi
Security in por...
Enter
Open Source Security Gateway
. OSSEG is an IMS compatible security
gateway that adds firewall, VPN, IDS,
IPS, and monitoring functionalities to
VoIP networks. Audience: System
Administrato...
Enter
BRST - Border Router Security Tool
. The BRST - Border Router Security
Tool is a web based utility for
generating secure configuration files
for Cisco routers in a border
configuration. The admi...
Enter
RAMDisk Security OS
. RAMdisk-based Operating System for
conducting Security Audits. Includes
hping2, xprobe, netcat, lsh, wardialer,
and more -- all on 1 computer disk. Runs
off ...
Enter
Darkfire Security Project
. A stable and fast Linux/Unix toolset
to aid in the security and ease of use
of *Nix. Audience: Other Audience,
System Administrators. User interface:
Cocoa (...
Enter
SecSy: Security-oriented Log Synthesis
. SecSy is a tool for security-oriented
log synthesis. Besides basic synthesis
properties (cases per day, office hours,
randomized activity duration, .), its d...
Enter
phpcs-security-audit v3
. phpcs-security-audit is a set of
PHP_CodeSniffer rules that finds
vulnerabilities and weaknesses related
to security in PHP code. It currently
has core PHP r...
Enter
Automated Security Tools
. Automated Security Tools (autosec)
aims to provide automatic tools which
network administrators may use to help
check and test the security of their
network....
Enter
OWASP Find Security Bugs
. The SpotBugs plugin for security
audits of Java web applications. Find
Security Bugs is the SpotBugs plugin for
security audits of Java web
applications. It ...
Enter
Linux Security Enhancer
. Linsec is a shell script firstly
designed for slackware linux 10 and now
supports most of linux distros. Linsec
improves security of Linux systems
(kernel pa...
Enter
AAA Security Framework for Avalon
. A security framework for providing
AAA functionality for Avalon based
applications. The pluggable architecture
for underlying datastores and
Authentication, ...
Enter
visualNets Graphical Network Security
. visualNets is a log analysis utility
that graphically plots network packets
over time. Plot source or destination IP
or port addresses in a graphical format ...
Enter
Acegi Security System for Spring
. Spring Security (formerly Acegi
Security) is now hosted on the Spring
Framework website:
http://www.springframework.org/spring-security/.
Audience: Developer...
Enter
WS-Security Wrapper
. WS-Security Wrapper is an adapter
between XML applications and SOAP Web
services implementing WS-Security. It
handles all aspects of SOAP/WS-Security
encodin...
Enter
SIP Proxy - VoIP Security Test Tool
. With SIP Proxy you will have the
opportunity to eavesdrop and manipulate
SIP traffic. Furthermore, predefined
security test cases can be executed to
find wea...
Enter
Virtual Reality Security
. The purpose of this project is to
develop and maintain a Virtual Reality
network interface to provide for network
management and security for heterogenous
ne...
Enter
WebWalker Internet Security Tool
. QT based Linux web security tool that
it is designed to test targets for weak
passwords using crack, leech and URL
testing functions. Plugins allow
potential...
Enter
Folder Security Viewer
. This software supports network
administrators to access the correct
security role for a specific folder
without having to load windows explorer
which will lo...
Enter
JPA Security
. JPA Security is an Access Control
Solution for the Java Persistence API.
JPA Security enables you to configure
access control to your JPA Entity Beans
based ...
Enter
project Cubic Security
. Audience: Security. User interface:
Win32 (MS Windows). Programming
Language: C#. Database Environment:
SQL-based. Categories:Desktop Publishing...
Enter
SecurityLevel - Manage security settings
. Started as part of the Google Summer
of Code 2005, this tool adjusts security
settings on Linux systems, including
firewall and SELinux policies. This tool
a...
Enter
Network Security Scorebot
. Scorebot is a scoring framework which
monitors the integrity of various
network services for the purpose of
scoring a network security exercise.
Audience: Go...
Enter
JWT Spring Security Demo
. This is a demo for using JWT (JSON
Web Token) with Spring Security and
Spring Boot. I completely rewrote my
first version. Now this solution is
based on the ...
Enter
Huorong Security
. Operation mode: EDR operation system,
network-wide threat awareness With the
Huorong terminal as the cornerstone,
while protecting users, it detects
various ...
Enter
Distributed Active Security against DDoS
. A linux kernel implementation of a
distributed protocol to provide
pro-active defence against Distributed
Denial of Service (DDoS) attacks.
