Liferay Security Patches
The Liferay Community Security Team is an all-volunteer group of community members who manage security issues related to Liferay CE. When security-related issue
Enter
InstallFix Security Suite
Uses NSIS as a coding language to create tiny installer-like programs that remove cookies, junk, and adware. While no longer in development, it remains useful
Enter
Tiny Security Suite
Tiny Security Suite is a software that consists of encryption, shredding, VPN, folder hiding, Firewall, and Tor Browser. Tiny Security Suite has: - File Encrypt
Enter
XML-Security Plug-In
The Eclipse XML-Security Plug-In allows you to experiment with the W3C recommendations on digital signatures and encryption and to learn all about their backgr
Enter
SeaMonster - Security Modeling Software
SeaMonster is a security modeling tool for threat models. It supports notations that security experts and analyzers are already familiar with, namely attack tre
Enter
MCP Server (Rad Security)
The RAD Security MCP Server is an MCP server that provides AI-powered security insights for Kubernetes and cloud environments. It integrates with the RAD Secur
Enter
Inscribe | Data Security and Privacy
Make your data encrypted in a few clicks! Inscribe by Crypto Ststems helps you cut down development time by providing you with a flexible data encryptor interf
Enter
Web Security Audit
The goal of this project is to build an add-on for browser that passively audits the security posture of the websites that the user is visiting. Assume that the
Enter
JDS: Data Security
JDS is a powerful tool for data protection. Documents are encrypted using a special algorithm. The data encryption algorithm is constantly updated to improve s
Enter
visualNets Graphical Network Security
visualNets is a log analysis utility that graphically plots network packets over time. Plot source or destination IP or port addresses in a graphical format wi
Enter
Acegi Security System for Spring
Spring Security (formerly Acegi Security) is now hosted on the Spring Framework website: http: //www.springframework.org/spring-security/. Audience: Developers
Enter
WS-Security Wrapper
WS-Security Wrapper is an adapter between XML applications and SOAP Web services implementing WS-Security. It handles all aspects of SOAP/WS-Security encoding
Enter
OWASP Security Shepherd
The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. Utilizing the OWASP top ten as a chall
Enter
SIP Proxy - VoIP Security Test Tool
With SIP Proxy you will have the opportunity to eavesdrop and manipulate SIP traffic. Furthermore, predefined security test cases can be executed to find weak
Enter
Folder Security Viewer
This software supports network administrators to access the correct security role for a specific folder without having to load windows explorer which will load
Enter
Springenwerk Security Scanner
Springenwerk is a free Cross Site Scripting (XSS) security scanner written in Python. Audience: Information Technology. User interface: Command-line, Tk. Progra
Enter
JPA Security
JPA Security is an Access Control Solution for the Java Persistence API. JPA Security enables you to configure access control to your JPA Entity Beans based on
Enter
project Cubic Security
Audience: Security. User interface: Win32 (MS Windows). Programming Language: C#. Database Environment: SQL-based. Categories: Desktop Publishing
Enter
Acegi Security Extensions Project
Acegi-ext aims to provide additional capabilities to Acegi Security Framework,such as declarative management of ACL entries,support for Acegi Security in portal
Enter
Security Privacy Complete
Security & Privacy Complete is mainly a security tool for Windows. It can disable all services which might be a securit-risk, harden registry settings. Also
Enter
Qualdev Security
The Qualdev Security Server integrates the security services for the tools that support the Qualdev Group. It gives the necessary infrastructure to offer servic
Enter
Network Security Scorebot
Scorebot is a scoring framework which monitors the integrity of various network services for the purpose of scoring a network security exercise. Audience: Gove
Enter
CesTa - Security Framework
CesTa (Code Enhancing Security Transformation and Analysis) is a tool for enhancing security by program transformations. Focused on Smart Cards (Java Card in pa
Enter
JWT Spring Security Demo
This is a demo for using JWT (JSON Web Token) with Spring Security and Spring Boot. I completely rewrote my first version. Now this solution is based on the co
Enter
Huorong Security
Operation mode: EDR operation system, network-wide threat awareness With the Huorong terminal as the cornerstone, while protecting users, it detects various th
Enter
kkp NetBIOS Security Tool
kkp is a security tool based on a vulnerability in handling of the NetBIOS protocol by the Microsoft Windows 9x platform. It is meant to be the most reliable a
Enter
Warify Information Security Toolkit
An Information Security toolkit to help companies understand what information can be gleaned about them without performing any hacking attempts Audience: Advanc
Enter
Security System using ANPR
security system using number plate recognition . This is an application that can also be fetched from https: //sourceforge.net/projects/securitysysanpr/. It has
Enter
Security VMS
Features: Intuitive, Responsive and Resource-effective . This is an application that can also be fetched from https: //sourceforge.net/projects/security-vms/.
