XML-Security Plug-In
The Eclipse XML-Security Plug-In allows you to experiment with the W3C recommendations on digital signatures and encryption and to learn all about their backgr
Enter
MCP Server (Rad Security)
The RAD Security MCP Server is an MCP server that provides AI-powered security insights for Kubernetes and cloud environments. It integrates with the RAD Secur
Enter
Inscribe | Data Security and Privacy
Make your data encrypted in a few clicks! Inscribe by Crypto Ststems helps you cut down development time by providing you with a flexible data encryptor interf
Enter
E.System.Security
E.System.Security is an actively developed library for .NET that simplifies integrating your microservices with a Service Mesh and provides enterprise-grade se
Enter
visualNets Graphical Network Security
visualNets is a log analysis utility that graphically plots network packets over time. Plot source or destination IP or port addresses in a graphical format wi
Enter
WS-Security Wrapper
WS-Security Wrapper is an adapter between XML applications and SOAP Web services implementing WS-Security. It handles all aspects of SOAP/WS-Security encoding
Enter
SIP Proxy - VoIP Security Test Tool
With SIP Proxy you will have the opportunity to eavesdrop and manipulate SIP traffic. Furthermore, predefined security test cases can be executed to find weak
Enter
Folder Security Viewer
This software supports network administrators to access the correct security role for a specific folder without having to load windows explorer which will load
Enter
project Cubic Security
Audience: Security. User interface: Win32 (MS Windows). Programming Language: C#. Database Environment: SQL-based. Categories: Desktop Publishing
Enter
JWT Spring Security Demo
This is a demo for using JWT (JSON Web Token) with Spring Security and Spring Boot. I completely rewrote my first version. Now this solution is based on the co
Enter
Huorong Security
Operation mode: EDR operation system, network-wide threat awareness With the Huorong terminal as the cornerstone, while protecting users, it detects various th
Enter
Security VMS
Features: Intuitive, Responsive and Resource-effective . This is an application that can also be fetched from https: //sourceforge.net/projects/security-vms/.
Enter
phpcs-security-audit v3
phpcs-security-audit is a set of PHP_CodeSniffer rules that finds vulnerabilities and weaknesses related to security in PHP code. It currently has core PHP rul
Enter
SCAP Security Guide
The purpose of this project is to create security policy content for various platforms, Red Hat Enterprise Linux, Fedora, Ubuntu, Debian, SUSE Linux Enterprise
Enter
Symfony Security Core
Part of the Symfony framework, the Security Core component provides the foundational tools for managing authentication, authorization, and access control in PH
Enter
phpBB-Security Enhanced
A phpBB BBS modded version, with security in mind. If you are looking for a secure phpBB, you are in the right Project. Audience: End Users/Desktop. Programmin
Enter
Spring Security
Spring Security is a powerful and highly customizable authentication and access-control framework. It is the de-facto standard for securing Spring-based applic
Enter
spring-security-jwt-guide
This project is a comprehensive example repository that demonstrates how to secure a Spring Boot application using Spring Security and JSON Web Tokens (JWT). I
Enter
OWASP Find Security Bugs
The SpotBugs plugin for security audits of Java web applications. Find Security Bugs is the SpotBugs plugin for security audits of Java web applications. It ca
Enter
Claude Code Security Review
The claude-code-security-review repository implements a GitHub Action that uses Claude (via the Anthropic API) to perform semantic security audits of code chan
Enter
Symfony Security Bundle
Symfony Security Bundle is a powerful tool for adding authentication and authorization to Symfony applications. It provides mechanisms for managing user roles,
Enter
Agentic Security
The open-source Agentic LLM Vulnerability Scanner. Features: Customizable Rule Sets or Agent based attacksDocumentation availableExamples availableComprehensiv
Enter
Opportunistic E-Mail-Security-System
Securing mails without involving user. Secures them as often as possible if it is possible. Shows security-state and process of mails and mail-partners. Audien
Enter
SMSec - Simplicity Makes Security
SMSec is a free , open source, GPLed implementation of two-factor authentication via SMS (Short Message Service). It uses SMSD to "talk" to GSM modems,
Enter
Secure layers for improving security
Squrelayerproxy is a project aimed for adding more privacy for existing messengers, proxy and security features. For windows you have a free and good HTTP prox