Audience: Informa...
Enter
Symfony Security Bundle
. Symfony Security Bundle is a powerful
tool for adding authentication and
authorization to Symfony applications.
It provides mechanisms for managing user
role...
Enter
kkp NetBIOS Security Tool
. kkp is a security tool based on a
vulnerability in handling of the NetBIOS
protocol by the Microsoft Windows 9x
platform. It is meant to be the most
reliable...
Enter
Blindeye Security Monitoring
. The Blindeye web application is a
front end for the Blindeyes Distributed
Command Framework. Blindeye will be
specifically tailored towards the
viewing and d...
Enter
Agentic Security
. The open-source Agentic LLM
Vulnerability Scanner.
Features:Customizable Rule Sets or Agent
based attacksDocumentation
availableExamples availableComprehensi...
Enter
phpcs-security-audit v3
. phpcs-security-audit is a set of
PHP_CodeSniffer rules that finds
vulnerabilities and weaknesses related
to security in PHP code. It currently
has core PHP r...
Enter
SMSec - Simplicity Makes Security
. SMSec is a free , open source, GPLed
implementation of two-factor
authentication via SMS (Short Message
Service). It uses SMSD to "talk"
to GSM modem...
Enter
OWASP Find Security Bugs
. The SpotBugs plugin for security
audits of Java web applications. Find
Security Bugs is the SpotBugs plugin for
security audits of Java web
applications. It ...
Enter
Symfony Security Core
. Part of the Symfony framework, the
Security Core component provides the
foundational tools for managing
authentication, authorization, and
access control in ...
Enter
HellFire-IRC Security Services
. Hellfire (Formally Sentinel) is a set
of IRC statistical and operator services
for Hybrid, ircd-ratbox, csircd, +CS,
and Bahamut ircd's.Hellfire provides...
Enter
Security Tools Collection
. Collection of open source security
tools that enhance the ability of people
and companies to secure their
environment. These tools will build upon
the founda...
Enter
phpBB-Security Enhanced
. A phpBB BBS modded version, with
security in mind. If you are looking for
a secure phpBB, you are in the right
Project. Audience: End Users/Desktop.
Programm...
Enter
Omega IRC Security Services
. Omega IRC Security Services - is a
*nix based, modularized security
services coded in C. Which supports
multiple IRCd protocols.
Features:Dynamic configurati...
Enter
Spring Security
. Spring Security is a powerful and
highly customizable authentication and
access-control framework. It is the
de-facto standard for securing
Spring-based appl...
Enter
AAA Security Framework for Avalon
. A security framework for providing
AAA functionality for Avalon based
applications. The pluggable architecture
for underlying datastores and
Authentication, ...
Enter
JAK Security Suite
. Open Source Security Suite
Verschl�ssselung mit Blowfish/Twofish/
AES. Datenl�schung mit Guttmann
(Default)/Pseudorandom Data/US DoD
5220-22.M Methode. User ...
Enter
Security-Tools Database
. Security-Tools Database is an easy to
use tool to manage tool-tipps (e.g. from
the SecurityFocus.com Newsletters and
other sources). Simply copy + paste tipp...
Enter
SempGate Network Security Accelerator
. FPGA based hardware card which
implements above 4 giga bps network
traffic throughput under affordable
hardware cost. With linux driver and
kernel patch, sof...
Enter
Security Code Scan
. Detects various security
vulnerability patterns. SQL Injection,
Cross-Site Scripting (XSS), Cross-Site
Request Forgery (CSRF), XML eXternal
Entity Injection ...
Enter
Fatsec Security Driver
. Emulate filesystem security on
Windows 9x systems with FAT16/32
filesystems. Files, directories, and
drives can be assigned
read/write/execute permissions wh...
Enter
Host.Deny- Your Fast Track Security Reso
. A HOST.DENY file is a file that, when
loaded to the /etc folder of your web
server, will ban any paople using the
IP's on this compiled list. There is
al...
Enter
Domain Analyzer Security Tool
. Domain analyzer is a security
analysis tool which automatically
discovers and reports information about
the given domain. Its main purpose is to
analyze doma...
Enter
Video security client/server system
. ARGUVISION - an enterprise class
Video surveillance system. ARGUVISION is
based on distributed Linux or Unix
cluster architecture, with up to 1000
cameras pe...