Enter
Web Application Security Papers Archive
Aimed for web app security with hope of quick reference. WAS papers are scattered among hundreds of resources, some of which are likely to be broken links in so
Enter
phpcs-security-audit v3
phpcs-security-audit is a set of PHP_CodeSniffer rules that finds vulnerabilities and weaknesses related to security in PHP code. It currently has core PHP rul
Enter
SecSy: Security-oriented Log Synthesis
SecSy is a tool for security-oriented log synthesis. Besides basic synthesis properties (cases per day, office hours, randomized activity duration, .), its det
Enter
PHP Security Audit Tool
This is an open source tool to do static analysis of php code for security exploits . This is an application that can also be fetched from https: //sourceforge.
Enter
SCAP Security Guide
The purpose of this project is to create security policy content for various platforms, Red Hat Enterprise Linux, Fedora, Ubuntu, Debian, SUSE Linux Enterprise
Enter
JSSF - Java Security Server Faces
JSSF - Java Server Security Faces it's framework for security layer. With JSP tags and pages/resource access control. Support MyFaces and Sun RI JSF Audienc
Enter
Foundstone Free Security Tools Project
Foundstone Free Security Tools . This is an application that can also be fetched from https: //sourceforge.net/projects/foundstone/. It has been hosted in OnWor
Enter
Symfony Security Core
Part of the Symfony framework, the Security Core component provides the foundational tools for managing authentication, authorization, and access control in PH
Enter
BRST - Border Router Security Tool
The BRST - Border Router Security Tool is a web based utility for generating secure configuration files for Cisco routers in a border configuration. The adminis
Enter
Security Tools Collection
Collection of open source security tools that enhance the ability of people and companies to secure their environment. These tools will build upon the foundati
Enter
phpBB-Security Enhanced
A phpBB BBS modded version, with security in mind. If you are looking for a secure phpBB, you are in the right Project. Audience: End Users/Desktop. Programmin
Enter
PHP Login System w/ 5 Levels of Security
PHP/MYSQL Login System with 5 Levels of Security meaning "THE HEIRARCHY OF ADMINISTRATION" (Admin/Director -> Manager -> Assistant Manager -> E
Enter
Spring Security
Spring Security is a powerful and highly customizable authentication and access-control framework. It is the de-facto standard for securing Spring-based applic
Enter
AAA Security Framework for Avalon
A security framework for providing AAA functionality for Avalon based applications. The pluggable architecture for underlying datastores and Authentication, Au
Enter
JAK Security Suite
Open Source Security Suite Verschl�ssselung mit Blowfish/Twofish/ AES. Datenl�schung mit Guttmann (Default)/Pseudorandom Data/US DoD 5220-22.M Methode. User in
Enter
Security-Tools Database
Security-Tools Database is an easy to use tool to manage tool-tipps (e.g. from the SecurityFocus.com Newsletters and other sources). Simply copy + paste tipps
Enter
Web Image Security
Web Image Security combines some javascript, php, and htaccess techniques to make it extremely challenging for would-be image- or bandwidth-thieves from violati
Enter
WS-Security implementation for Axis
External library for the Apache project Axis implementing UsernameToken spec from the working draft Web Services Security Username Token Profile ver1.1(Sunday,
Enter
OWASP Find Security Bugs
The SpotBugs plugin for security audits of Java web applications. Find Security Bugs is the SpotBugs plugin for security audits of Java web applications. It ca
Enter
Fatsec Security Driver
Emulate filesystem security on Windows 9x systems with FAT16/32 filesystems. Files, directories, and drives can be assigned read/write/execute permissions whic
Enter
Cookie Revolver Security Framework
The Cookie-revolver framework provides J2EE web-applications with two-factor authentication security, �something I know� (userid/password) and �something I have
Enter
Addons for IOSEC - DoS HTTP Security