Enter
Security Code Scan
Detects various security vulnerability patterns. SQL Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), XML eXternal Entity Injection (X
Enter
Enterprise Laptop Security System
It was made for Universities/Colleges to manage their students' laptops in order to prevent theft cases. If your university or college is prone to such cas
Enter
FMSec - File Manager Security
FMSec (File Manager SECurity) is a set of extensions to file managers that enable some security-related operations to be easily performed. The operations are:
Enter
iSpy Camera Security Software
iSpy uses your USB webcams, IP cams, capture cards, desktops and microphones to detect and record movement or sound and provides security, surveillance, monito
Enter
Code Quality and Security for C#
Sonar offers a single cohesive solution with a consistent set of metrics and hundreds of static analysis rules to detect your coding issues early. Plus fast an
Enter
Deffend.net Otus
Deffend.net Otus aims to help small companies and individuals to avoid cyber security threats through cyber hygiene. It runs on Windows desktop and looks for m
Enter
Sihas
Deffend.net Sihas aims to help small companies and individuals to avoid cyber security threats through cyber hygiene. It runs on Windows desktop and looks for
Enter
Code Quality and Security for Java
Hundreds of unique rules to find Java bugs, code smells & vulnerabilities. Sonar static analysis helps you build and maintain high-quality Java code. Cover
Enter
KubeArmor
KubeArmor is a runtime Kubernetes security engine. It uses eBPF and Linux Security Modules(LSM) for fortifying workloads based on Cloud Containers, IoT/Edge, a
Enter
Prowler
Prowler is an Open Source security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening, and fo
Enter
AAT Direct Connect Hub Project
Scripts and hub mods written to enhance OpenDCHub. The Hub-Security script filters unregistered users by country, and adds op commands and security features. S
Enter
Mythril
Mythril is a security analysis tool for EVM bytecode. It detects security vulnerabilities in smart contracts built for Ethereum, Hedera, Quorum, Vechain, Roost
Enter
Eolos VoipAudit
Visual Framework Tool to scan/sniff address space, enumerate users, crack credentials, pattern based dial spoofing and security reporting for Voip protocols. T
Enter
TinySecuritySuite
Tiny Security Suite is a simple collection of portable security tools that are essentials. It consist of Clamwin Antivrius, PAPI Firewall, and the developer ow
Enter
VeraCrypt
VeraCrypt is a free disk encryption software brought to you by IDRIX (https: //www.idrix.fr) and based on TrueCrypt 7.1a. It adds enhanced security to the algo
Enter
LibreWolf-for-Void
A fork of Firefox, focused on privacy, security and freedom. This project is an independent fork of Firefox, with the primary goals of privacy, security and us
Enter
Terrascan
Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure. As you embrace Infras
Enter
Tracee
Tracee is a runtime security and observability tool that helps you understand how your system and applications behave. It is using eBPF technology to tap into
Enter
NetSPOC
NetSPOC is a Network Security POlicy Compiler. A tool for simplified security management of networks with multiple security domains. NetSPOC takes a descriptio
Enter
Arkime
Arkime is an open source, large-scale, full packet capturing, indexing, and database system designed to augment existing security infrastructure by storing and
Enter
Tsunami
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. When s
Enter
Custom Erase Algorithm by Mariano Ortu
This project provides a secure file deletion algorithm designed to permanently erase data by overwriting files with customizable patterns. It ensures that dele
Enter
Enlightn
Enlightn scans your Laravel app code to provide you actionable recommendations on improving its performance, security & more. We'll perform over 100 ch
Enter
Algo VPN
Introducing Algo, a self-hosted personal VPN server designed for ease of deployment and security. Algo automatically deploys an on-demand VPN service in the cl
Enter
Infosec Reference
Infosec Reference is a curated knowledge base and resource repository for information security practitioners. It aggregates cheat sheets, tooling guides, proto
Enter
Catnip
Servlet container extensions that help web developers write full featured Java web applications. Features: Security: XSS Filter/Valve infrastructure for Apache
Enter
firejail
Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces a
Enter
Is Website Vulnerable
A command-line tool that scans websites for known security vulnerabilities in their frontend dependencies by checking against the Snyk vulnerability database.