Enter
Symfony Security Bundle
. Symfony Security Bundle is a powerful
tool for adding authentication and
authorization to Symfony applications.
It provides mechanisms for managing user
role...
Enter
Security Center
. This toolkit has complete security
Package start from Tweak manager ,
Updater , Virus scanner ,Proxy server
and many more This will be help full for
user fro...
Enter
Agentic Security
. The open-source Agentic LLM
Vulnerability Scanner.
Features:Customizable Rule Sets or Agent
based attacksDocumentation
availableExamples availableComprehensi...
Enter
Opportunistic E-Mail-Security-System
. Securing mails without involving
user. Secures them as often as possible
if it is possible. Shows security-state
and process of mails and mail-partners.
Audi...
Enter
SMSec - Simplicity Makes Security
. SMSec is a free , open source, GPLed
implementation of two-factor
authentication via SMS (Short Message
Service). It uses SMSD to "talk"
to GSM modem...
Enter
Secure layers for improving security
. Squrelayerproxy is a project aimed
for adding more privacy for existing
messengers, proxy and security features.
For windows you have a free and good
HTTP pr...
Enter
hack://src Security Suite
. Software repository of the hack://src
project. Includes security related
software for crypto, vulnerability/patch
notification & management, and ultra
lo...
Enter
OWASP Juice Shop
. OWASP Juice Shop is probably the most
modern and sophisticated insecure web
application! It can be used in security
trainings, awareness demos, CTFs and as
a...
Enter
Security Code Scan
. Detects various security
vulnerability patterns. SQL Injection,
Cross-Site Scripting (XSS), Cross-Site
Request Forgery (CSRF), XML eXternal
Entity Injection ...
Enter
Enterprise Laptop Security System
. It was made for Universities/Colleges
to manage their students' laptops in
order to prevent theft cases. If your
university or college is prone to such c...
Enter
Code Quality and Security for C#
. Sonar offers a single cohesive
solution with a consistent set of
metrics and hundreds of static analysis
rules to detect your coding issues
early. Plus fast ...
Enter
DefectDojo
. DefectDojo is a security
orchestration and vulnerability
management platform. DefectDojo allows
you to manage your application security
program, maintain pro...
Enter
iSpy Camera Security Software
. iSpy uses your USB webcams, IP cams,
capture cards, desktops and microphones
to detect and record movement or sound
and provides security, surveillance,
moni...
Enter
Code Quality and Security for C#
. Sonar offers a single cohesive
solution with a consistent set of
metrics and hundreds of static analysis
rules to detect your coding issues
early. Plus fast ...
Enter
SEWOL: Security-oriented Workflow Lib
. SEWOL provides support for the
handling of workflow traces. It allows
to specify the shape and content of
process traces in terms of entries
representing the...
Enter
Code Quality and Security for Java
. Hundreds of unique rules to find Java
bugs, code smells & vulnerabilities.
Sonar static analysis helps you build
and maintain high-quality Java code. Cov...
Enter
Prowler
. Prowler is an Open Source security
tool to perform AWS security best
practices assessments, audits, incident
response, continuous monitoring,
hardening, and ...
Enter
Deffend.net Otus
. Deffend.net Otus aims to help small
companies and individuals to avoid cyber
security threats through cyber hygiene.
It runs on Windows desktop and looks for...
Enter
Sihas
. Deffend.net Sihas aims to help small
companies and individuals to avoid cyber
security threats through cyber hygiene.
It runs on Windows desktop and looks fo...
Enter
Docker Scout CLI
. Designed to identify security issues,
outdated packages, and potential
compliance problems within container
images, Docker Scout surfaces dependency
vulnerab...
Enter
Advanced Persistent Security
. The architecture of the system is
integrated by different Fingerprinting
mechanisms. The system is designed from
a core that avoids the detection of
sdhash a...
Enter
KubeArmor
. KubeArmor is a runtime Kubernetes
security engine. It uses eBPF and Linux
Security Modules(LSM) for fortifying
workloads based on Cloud Containers,
IoT/Edge,...
Enter
Code Quality and Security for Java
. Hundreds of unique rules to find Java
bugs, code smells & vulnerabilities.
Sonar static analysis helps you build
and maintain high-quality Java code. Cov...
Enter
ZAP
. The OWASP Zed Attack Proxy (ZAP) is
one of the world�s most popular free
security tools and is actively
maintained by a dedicated international
team of volun...