IOSEC PHP HTTP FLOOD PROTECTION ADDONS IOSEC is a php component that allows you to simply block unwanted access to your webpage. if a bad crawler uses to much o
Enter
Symfony Security Bundle
Symfony Security Bundle is a powerful tool for adding authentication and authorization to Symfony applications. It provides mechanisms for managing user roles,
Enter
Blindeye Security Monitoring
The Blindeye web application is a front end for the Blindeyes Distributed Command Framework. Blindeye will be specifically tailored towards the viewing and data
Enter
Security Center
This toolkit has complete security Package start from Tweak manager , Updater , Virus scanner ,Proxy server and many more This will be help full for user from
Enter
Agentic Security
The open-source Agentic LLM Vulnerability Scanner. Features: Customizable Rule Sets or Agent based attacksDocumentation availableExamples availableComprehensiv
Enter
Opportunistic E-Mail-Security-System
Securing mails without involving user. Secures them as often as possible if it is possible. Shows security-state and process of mails and mail-partners. Audien
Enter
SMSec - Simplicity Makes Security
SMSec is a free , open source, GPLed implementation of two-factor authentication via SMS (Short Message Service). It uses SMSD to "talk" to GSM modems,
Enter
Secure layers for improving security
Squrelayerproxy is a project aimed for adding more privacy for existing messengers, proxy and security features. For windows you have a free and good HTTP prox
Enter
Ferret Security Auditing Toolset
Ferret is a new software tool for checking host vulnerabilities. Ferret helps system administrators by quickly finding vulnerabilities that are present on a hos
Enter
hack://src Security Suite
Software repository of the hack: //src project. Includes security related software for crypto, vulnerability/patch notification & management, and ultra low
Enter
Security Code Scan
Detects various security vulnerability patterns. SQL Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), XML eXternal Entity Injection (X
Enter
Enterprise Laptop Security System
It was made for Universities/Colleges to manage their students' laptops in order to prevent theft cases. If your university or college is prone to such cas
Enter
OWASP Joomla! Security Scanner
Note: WE ARE UNABLE TO UPDATE THE SCANNER AT THIS MOMENT! Note: WE APPRECIATE YOUR CONTRIBUTION. Detects file inclusion, sql injection, command execution vulner
Enter
iSpy Camera Security Software
iSpy uses your USB webcams, IP cams, capture cards, desktops and microphones to detect and record movement or sound and provides security, surveillance, monito
Enter
Code Quality and Security for C#
Sonar offers a single cohesive solution with a consistent set of metrics and hundreds of static analysis rules to detect your coding issues early. Plus fast an
Enter
SEPIA: Security-oriented PN Framework to run in Windows online over Linux online
SEPIA provides implementations for various types of Petri nets. Along Place/Transition-nets, it supports Petri nets with distinguishable token colors and define
Enter
Deffend.net Otus
Deffend.net Otus aims to help small companies and individuals to avoid cyber security threats through cyber hygiene. It runs on Windows desktop and looks for m
Enter
Sihas
Deffend.net Sihas aims to help small companies and individuals to avoid cyber security threats through cyber hygiene. It runs on Windows desktop and looks for
Enter
SEWOL: Security-oriented Workflow Lib
SEWOL provides support for the handling of workflow traces. It allows to specify the shape and content of process traces in terms of entries representing the e
Enter
Code Quality and Security for Java
Hundreds of unique rules to find Java bugs, code smells & vulnerabilities. Sonar static analysis helps you build and maintain high-quality Java code. Cover
Enter
KubeArmor
KubeArmor is a runtime Kubernetes security engine. It uses eBPF and Linux Security Modules(LSM) for fortifying workloads based on Cloud Containers, IoT/Edge, a
Enter
Agnitio
A tool to help developers and security professionals conduct manual security code reviews in a consistent and repeatable way. Agnitio aims to replace the adhoc