Enter
fleet
Fleet exposes familiar concepts from traditional MDMs like custom attributes and dynamic grouping, but in a way that lets you work directly with data and event
Enter
Vault
Manage secrets and protect sensitive data. Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets
Enter
GuardDog
guarddog is an open-source security tool by DataDog designed to detect risks in open-source dependencies. It helps developers analyze software supply chain ris
Enter
OWASP Amass
The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset d
Enter
WiFi Password Recovery
WiFi Password Recovery is a free utility to recover the passwords of the WiFi networks saved on your computer. For example if you forgot the password of a WiFi
Enter
Paseto
Paseto (Platform-Agnostic Security Tokens) is an open-source security token format designed as a more secure alternative to JWT (JSON Web Tokens). Unlike JWT,
Enter
Prueba
This is an application that can also be fetched from https: //sourceforge.net/projects/prueba/. It has been hosted in OnWorks in order to be run online in an e
Enter
Laravel CSP
By default, all scripts on a webpage are allowed to send and fetch data to any site they want. This can be a security problem. Imagine one of your JavaScript d
Enter
Digital Signer (a PDF Signing software)
Digital Signer is a powerful and user-friendly software designed to secure and authenticate your digital documents with ease. Ideal for individuals, businesses
Enter
SSH-MITM
ssh man-in-the-middle (ssh-mitm) server for security audits supporting publickey authentication, session hijacking and file manipulation. SSH-MITM is a man in
Enter
Sippts
Sippts is a set of tools to audit VoIP servers and devices using SIP protocol. Sippts is programmed in Python and it allows us to check the security of a VoIP
Enter
pfyshnet
Pfyshnet is a public anonymous peer to peer network and file-system. Security is its primary concern, and it provides security for all aspects of participating
Enter
Universal Password Manager
Universal Password Manager allows you to store all your passwords in one highly secure encrypted database. Its strengths are simplicity, portability and securi
Enter
Wazuh
Wazuh is an open-source, unified security platform that delivers extended detection and response (XDR) and SIEM capabilities for on-premises, cloud, container,
Enter
Sobelow
Sobelow is a security-focused static analysis tool for the Phoenix framework. For security researchers, it is a useful tool for getting a quick view of points-
Enter
FedStage FedSAML
FedStage FedSAML is a software aiming to implement security SAML2.0 standard, supporting low ((de)serialization) and higher level (easy way of creating and ver
Enter
AWS EKS Terraform module
Terraform module which creates AWS EKS (Kubernetes) resources. Windows-based node support is limited to a default user data template that is provided due to th
Enter
url-checker-php-sdk
The EmailVeritas URL Checker PHP SDK provides real-time phishing and malicious link detection through the official EmailVeritas API. It enables developers to c
Enter
Ragna Scribe
Ragna Scribe is a versatile text editor which can hold multiple documents at the same time and each document organises a set of articles in a tree order. The d
Enter
Nebular
Nebular is a customizable Angular UI library that contains 40+ UI components, four visual themes, and Auth and Security modules. Recognized at the prestigious
Enter
SIPVicious
SIPVicious OSS has been around since 2007 and is actively updated to help security teams, QA and developers test SIP-based VoIP systems and applications. Open-
Enter
Lighthouse Ethereum
Lighthouse is an Ethereum consensus client that connects to other Ethereum consensus clients to form a resilient and decentralized proof-of-stake blockchain. L
Enter
amazon-vpc-resource-controller-k8s
Controller for managing Trunk & Branch Network Interfaces on EKS Cluster using Security Group For Pod feature and IPv4 Addresses for Windows Node. Controll
Enter
thc-hydra
Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and s
Enter
secure-electron-template
A current electron app template with the most popular frameworks, designed and built with security in mind. Once cloned, install the dependencies for the repo
Enter
Spring Boot Demo