Enter
AAT Direct Connect Hub Project
. Scripts and hub mods written to
enhance OpenDCHub. The Hub-Security
script filters unregistered users by
country, and adds op commands and
security features....
Enter
Agnitio
. A tool to help developers and
security professionals conduct manual
security code reviews in a consistent
and repeatable way. Agnitio aims to
replace the adh...
Enter
VeraCrypt
. VeraCrypt is a free disk encryption
software brought to you by IDRIX
(https://www.idrix.fr) and based on
TrueCrypt 7.1a. It adds enhanced
security to the alg...
Enter
Mythril
. Mythril is a security analysis tool
for EVM bytecode. It detects security
vulnerabilities in smart contracts built
for Ethereum, Hedera, Quorum, Vechain,
Roo...
Enter
Advanced Persistent Security
. The architecture of the system is
integrated by different Fingerprinting
mechanisms. The system is designed from
a core that avoids the detection of
sdhash a...
Enter
Eolos VoipAudit
. Visual Framework Tool to scan/sniff
address space, enumerate users, crack
credentials, pattern based dial spoofing
and security reporting for Voip
protocols....
Enter
Prowler
. Prowler is an Open Source security
tool to perform AWS security best
practices assessments, audits, incident
response, continuous monitoring,
hardening, and ...
Enter
ZAP
. The OWASP Zed Attack Proxy (ZAP) is
one of the world�s most popular free
security tools and is actively
maintained by a dedicated international
team of volun...
Enter
LibreWolf-for-Void
. A fork of Firefox, focused on
privacy, security and freedom. This
project is an independent fork of
Firefox, with the primary goals of
privacy, security and ...
Enter
openGalaxy
. This project aims to provide a method
for listening on a serial port and
decode incoming messages from a Galaxy
security control panel. The messages are
tran...
Enter
Terrascan
. Detect compliance and security
violations across Infrastructure as Code
to mitigate risk before provisioning
cloud native infrastructure. As you
embrace Infr...
Enter
NetSPOC
. NetSPOC is a Network Security POlicy
Compiler. A tool for simplified security
management of networks with multiple
security domains. NetSPOC takes a
descript...
Enter
AAT Direct Connect Hub Project
. Scripts and hub mods written to
enhance OpenDCHub. The Hub-Security
script filters unregistered users by
country, and adds op commands and
security features....
Enter
Mythril
. Mythril is a security analysis tool
for EVM bytecode. It detects security
vulnerabilities in smart contracts built
for Ethereum, Hedera, Quorum, Vechain,
Roo...
Enter
Eolos VoipAudit
. Visual Framework Tool to scan/sniff
address space, enumerate users, crack
credentials, pattern based dial spoofing
and security reporting for Voip
protocols....
Enter
Arkime
. Arkime is an open source,
large-scale, full packet capturing,
indexing, and database system designed
to augment existing security
infrastructure by storing a...
Enter
TinySecuritySuite
. Tiny Security Suite is a simple
collection of portable security tools
that are essentials. It consist of
Clamwin Antivrius, PAPI Firewall, and
the developer ...
Enter
VeraCrypt
. VeraCrypt is a free disk encryption
software brought to you by IDRIX
(https://www.idrix.fr) and based on
TrueCrypt 7.1a. It adds enhanced
security to the alg...
Enter
Sn1per
. Sn1per Professional is an all-in-one
offensive security platform that
provides a comprehensive view of your
internal and external attack surface and
offers a...
Enter
Tsunami
. Tsunami is a general purpose network
security scanner with an extensible
plugin system for detecting high
severity vulnerabilities with high
confidence. When...
Enter
Enlightn
. Enlightn scans your Laravel app code
to provide you actionable
recommendations on improving its
performance, security & more.
We'll perform over 100 ...
Enter
Catnip
. Servlet container extensions that
help web developers write full featured
Java web applications.
Features:Security: XSS Filter/Valve
infrastructure for Apach...
Enter
LibreWolf-for-Void
. A fork of Firefox, focused on
privacy, security and freedom. This
project is an independent fork of
Firefox, with the primary goals of
privacy, security and ...
Enter
Terrascan
. Detect compliance and security
violations across Infrastructure as Code
to mitigate risk before provisioning
cloud native infrastructure. As you
embrace Infr...
Enter
NetSPOC
. NetSPOC is a Network Security POlicy
Compiler. A tool for simplified security
management of networks with multiple
security domains. NetSPOC takes a
descript...