Enter
Advanced Persistent Security
The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and
Enter
Prowler
Prowler is an Open Source security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening, and fo
Enter
ZAP
The OWASP Zed Attack Proxy (ZAP) is one of the world�s most popular free security tools and is actively maintained by a dedicated international team of volunte
Enter
AAT Direct Connect Hub Project
Scripts and hub mods written to enhance OpenDCHub. The Hub-Security script filters unregistered users by country, and adds op commands and security features. S
Enter
Mythril
Mythril is a security analysis tool for EVM bytecode. It detects security vulnerabilities in smart contracts built for Ethereum, Hedera, Quorum, Vechain, Roost
Enter
Eolos VoipAudit
Visual Framework Tool to scan/sniff address space, enumerate users, crack credentials, pattern based dial spoofing and security reporting for Voip protocols. T
Enter
TinySecuritySuite
Tiny Security Suite is a simple collection of portable security tools that are essentials. It consist of Clamwin Antivrius, PAPI Firewall, and the developer ow
Enter
VeraCrypt
VeraCrypt is a free disk encryption software brought to you by IDRIX (https: //www.idrix.fr) and based on TrueCrypt 7.1a. It adds enhanced security to the algo
Enter
LibreWolf-for-Void
A fork of Firefox, focused on privacy, security and freedom. This project is an independent fork of Firefox, with the primary goals of privacy, security and us
Enter
Terrascan
Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure. As you embrace Infras
Enter
XML DSIG and Encryption (C++)
A C++ library implementing the XML DSIG and XML Encryption standards. Based on the Apache project's Xerces (DOM/SAX parser) and Xalan (XSL/XPATH processor)
Enter
Tracee
Tracee is a runtime security and observability tool that helps you understand how your system and applications behave. It is using eBPF technology to tap into
Enter
HISPACTA
Example java web application using layered architecture and Hibernate (persistence), Spring (integration, AOP) + Acegi security, Tapestry (GUI) and JUnit (testi
Enter
NetSPOC
NetSPOC is a Network Security POlicy Compiler. A tool for simplified security management of networks with multiple security domains. NetSPOC takes a descriptio
Enter
Arkime
Arkime is an open source, large-scale, full packet capturing, indexing, and database system designed to augment existing security infrastructure by storing and
Enter
Tsunami
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. When s
Enter
openGalaxy
This project aims to provide a method for listening on a serial port and decode incoming messages from a Galaxy security control panel. The messages are transm
Enter
Custom Erase Algorithm by Mariano Ortu
This project provides a secure file deletion algorithm designed to permanently erase data by overwriting files with customizable patterns. It ensures that dele
Enter
Enlightn
Enlightn scans your Laravel app code to provide you actionable recommendations on improving its performance, security & more. We'll perform over 100 ch
Enter
Algo VPN
Introducing Algo, a self-hosted personal VPN server designed for ease of deployment and security. Algo automatically deploys an on-demand VPN service in the cl
Enter
Catnip
Servlet container extensions that help web developers write full featured Java web applications. Features: Security: XSS Filter/Valve infrastructure for Apache
Enter
firejail
Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces a
Enter
ClouDAT
The ClouDAT tool supports tasks for planning an Information Security Management System (ISMS) cloud services that accords to ISO 27001. For this purpose the Clo
Enter
SIGOF
SIGOF (Security Information Graphics Oriented Forensic) aims at synthetizing security log, stored in a acid/base database schema, in order to provide a graphic
Enter
Is Website Vulnerable
A command-line tool that scans websites for known security vulnerabilities in their frontend dependencies by checking against the Snyk vulnerability database.