This repository is a hands-on, �deep learning by doing� collection of Spring Boot demos that you can run and study module by module. It currently includes 66 p
Enter
Trivy Operator
The Trivy Operator leverages Trivy to continuously scan your Kubernetes cluster for security issues. The scans are summarised in security reports as Kubernetes
Enter
Sigma
Welcome to the Sigma main rule repository. The place where detection engineers, threat hunters and all defensive security practitioners collaborate on detectio
Enter
Cibet
The cibet framework provides developers with functionality of the following topics: - Dual Control (4-Eyes Principle .) - Extended Authorisation (Enhance Sprin
Enter
Role Manager
Role Manager is a security management framework based on the NIST model for Role Based Access Control (RBAC) and the Java[TM] 2 Platform security standards. Th
Enter
PHP thumbnail Photo Gallery
A graphical PHP coded thumbnail image gallery using either a simple text file database OR Mysql database. really easy to install. features include multiple ima
Enter
Falco
Falco is a open source project to detect abnormal application behavior in a cloud native environment like Kubernetes. This cloud native runtime security projec
Enter
BrowserBox
Remote isolated browser API for security, automation visibility and interactivity. Run-on our cloud, or bring your own. Full scope double reverse web proxy wit
Enter
U-Tranz
U-Tranz is a free application developed on the characteristics of UDP allows the transmission of unlimited file size. Most of the applications based on UDP res
Enter
nuclei
Nuclei is used to send requests across targets based on a template, leading to zero false positives and providing fast scanning on a large number of hosts. Nuc
Enter
HexStrike AI MCP Agents
HexStrike AI is an MCP server that lets LLM agents autonomously operate a large catalog of offensive-security tools. Its goal is to bridge �language models� an
Enter
Media-Cert
The Re-launch is now ready and live. Feel free to try and enjoy it out. Should you experience any issues just create a ticket and I will look into it asap. The
Enter
bearer
Welcome to the Bearer documentation. Bearer is a static application security testing (SAST) tool that scans your source code and analyzes your data flows to di
Enter
UserUnlock
There is an age old issue with security / windows domains / shared workstations. If several users share a workstation, then from an audit / security standpoint
Enter
NPQ
npq is a security-focused package manager that analyzes npm dependencies for potential vulnerabilities before installation. It helps developers ensure the safe
Enter
Go Safe Web
go-safeweb is a security-focused HTTP framework for Go that bakes in secure defaults so common web vulnerabilities are harder to introduce. Instead of leaving
Enter
FileHashler
Java based API and console utility for cross-platform file encryption and archiving (currently encrypts single files up to 9.2 EB length). Uses Twofish (CBC) a
Enter
Secure P2P Framework (SePP)
This project develops a secure P2P framework in Java (SePP). Existing P2P frameworks are not covering security by design but rather implement only some high la
Enter
Application Inspector
Microsoft Application Inspector is a software source code characterization tool that helps identify coding features of first or third party software components
Enter
ANNFiD
Just carved a bunch of bytes and have no idea what they could be? Maybe ANNFiD can help. ANNFiD uses neural network to identify byte patterns. It can be traine
Enter
Commius
Community-based interoperability Utility for SMEs. Commius main objective is to support the SMEs with a zero, or very low-cost, entry into interoperability, ba
Enter
CaptfEncoder
Captfencoder is a rapid cross-platform network security tool suite, providing network security-related code conversion, classical cryptography, cryptography, a
Enter
QuickPasswordGenerator
This program generate random password of a specified length, with numbers, upper and lowercase letters and special symbols. Features: Small size.Easy interface
Enter
Effacor
When a file is deleted from a device the space for that file is merely de-allocated. In short: The DATA contained in that file still remains, and can be recove
Enter
APIthet