Enter
OSCAL
. NIST is developing the Open Security
Controls Assessment Language (OSCAL), a
set of hierarchical, XML-, JSON-, and
YAML-based formats that provide a
standard...
Enter
Tsunami
. Tsunami is a general purpose network
security scanner with an extensible
plugin system for detecting high
severity vulnerabilities with high
confidence. When...
Enter
fleet
. Fleet exposes familiar concepts from
traditional MDMs like custom attributes
and dynamic grouping, but in a way that
lets you work directly with data and eve...
Enter
FATE
. FATE (Federated AI Technology
Enabler) is the world's first
industrial grade federated learning open
source framework to enable enterprises
and instituti...
Enter
lynis
. Lynis is a battle-tested security
tool for systems running Linux, macOS,
or Unix-based operating system. It
performs an extensive health scan of
your systems...
Enter
firejail
. Firejail is a SUID program that
reduces the risk of security breaches by
restricting the running environment of
untrusted applications using Linux
namespaces...
Enter
Enlightn
. Enlightn scans your Laravel app code
to provide you actionable
recommendations on improving its
performance, security & more.
We'll perform over 100 ...
Enter
FaceAccess Facial Recognition System
. With the growing need to exchange
information and share resources,
information security has become more
important than ever in both the public
and private se...
Enter
Prueba
. This is an application that can also
be fetched from
https://sourceforge.net/projects/prueba/.
It has been hosted in OnWorks in order
to be run online in an ...
Enter
Catnip
. Servlet container extensions that
help web developers write full featured
Java web applications.
Features:Security: XSS Filter/Valve
infrastructure for Apach...
Enter
Laravel CSP
. By default, all scripts on a webpage
are allowed to send and fetch data to
any site they want. This can be a
security problem. Imagine one of your
JavaScript...
Enter
BunkerWeb
. Being a full-featured web server
(based on NGINX under the hood), it will
protect your web services to make them
"secure by default". BunkerWeb
integ...
Enter
SIGOF
. SIGOF (Security Information Graphics
Oriented Forensic) aims at synthetizing
security log, stored in a acid/base
database schema, in order to provide a
graph...
Enter
secheck
. secheck is a script which imitates
currently existing log checkers but with
a focus on security. secheck does some
basic system security checking, then
email...
Enter
fleet
. Fleet exposes familiar concepts from
traditional MDMs like custom attributes
and dynamic grouping, but in a way that
lets you work directly with data and eve...
Enter
SSH-MITM
. ssh man-in-the-middle (ssh-mitm)
server for security audits supporting
publickey authentication, session
hijacking and file manipulation.
SSH-MITM is a man i...
Enter
Deckhouse
. Deckhouse is a Kubernetes platform
that allows you to create homogeneous
K8s clusters on any infrastructure. It
manages clusters comprehensively and
�automag...
Enter
Sippts
. Sippts is a set of tools to audit
VoIP servers and devices using SIP
protocol. Sippts is programmed in Python
and it allows us to check the security
of a VoI...
Enter
Abdal Header Analyzer
. Abdal Header Analyzer is a software
for analyzing site and web server
headers. As you know, headers contain
information that security experts and
hackers use...
Enter
imntr
. imntr (inode monitor) can be used to
montior activity on files or
directories. Monitoring is accomplished
through the inotify API, which is
available on Linu...
Enter
Algo VPN
. Introducing Algo, a self-hosted
personal VPN server designed for ease of
deployment and security. Algo
automatically deploys an on-demand VPN
service in the ...
Enter
Universal Password Manager
. Universal Password Manager allows you
to store all your passwords in one
highly secure encrypted database. Its
strengths are simplicity, portability
and secu...
Enter
Project Alumni
. Project Alumni is an open source
project with the intention of giving any
education (or non education) institution
with alumni members the ability to
easily ...
Enter
firejail
. Firejail is a SUID program that
reduces the risk of security breaches by
restricting the running environment of
untrusted applications using Linux
namespaces...
Enter
FedStage FedSAML
. FedStage FedSAML is a software aiming
to implement security SAML2.0 standard,
supporting low ((de)serialization) and
higher level (easy way of creating and v...
Enter
Sobelow
. Sobelow is a security-focused static
analysis tool for the Phoenix framework.
For security researchers, it is a useful
tool for getting a quick view of point...
Enter
WiFi Password Recovery
. WiFi Password Recovery is a free
utility to recover the passwords of the
WiFi networks saved on your computer.