Enter
fleet
Fleet exposes familiar concepts from traditional MDMs like custom attributes and dynamic grouping, but in a way that lets you work directly with data and event
Enter
Abdal Header Analyzer
Abdal Header Analyzer is a software for analyzing site and web server headers. As you know, headers contain information that security experts and hackers use t
Enter
OWASP Amass
The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset d
Enter
WiFi Password Recovery
WiFi Password Recovery is a free utility to recover the passwords of the WiFi networks saved on your computer. For example if you forgot the password of a WiFi
Enter
Paseto
Paseto (Platform-Agnostic Security Tokens) is an open-source security token format designed as a more secure alternative to JWT (JSON Web Tokens). Unlike JWT,
Enter
FaceAccess Facial Recognition System
With the growing need to exchange information and share resources, information security has become more important than ever in both the public and private secto
Enter
Prueba
This is an application that can also be fetched from https: //sourceforge.net/projects/prueba/. It has been hosted in OnWorks in order to be run online in an e
Enter
Laravel CSP
By default, all scripts on a webpage are allowed to send and fetch data to any site they want. This can be a security problem. Imagine one of your JavaScript d
Enter
OWASP Bricks
Bricks is a deliberately vulnerable web application built on PHP and MySQL. The project focuses on variations of commonly seen application security vulnerabilit
Enter
SOMAP.org
Security Officers Management and Analysis Project (SOMAP) is all about defining security management work methods and supplying Security Officers with tools to
Enter
Digital Signer (a PDF Signing software)
Digital Signer is a powerful and user-friendly software designed to secure and authenticate your digital documents with ease. Ideal for individuals, businesses
Enter
SSH-MITM
ssh man-in-the-middle (ssh-mitm) server for security audits supporting publickey authentication, session hijacking and file manipulation. SSH-MITM is a man in
Enter
Sippts
Sippts is a set of tools to audit VoIP servers and devices using SIP protocol. Sippts is programmed in Python and it allows us to check the security of a VoIP
Enter
SOMAP.org to run in Windows online over Linux online
Security Officers Management and Analysis Project (SOMAP) is all about defining security management work methods and supplying Security Officers with tools to d
Enter
pfyshnet
Pfyshnet is a public anonymous peer to peer network and file-system. Security is its primary concern, and it provides security for all aspects of participating
Enter
passlog
Passlog is a Visual Basic program to allow windows access to be logged to syslog. While it is not intended to be a high security program it can provide some ba
Enter
Universal Password Manager
Universal Password Manager allows you to store all your passwords in one highly secure encrypted database. Its strengths are simplicity, portability and securi
Enter
Sobelow
Sobelow is a security-focused static analysis tool for the Phoenix framework. For security researchers, it is a useful tool for getting a quick view of points-
Enter
FedStage FedSAML
FedStage FedSAML is a software aiming to implement security SAML2.0 standard, supporting low ((de)serialization) and higher level (easy way of creating and ver
Enter
Nokia Firewall Manager
The goal of this project is to allow a network security professional to manage multiple Nokia security devices simultaneously. Check Home Page at http: //nfm.s
Enter
LDAP Enabled Application Framework
LDAP Enabled Application Framework(LEAFs), is a J2EE based application framework that couples a strong security model with MVC. The security of LEAFs is modeled
Enter
AWS EKS Terraform module
Terraform module which creates AWS EKS (Kubernetes) resources. Windows-based node support is limited to a default user data template that is provided due to th
Enter
thc-hydra
Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and s
Enter
Ragna Scribe
Ragna Scribe is a versatile text editor which can hold multiple documents at the same time and each document organises a set of articles in a tree order. The d
Enter
SIPVicious
SIPVicious OSS has been around since 2007 and is actively updated to help security teams, QA and developers test SIP-based VoIP systems and applications. Open-