APIthet is an application to security test RESTful web APIs. Assessing APIs help in detecting security vulnerabilities at an early stage of the SDLC. Compare t
Enter
Infection Monkey
Infection Monkey is a open source automated security testing tool for testing a network's security baseline. Monkey is a tool that infects machines and pro
Enter
Bandit
Bandit is a tool designed to find common security issues in Python code. To do this, Bandit processes each file, builds an AST from it, and runs appropriate pl
Enter
tirreno
The open-source security analytics. tirreno helps you to understand, monitor, and protect your platforms from cyber fraud, account threats, and abuse. Proactiv
Enter
Arcjet
Arcjet helps developers protect their apps in just a few lines of code. Implement rate limiting, bot protection, email verification, and defense against common
Enter
inventory-scoring
A tool (adobe air) to do maturity scoring of solutions. This is an offspring of projet ESIS, we use this tool with customer to assess which solutions could be
Enter
nodejsscan
Static security code scanner (SAST) for Node.js applications powered by libsast and semgrep. nodejsscan is a static security code scanner for Node.js applicati
Enter
Payloads All The Things
A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques. The API key is a unique identifier
Enter
Zeek
Zeek has a long history in the open source and digital security worlds. Vern Paxson began developing the project in the 1990s under the name �Bro� as a means t
Enter
Visual Figaro
Visual Figaro is an integrated environment to develop component libraries for the dependability modeling tool KB3 used by EDF (http: //www.edf.fr/recherche/cod
Enter
Passbolt API
Passbolt API is an open-source password manager designed for teams. It allows users to securely store and share passwords using end-to-end encryption. Passbolt
Enter
Interwhat?
A Firefox tutorial add-on for adult absolute beginners, to provide information on and to build up understanding of the threats and features of the web. Suggest
Enter
Cipherbox
Cipherbox is what I consider to be a cryptographic swiss knife. It utilizes six encryption algorithms, and it's also a vault that's locked with four RF
Enter
Aqeria
Aqeria is a documentation and records-management utility for psychiatric clinics, designed to expedite creation, management, and viewing of patient records, pr
Enter
boundman
Boundman is an advanced, user-friendly, and sleek application designed to take control over your network connections. It allows you to efficiently manage and b
Enter
Lexik JWT Authentication Bundle
LexikJWTAuthenticationBundle is a Symfony bundle that provides JWT (JSON Web Token) authentication for RESTful APIs. It simplifies the process of generating an
Enter
Mobile Verification Toolkit
Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potentia
Enter
Powerful files and text searcher
Last release: 29/7/2023. Enhanced program. The interface font size is big for ease of access. You can download source code that can be found in 'source cod
Enter
windows_hardening
This repository, also known as HardeningKitty, is a comprehensive Windows hardening checklist for personal and enterprise environments. It translates security
Enter
phpStickyBoard
phpStickyBoard aimed at creating a forum program in simple, quick and easy-to-use interfaces. Security(of structure, contents) is concerned as the most importa
Enter
SafeBox
A free and Open-Source File Encryption and Decryption app with GUI (Graphical User Interface) and CLI (Command Line Interface) that help you to protect your pr
Enter
Java Sec Code
Java sec code is a very powerful and friendly project for learning Java vulnerability code. This project can also be called Java vulnerability code. Each vulne
Enter
Java Client for Google Maps Services
This library brings the Google Maps API Web Services to your server-side Java application. Each Google Maps Web Service request requires an API key. API keys a
Enter
FOSUserBundle
The FOSUserBundle adds support for a database-backed user system in Symfony2+. It provides a flexible framework for user management that aims to handle common
Enter
rkt
rkt (pronounced like a "rocket") is a CLI for running application containers on Linux. rkt is designed to be secure, composable, and standards-based. S
Enter
Django Hijack