For example if you forgot the password
of a Wi...
Enter
Advisory Check
. Advisory Check is a tool for
monitoring the security of installed
software. It gathers security advisories
using RSS/RDF/XML feeds, compares them
against a l...
Enter
pam_duration
. pam_duration provides a module for
the Pluggable Authentication Module
(PAM) authorization framework that sets
per-day limits on total usage by
particular Li...
Enter
thc-hydra
. Number one of the biggest security
holes are passwords, as every password
security study shows. This tool is a
proof of concept code, to give
researchers and...
Enter
Prueba
. This is an application that can also
be fetched from
https://sourceforge.net/projects/prueba/.
It has been hosted in OnWorks in order
to be run online in an ...
Enter
Ragna Scribe
. Ragna Scribe is a versatile text
editor which can hold multiple documents
at the same time and each document
organises a set of articles in a tree
order. The...
Enter
AWS EKS Terraform module
. Terraform module which creates AWS
EKS (Kubernetes) resources.
Windows-based node support is limited to
a default user data template that is
provided due to ...
Enter
SIPVicious
. SIPVicious OSS has been around since
2007 and is actively updated to help
security teams, QA and developers test
SIP-based VoIP systems and applications.
Ope...
Enter
Lighthouse Ethereum
. Lighthouse is an Ethereum consensus
client that connects to other Ethereum
consensus clients to form a resilient
and decentralized proof-of-stake
blockchain....
Enter
OWASP Amass
. The OWASP Amass Project has developed
a tool to help information security
professionals perform network mapping of
attack surfaces and perform external
asset...
Enter
Tstconfig
. Tstconfig is a system administration
tool that tests (a large number of)
configuration files automatically.
Mainly intended for security, it can be
used to t...
Enter
Laravel CSP
. By default, all scripts on a webpage
are allowed to send and fetch data to
any site they want. This can be a
security problem. Imagine one of your
JavaScript...
Enter
Trivy Operator
. The Trivy Operator leverages Trivy to
continuously scan your Kubernetes
cluster for security issues. The scans
are summarised in security reports as
Kubernet...
Enter
Cibet
. The cibet framework provides
developers with functionality of the
following topics: - Dual Control (4-Eyes
Principle .) - Extended Authorisation
(Enhance Spr...
Enter
Falco
. Falco is a open source project to
detect abnormal application behavior in
a cloud native environment like
Kubernetes. This cloud native runtime
security proj...
Enter
PHP thumbnail Photo Gallery
. A graphical PHP coded thumbnail image
gallery using either a simple text file
database OR Mysql database. really easy
to install. features include multiple i...
Enter
Simple Event Correlator
. Simple Event Correlator (SEC) is a
lightweight event correlator for network
management, log file monitoring,
security management, fraud detection,
and other ...
Enter
Nebular
. Nebular is a customizable Angular UI
library that contains 40+ UI components,
four visual themes, and Auth and
Security modules. Recognized at the
prestigiou...
Enter
EDSS
. EDSS stands for Easy Debian Security
Script and it is a very easy to use
script that installs additional
software, configures the software, and
scans a GNU/L...
Enter
BrowserBox
. Remote isolated browser API for
security, automation visibility and
interactivity. Run-on our cloud, or
bring your own. Full scope double
reverse web proxy w...
Enter
Pacu
. Pacu (named after a type of Piranha
in the Amazon) is a comprehensive AWS
security-testing toolkit designed for
offensive security practitioners. While
sever...
Enter
SSH-MITM
. ssh man-in-the-middle (ssh-mitm)
server for security audits supporting
publickey authentication, session
hijacking and file manipulation.
SSH-MITM is a man i...
Enter
dnmap
. dnmap is a distributed nmap framwork
using a client/server architecture. The
server reads the commands from a file
and send them to each client. The client
e...
Enter
nuclei
. Nuclei is used to send requests
across targets based on a template,
leading to zero false positives and
providing fast scanning on a large
number of hosts. N...
Enter
Sippts
. Sippts is a set of tools to audit
VoIP servers and devices using SIP
protocol. Sippts is programmed in Python
and it allows us to check the security
of a VoI...
Enter
FileHashler
. Java based API and console utility
for cross-platform file encryption and
archiving (currently encrypts single
files up to 9.2 EB length). Uses Twofish
(CBC)...
Enter
Tranalyzer
. The Anteater moves to a new site,
available under ...