Enter
jGuard
jGuard is written in java. his goal is to provide a security framework based on jaas (java authentication and authorization security) . this framework is writt
Enter
amazon-vpc-resource-controller-k8s
Controller for managing Trunk & Branch Network Interfaces on EKS Cluster using Security Group For Pod feature and IPv4 Addresses for Windows Node. Controll
Enter
Lighthouse Ethereum
Lighthouse is an Ethereum consensus client that connects to other Ethereum consensus clients to form a resilient and decentralized proof-of-stake blockchain. L
Enter
GridTrust
The objective of the GridTrust project is to develop new Grid Security technologies in order to manage Trust and Security in Grid for the Next Generation Grids
Enter
httpshell
httpshell is an interactive https command exploit to test the perimeter security of your network. This is a customized HTTPS encrypted reverse shell. It illust
Enter
secure-electron-template
A current electron app template with the most popular frameworks, designed and built with security in mind. Once cloned, install the dependencies for the repo
Enter
Trivy Operator
The Trivy Operator leverages Trivy to continuously scan your Kubernetes cluster for security issues. The scans are summarised in security reports as Kubernetes
Enter
Sigma
Welcome to the Sigma main rule repository. The place where detection engineers, threat hunters and all defensive security practitioners collaborate on detectio
Enter
Cibet
The cibet framework provides developers with functionality of the following topics: - Dual Control (4-Eyes Principle .) - Extended Authorisation (Enhance Sprin
Enter
Role Manager
Role Manager is a security management framework based on the NIST model for Role Based Access Control (RBAC) and the Java[TM] 2 Platform security standards. Th
Enter
Vault
Manage secrets and protect sensitive data. Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets
Enter
PHP thumbnail Photo Gallery
A graphical PHP coded thumbnail image gallery using either a simple text file database OR Mysql database. really easy to install. features include multiple ima
Enter
Falco
Falco is a open source project to detect abnormal application behavior in a cloud native environment like Kubernetes. This cloud native runtime security projec
Enter
Drive Badger
Drive Badger is a software tool for data exfiltration � which means, for copying data from the computer to external USB drive. Unlike many other tools from IT
Enter
Nebular
Nebular is a customizable Angular UI library that contains 40+ UI components, four visual themes, and Auth and Security modules. Recognized at the prestigious
Enter
BrowserBox
Remote isolated browser API for security, automation visibility and interactivity. Run-on our cloud, or bring your own. Full scope double reverse web proxy wit
Enter
U-Tranz
U-Tranz is a free application developed on the characteristics of UDP allows the transmission of unlimited file size. Most of the applications based on UDP res
Enter
nuclei
Nuclei is used to send requests across targets based on a template, leading to zero false positives and providing fast scanning on a large number of hosts. Nuc
Enter
Simple Event Correlator
Simple Event Correlator (SEC) is a lightweight event correlator for network management, log file monitoring, security management, fraud detection, and other ta
Enter
smartIDS
The aim of the project is a lightweight intrusion detection library for embedded devices which supports MSP430 and ARM Cortex based devices. Features include D
Enter
Media-Cert
The Re-launch is now ready and live. Feel free to try and enjoy it out. Should you experience any issues just create a ticket and I will look into it asap. The
Enter
bearer
Welcome to the Bearer documentation. Bearer is a static application security testing (SAST) tool that scans your source code and analyzes your data flows to di
Enter
xxxxxxxxxxxxxxxxxx
Features: Portable.Simple, fast and user friendly interface.Implements 256-bit AES to encrypt files.Effective password protection.Uninstalling/Removing will no
Enter
Not Another MAC Address Generator
NAMAG (Not Another MAC Address Generator) Generates using (OUI) Verified MAC Addresses using oui.csv - OUI = Organizationally unique identifier from Standards.