With Django Hijack, admins can log in and work on behalf of other users without having to know their credentials. 3.x docs are available in the docs folder. Th
Enter
SonarQube
SonarQube empowers all developers to write cleaner and safer code. Thousands of automated Static Code Analysis rules, protecting your app on multiple fronts, a
Enter
nebula
Nebula is a scalable overlay networking tool with a focus on performance, simplicity and security. It lets you seamlessly connect computers anywhere in the wor
Enter
truffleHog
truffleHog searches through git repositories for high entropy strings and secrets, digging deep into commit history. TruffleHog runs behind the scenes to scan
Enter
readpe
readpe (formerly known as pev) is a multiplatform toolkit to work with PE (Portable Executable) binaries. Its main goal is to provide feature-rich tools for pr
Enter
Lantern
Can't access your favorite apps? Download Lantern to easily access videos, messaging, and other popular apps while at school or work. Lantern is an applica
Enter
drozer
drozer (formerly Mercury) is the leading security testing framework for Android. drozer allows you to search for security vulnerabilities in apps and devices b
Enter
OpenWAF
The first all-round open source Web security protection system, more protection than others. OpenWAF is the first fully open source Web application protection
Enter
Rancher
From datacenter to cloud to edge, Rancher lets you deliver Kubernetes-as-a-Service. Rancher is a complete software stack for teams adopting containers. It addr
Enter
Slim Toolkit
Inspect, Optimize and Debug Your Containers. You don't have to change anything in your application images to make them smaller! Keep doing what you are doi
Enter
Wapiti
Wapiti is a vulnerability scanner for web applications. It currently search vulnerabilities like XSS, SQL and XPath injections, file inclusions, command execut
Enter
Rocket.Chat
Real-time conversations with your colleagues, other companies or customers. Enable teams to collaborate with real-time chat, audio, file sharing and Video call
Enter
Sureness
Sureness allows you to security any server written with jvm modern frameworks such as Spring, Spring Boot, Spring WebFlux, Javalin, Quarkus, Micronaut, Solon,
Enter
Fake Name Generator
Program generates as many fake names as you want in lots of different languages. Works in Linux, *BSD & Windows. Version 2.0x saves the names to a file cal
Enter
SpringBoot Labs
SpringBoot-Labs is a comprehensive learning and reference repository created by yudaocode that explores advanced concepts, features, and best practices in Spri
Enter
CrowdSec
CrowdSec - an open-source massively multiplayer firewall able to analyze visitor behavior & provide an adapted response to all kinds of attacks. It also le
Enter
NextDNS
NextDNS protects you from all kinds of security threats, blocks ads and trackers on websites and in apps and provides a safe and supervised Internet for kids,
Enter
Secure Internet Live Conferencing
See http: //silcnet.org/ for detailed information. SILC provides common chat and conferencing services like private messages, instant messages, channels and gr
Enter
DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their
Enter
SpringAll
SpringAll is a comprehensive learning project that gathers a wide range of Spring, Spring Boot, and Spring Cloud demos in one repository. It is designed for de
Enter
Keeper Wallet
High-security wallet with swapping capabilities. Keeper Wallet is your entry point to the Waves blockchain and Waves-powered web services. Seed phrases and pri
Enter
LINKERD
Enterprise power without enterprise complexity. Linkerd adds security, observability, and reliability to any Kubernetes cluster. 100% open source, CNCF graduat
Enter
Pterodactyl Panel
Pterodactyl� is a free, open-source game server management panel built with PHP, React, and Go. Designed with security in mind, Pterodactyl runs all game serve
Enter
Awesome Stars
awesome-hacking-lists is a curated directory of penetration-testing tools and productivity utilities spanning multiple security domains. Curated lists across m
Enter
Visitor ID Management System
Everything You Need to Print Professional-Quality Cards Set up your card printing system and begin producing photo IDs in minutes with this Solution�no softwar