Enter
AnonyROM
. AnonyROM is as the name suggests, A
ROM based around anonymity for the HTC
Amaze 4G. It is built on HTC's stock
4.04 ROM, with Sense completetly
stripped...
Enter
pfyshnet
. Pfyshnet is a public anonymous peer
to peer network and file-system.
Security is its primary concern, and it
provides security for all aspects of
participati...
Enter
passlog
. Passlog is a Visual Basic program to
allow windows access to be logged to
syslog. While it is not intended to be a
high security program it can provide
some ...
Enter
Universal Password Manager
. Universal Password Manager allows you
to store all your passwords in one
highly secure encrypted database. Its
strengths are simplicity, portability
and secu...
Enter
bearer
. Welcome to the Bearer documentation.
Bearer is a static application security
testing (SAST) tool that scans your
source code and analyzes your data flows
to ...
Enter
Commius
. Community-based interoperability
Utility for SMEs. Commius main objective
is to support the SMEs with a zero, or
very low-cost, entry into
interoperability, ...
Enter
Algo VPN
. Introducing Algo, a self-hosted
personal VPN server designed for ease of
deployment and security. Algo
automatically deploys an on-demand VPN
service in the ...
Enter
LinuxSA
. LinuxSA is a Python project that
scans a remote or a local Linux machine
for security vulnerabilities and then
creates a report of the findings. The
scan is ...
Enter
Sobelow
. Sobelow is a security-focused static
analysis tool for the Phoenix framework.
For security researchers, it is a useful
tool for getting a quick view of point...
Enter
FedStage FedSAML
. FedStage FedSAML is a software aiming
to implement security SAML2.0 standard,
supporting low ((de)serialization) and
higher level (easy way of creating and v...
Enter
Nokia Firewall Manager
. The goal of this project is to allow
a network security professional to
manage multiple Nokia security devices
simultaneously. Check Home Page at
http://nfm....
Enter
Arcjet
. Arcjet helps developers protect their
apps in just a few lines of code.
Implement rate limiting, bot protection,
email verification, and defense against
comm...
Enter
Zeek
. Zeek has a long history in the open
source and digital security worlds. Vern
Paxson began developing the project in
the 1990s under the name �Bro� as a
means...
Enter
Bandit
. Bandit is a tool designed to find
common security issues in Python code.
To do this, Bandit processes each file,
builds an AST from it, and runs
appropriate ...
Enter
Infection Monkey
. Infection Monkey is a open source
automated security testing tool for
testing a network's security
baseline. Monkey is a tool that infects
machines and p...
Enter
APIthet
. APIthet is an application to security
test RESTful web APIs. Assessing APIs
help in detecting security
vulnerabilities at an early stage of the
SDLC. Compare...
Enter
inventory-scoring
. A tool (adobe air) to do maturity
scoring of solutions. This is an
offspring of projet ESIS, we use this
tool with customer to assess which
solutions could b...
Enter
thc-hydra
. Number one of the biggest security
holes are passwords, as every password
security study shows. This tool is a
proof of concept code, to give
researchers and...
Enter
Ragna Scribe
. Ragna Scribe is a versatile text
editor which can hold multiple documents
at the same time and each document
organises a set of articles in a tree
order. The...
Enter
SIPVicious
. SIPVicious OSS has been around since
2007 and is actively updated to help
security teams, QA and developers test
SIP-based VoIP systems and applications.
Ope...
Enter
jGuard
. jGuard is written in java. his goal
is to provide a security framework based
on jaas (java authentication and
authorization security) . this framework
is wri...
Enter
amazon-vpc-resource-controller-k8s
. Controller for managing Trunk &
Branch Network Interfaces on EKS Cluster
using Security Group For Pod feature and
IPv4 Addresses for Windows Node. Contro...
Enter
Application Inspector
. Microsoft Application Inspector is a
software source code characterization
tool that helps identify coding features
of first or third party software
componen...
Enter
StackRox Kubernetes
. The StackRox Kubernetes Security
Platform performs a risk analysis of the
container environment, delivers
visibility and runtime alerts, and
provides recomme...
Enter
GridTrust
. The objective of the GridTrust
project is to develop new Grid Security
technologies in order to manage Trust
and Security in Grid for the Next
Generation Gri...
Enter
httpshell
. httpshell is an interactive https
command exploit to test the perimeter
security of your network. This is a
customized HTTPS encrypted reverse
shell. It illu...
Enter