Enter
UserUnlock
There is an age old issue with security / windows domains / shared workstations. If several users share a workstation, then from an audit / security standpoint
Enter
NPQ
npq is a security-focused package manager that analyzes npm dependencies for potential vulnerabilities before installation. It helps developers ensure the safe
Enter
Simple Event Correlator to run in Windows online over Linux online
Simple Event Correlator (SEC) is a lightweight event correlator for network management, log file monitoring, security management, fraud detection, and other tas
Enter
FileHashler
Java based API and console utility for cross-platform file encryption and archiving (currently encrypts single files up to 9.2 EB length). Uses Twofish (CBC) a
Enter
Secure P2P Framework (SePP)
This project develops a secure P2P framework in Java (SePP). Existing P2P frameworks are not covering security by design but rather implement only some high la
Enter
Application Inspector
Microsoft Application Inspector is a software source code characterization tool that helps identify coding features of first or third party software components
Enter
ANNFiD
Just carved a bunch of bytes and have no idea what they could be? Maybe ANNFiD can help. ANNFiD uses neural network to identify byte patterns. It can be traine
Enter
Commius
Community-based interoperability Utility for SMEs. Commius main objective is to support the SMEs with a zero, or very low-cost, entry into interoperability, ba
Enter
YASeMI
YASeMI (Yet Another Security Monitoring Interface) consists of a Web interface that can be of aid to SysAdmins and Security Admins, in detecting possible anoma
Enter
Steganography
V1.0.2 compatible with both Processing 2 & 3 Hide your images and text in plain sight. A library for Processing that can embed text and images into a carrie
Enter
CaptfEncoder
Captfencoder is a rapid cross-platform network security tool suite, providing network security-related code conversion, classical cryptography, cryptography, a
Enter
Model Driven Health Tools (MDHT)
Eclipse plugins that extend the Open Health Tools (OHT) Model Driven Health Tools (MDHT) project. Download the all-in-one ZIP, or install into existing eclipse
Enter
MBMLog
MBM-Log allows to look deeply in collected logs (not only Top 10). All charts are generated on demand. You can easily filter data. MBM-Log can help you with Fo
Enter
QuickPasswordGenerator
This program generate random password of a specified length, with numbers, upper and lowercase letters and special symbols. Features: Small size.Easy interface
Enter
Effacor
When a file is deleted from a device the space for that file is merely de-allocated. In short: The DATA contained in that file still remains, and can be recove
Enter
APIthet
APIthet is an application to security test RESTful web APIs. Assessing APIs help in detecting security vulnerabilities at an early stage of the SDLC. Compare t
Enter
Infection Monkey
Infection Monkey is a open source automated security testing tool for testing a network's security baseline. Monkey is a tool that infects machines and pro
Enter
Bandit
Bandit is a tool designed to find common security issues in Python code. To do this, Bandit processes each file, builds an AST from it, and runs appropriate pl
Enter
tirreno
The open-source security analytics. tirreno helps you to understand, monitor, and protect your platforms from cyber fraud, account threats, and abuse. Proactiv
Enter
Arcjet
Arcjet helps developers protect their apps in just a few lines of code. Implement rate limiting, bot protection, email verification, and defense against common
Enter
inventory-scoring
A tool (adobe air) to do maturity scoring of solutions. This is an offspring of projet ESIS, we use this tool with customer to assess which solutions could be
Enter
nodejsscan
Static security code scanner (SAST) for Node.js applications powered by libsast and semgrep. nodejsscan is a static security code scanner for Node.js applicati
Enter
Aircrack-ng Windows GUI
This is mainly just an interface tweak. Added function of mac address changer. If you have problems getting the mac changer to work, try using a mac address th
Enter
Latest Online Banking Script
Standard Security and Investment Bank is a creative online banking PHP script, developed with latest version of PHP, it is web based online payments/banking app
Enter
OWASP Juice Shop
It can be used in security trainings, awareness demos, CTFs and as a guinea pig for security tools! Juice Shop encompasses vulnerabilities from the entire OWAS
Enter
Open Help Desk Tools
Open Help Desk Tools aims to help IT departments to solve users problems with Windows stations. It could be also helpfull for security audits. IT allows to: -
Enter
IPRARU
Computer security tool for the information gathering stage, obtaining the IP address through redirection and social engineering. Features: FastSimpleFreeSecure
Enter
PHP-Nuke Fusion Module
Fusion is an advanced security system for PHP-Nuke. Fusion is a more user friendly extremely advanced security system with features like no other.Including FTP
Enter
Payloads All The Things
A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques. The API key is a unique identifier
Enter
CryptoLibraryRefImpl
This library exposes security functionality to the programmer, such as random number generation, hashing, salted hashing, message authentication code, symmetri
Enter
Zeek
Zeek has a long history in the open source and digital security worlds. Vern Paxson began developing the project in the 1990s under the name �Bro� as a means t
Enter
Visual Figaro
Visual Figaro is an integrated environment to develop component libraries for the dependability modeling tool KB3 used by EDF (http: //www.edf.fr/recherche/cod
Enter
Passbolt API
Passbolt API is an open-source password manager designed for teams. It allows users to securely store and share passwords using end-to-end encryption. Passbolt
Enter
Interwhat?