Enter
CloudQuery
CloudQuery extracts, transforms and loads your cloud assets into normalized PostgreSQL tables. CloudQuery enables you to assess, audit, and monitor the configu
Enter
Ajv JSON schema validator
Security and reliability for JavaScript applications. Ensure your data is valid as soon as it's received. Instead of having your data validation and saniti
Enter
Conscrypt
Conscrypt is a modern TLS/SSL provider for Java that replaces the default JCE/JCA crypto stack with one backed by BoringSSL for better performance and security
Enter
InQL Scanner
A security testing tool to facilitate GraphQL technology security auditing efforts. InQL can be used as a stand-alone script or as a Burp Suite extension. Sinc
Enter
F-Talk P2P Encrypted Secure Voip
This project connect to two peers directly ( using without any central server, stun server ) together with 128bit encrypted secure voip communication. http: //
Enter
Zero Site Protector
The zero-site-protector plugin is a powerful security tool for your website that provides multiple layers of protection to safeguard against unauthorized acces
Enter
Domain Password Spray
DomainPasswordSpray is a focused security tool designed to perform enterprise-scale password spraying assessments against Active Directory environments. It aut
Enter
PSIA
The Physical Security Interoperability Alliance (PSIA) was founded to promote the interoperability of IP enabled security devices and systems using freely avai
Enter
Cyber Ghost � Scanner
CyberGhost Code Scanner � Smart Malware Detection for Developers CyberGhost Code Scanner is a powerful, all-in-one executable tool designed for source code and
Enter
microsoft telemetry-tools
complete set of tools for windows security analysis and protection. Categories: Security, Vulnerability Scanners
Enter
mod_csrf
mod_csrf is a module for the Apache Web server. It prevents cross-site request forgery attacks to vulnerable HTML forms. Audience: System Administrators, Secur
Enter
libike
Libike is a cross-platform C library for managing IKE negotiations.The library implements RFC-standard ISAKMP/IKE exchanges and utilizes callbacks to delegate
Enter
AIVIS
A.I. security app. Development ceased. Audience: Information Technology, System Administrators. User interface: Web-based. Programming Language: Java, Lisp, PH
Enter
ASP.NET Minimal APIs Made Easy
It nudges you towards the REPR Design Pattern (Request-Endpoint-Response) for convenient & maintainable endpoint creation with virtually no boilerplate. Pe
Enter
mimikatz
mimikatz is a tool that makes some "experiments" with Windows security. It's well-known to extract plaintexts passwords, hash, PIN code and kerbero
Enter
Alarmas
Yet another alarms program with features as file modification alarm (maybe useful for security auditories), alarms file saving possibility and of course time a
Enter
Shibboleth
A privacy and security aware mailing list manager, perfect for allowing closed groups to interact on the Internet without interference from outsiders and forme
Enter
ProcessMemoryDumper
Process Memory Dumper it's developed for IT Consultants IT Security Consultants that need to dump the entire memory of a process and/or save informations a
Enter
MaddCrypt
MaddCrypt is a simple application that focuses on protection, encryption, and obfuscation for dotNET application. Designed with high-end features, MaddCrypt ha
Enter
GoSafe
GoSafe is a collection of pre built packages and enhanced documentation use for the purpose of spreading awareness and education of the importance of Informati
Enter
NGINX Admin�s Handbook
nginx-admins-handbook is a practical, in-depth guide for configuring, securing, and operating NGINX across real-world deployments. It distills years of researc
Enter
P-STET
The PCS Security Technology Evaluation Tool (P-STET) is a tool funded by the I3P which allows maintainers of Critical Infrastructure systems to evaluate and co
Enter
Unified Timeline
Audience: Science/Research, Security. User interface: Java Swing, Java AWT, Win32 (MS Windows). Programming Language: Java. Database Environment: Project is a
Enter
FlashPolicyServer
The newly introduced security policy for Flash requires the servers to serve the security policy for allowing socket connections to their servers at port 843.
Enter
NARC
NARC Network Analysis Reporting Console takes output from security tools like Nessus, and NMap & populates a database via automated scripts for reporting p
Enter
phpBB Reloaded
phpBB Reloaded is a feature packed forum system based on the secure codebase of phpBB 2.0.x. We aim to have the security and stability of phpBB 2.0.x, but incl
Enter
AssocGEN
A java-based framework to determine file origins on a file system by accessing system and application logs and track the evidence trace through metadata.?. Aud
Enter
ProxyCrypt
ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to
Enter
QSF MILTER
This is a milter which scans emails with qsf (Quick Spam Filter). Features: sendmailmailemailfiltermilterqsfspamantispam Audience: System Administrators, Deve
Enter
OCD-01
OCD is a simple web UI written in PHP [and little CSS]. It displays dashboard of current OSSEC activity. Originally written to allow NOC to monitor OSSEC event
Enter
Linux TiTan
Linux TiTan is yet another Linux Distribution that is divided into 3 parts , the main system including packages compiled by us , a security system and a deskto
Enter
SHS VPN Client
VPN client for Small HTTP server Small HTTP server includes a VPN server that works on the https protocol. This is a client application for this server. Featur
Enter
CRM114 MILTER
This is a milter which scans emails with CRM114. Features: sendmailmailemailfiltermiltercrm114spamantispam Audience: System Administrators, Developers, Securi
Enter
ClamSAP
ClamSAP exists of two 'C' shared libraries which link between ClamAV and the Virus Scan Interface (VSI) of SAP (offical name: NW-VSI). A SAP applicatio
Enter
knokspack
**WP Site Suite is the only plugin you need to manage and supercharge your WordPress site.** Tired of juggling dozens of plugins for security, performance, mar
Enter
Cafeto
Implementation of standard of security alerts IDMEF in platform J2EE with WebService, JMS and RMI. Audience: Information Technology, System Administrators. Use
Enter
DoS As You Are
Just a little project I've made last summer.Nothing too serious.If you want to help be my guest.It's written in .NET(C#) so you can de-compile it using
Enter
tnv
TNV visualizes pcap data to graphically depict network packets, links, and ports for network traffic analysis to facilitate learning what constitutes 'norm
Enter
Authme
Features: Secure: Your codes is secured by AES 256bit encrypton and your own password.Import: You can directly import from Google Authenticator or from any 2FA
Enter
Quinti.net -Secure Contact Form Antispam
This form adds antispam security features and CAPTCHA: Invulnerable secure antispam. JavaScript field validator written in php. Prevent spammers from use your
Enter
tracecat
Tracecat is an open-source Tines / Splunk SOAR alternative for security engineers. We're building the features of Tines using enterprise-grade open-source
Enter
SAVI-SAP
SAVI-SAP is a shared library which links between Sophos Scan Interface SAVI and the SAP Virus Scan Interface (offical name: NW-VSI). A SAP application can use
Enter
Stegcore
Stegcore is a crypto-stego application that carries out steganography using text cryptography and the least significant bit method to secure text data such as
Enter
SecurityXPlorer
Intended for web administrators who host their site on a shared web host, and thus don't have the privileges to install various security software. Main pur
Enter
Coin Wallet
Coin Wallet is a non-custodial multicurrency wallet for multiple platforms. A secure, user-friendly cryptocurrency wallet focused on providing essential featur
Enter
Gophish
Gophish is a powerful open-source phishing toolkit that makes it easy to test an organization�s exposure to phishing. Designed for businesses and penetration t
Enter
Luadch
We moved to GitHub! New Website: http: //luadch.github.io/ There you will find all the necessary informations. Audience: Advanced End Users, Developers, Securi
Enter
LaunchAdmin
Launch Admin for Windows XP allows users using a limited user account (LUA) to perform administrative tasks conveniently. It is for users who want the security
Enter