A Firefox tutorial add-on for adult absolute beginners, to provide information on and to build up understanding of the threats and features of the web. Suggest
Enter
Cipherbox
Cipherbox is what I consider to be a cryptographic swiss knife. It utilizes six encryption algorithms, and it's also a vault that's locked with four RF
Enter
Aqeria
Aqeria is a documentation and records-management utility for psychiatric clinics, designed to expedite creation, management, and viewing of patient records, pr
Enter
boundman
Boundman is an advanced, user-friendly, and sleek application designed to take control over your network connections. It allows you to efficiently manage and b
Enter
Lexik JWT Authentication Bundle
LexikJWTAuthenticationBundle is a Symfony bundle that provides JWT (JSON Web Token) authentication for RESTful APIs. It simplifies the process of generating an
Enter
Mobile Verification Toolkit
Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potentia
Enter
Powerful files and text searcher
Last release: 29/7/2023. Enhanced program. The interface font size is big for ease of access. You can download source code that can be found in 'source cod
Enter
windows_hardening
This repository, also known as HardeningKitty, is a comprehensive Windows hardening checklist for personal and enterprise environments. It translates security
Enter
phpStickyBoard
phpStickyBoard aimed at creating a forum program in simple, quick and easy-to-use interfaces. Security(of structure, contents) is concerned as the most importa
Enter
Wazuh
Wazuh is an open-source, unified security platform that delivers extended detection and response (XDR) and SIEM capabilities for on-premises, cloud, container,
Enter
free online banking scripts php
Horizon Security Bank is a well developed online banking PHP script, developed with php and mysql, it is web based Banking management system that can be accessi
Enter
Java Sec Code
Java sec code is a very powerful and friendly project for learning Java vulnerability code. This project can also be called Java vulnerability code. Each vulne
Enter
Java Client for Google Maps Services
This library brings the Google Maps API Web Services to your server-side Java application. Each Google Maps Web Service request requires an API key. API keys a
Enter
FOSUserBundle
The FOSUserBundle adds support for a database-backed user system in Symfony2+. It provides a flexible framework for user management that aims to handle common
Enter
FMSec
FMSec (File Manager SECurity) is a set of extensions to file managers that enable some security-related operations to be easily performed. The operations are:
Enter
rkt
rkt (pronounced like a "rocket") is a CLI for running application containers on Linux. rkt is designed to be secure, composable, and standards-based. S
Enter
Django Hijack
With Django Hijack, admins can log in and work on behalf of other users without having to know their credentials. 3.x docs are available in the docs folder. Th
Enter
SonarQube
SonarQube empowers all developers to write cleaner and safer code. Thousands of automated Static Code Analysis rules, protecting your app on multiple fronts, a
Enter
nebula
Nebula is a scalable overlay networking tool with a focus on performance, simplicity and security. It lets you seamlessly connect computers anywhere in the wor
Enter
truffleHog
truffleHog searches through git repositories for high entropy strings and secrets, digging deep into commit history. TruffleHog runs behind the scenes to scan
Enter
readpe
readpe (formerly known as pev) is a multiplatform toolkit to work with PE (Portable Executable) binaries. Its main goal is to provide feature-rich tools for pr
Enter