Our Security (o-security)
.Osec is a lightweight integrity
checking system. WARNING! Project moved
to https://github.com/legionus/osec.
Audience: System Administrators.
Programming Lang...
Enter
XML-Security Plug-In
. The Eclipse XML-Security Plug-In
allows you to experiment with the W3C
recommendations on digital signatures
and encryption and to learn all about
their back...
Enter
aws-security-viz
. Need a quick way to visualize your
current aws/amazon ec2 security group
configuration? aws-security-viz does
just that based on the EC2 security
group ingre...
Enter
Security VMS
. Features:Intuitive, Responsive and
Resource-effective . This is an
application that can also be fetched
from
https://sourceforge.net/projects/security-vms/....
Enter
InstallFix Security Suite
. Uses NSIS as a coding language to
create tiny installer-like programs that
remove cookies, junk, and adware. While
no longer in development, it remains
usefu...
Enter
Simple Security Policy Editor
. SSPE: Simple Security Policy Editor
is a simple distributed firewall with an
central ascii administration. It uses
two plain manually edited ascii-files
and ...
Enter
JDS: Data Security
. JDS is a powerful tool for data
protection. Documents are encrypted
using a special algorithm. The data
encryption algorithm is constantly
updated to improve...
Enter
WS-Security Wrapper
. WS-Security Wrapper is an adapter
between XML applications and SOAP Web
services implementing WS-Security. It
handles all aspects of SOAP/WS-Security
encodin...
Enter
XML-Security Plug-In
. The Eclipse XML-Security Plug-In
allows you to experiment with the W3C
recommendations on digital signatures
and encryption and to learn all about
their back...
Enter
Acegi Security System for Spring
. Spring Security (formerly Acegi
Security) is now hosted on the Spring
Framework website:
http://www.springframework.org/spring-security/.
Audience: Developer...
Enter
visualNets Graphical Network Security
. visualNets is a log analysis utility
that graphically plots network packets
over time. Plot source or destination IP
or port addresses in a graphical format ...
Enter
SIP Proxy - VoIP Security Test Tool
. With SIP Proxy you will have the
opportunity to eavesdrop and manipulate
SIP traffic. Furthermore, predefined
security test cases can be executed to
find wea...
Enter
OWASP Security Shepherd
. The OWASP Security Shepherd project
enables users to learn or to improve
upon existing manual penetration testing
skills. Utilizing the OWASP top ten as a
ch...
Enter
Network Security Response Framework
. The Network Security Response
Framework (NSRF) allows for testing
different computer security response
engines and methodologies. It supports
simulated and r...
Enter
Linux Security Auditing Tool
. Linux Security Auditing Tool (LSAT)
is a post install security auditing
tool. It is modular in design, so new
features can be added quickly. It checks
many s...
Enter
Umbrella Security Project
. Umbrella is a security mechanism that
implements a combination of
Process-Based Access Control (PBAC) and
authentication of Digital Signed
Binaries (DSB). Um...
Enter
Automatic Security
. A security scanner coded in a tcl/tk
extension for use with linux and unix
systems . It automatically downloads
patches and exploits how ever testing of
them...
Enter
Springenwerk Security Scanner
.Springenwerk is a free Cross Site
Scripting (XSS) security scanner written
in Python. Audience: Information
Technology. User interface:
Command-line, Tk. Prog...
Enter
JPA Security
. JPA Security is an Access Control
Solution for the Java Persistence API.
JPA Security enables you to configure
access control to your JPA Entity Beans
based ...
Enter
Hcon Security Testing Framework
. HconSTF is Open Source Penetration
Testing Framework based on different
browser technologies, Which helps any
security professional to assists in the
Penetra...
Enter
SCAP Security Guide
. The purpose of this project is to
create security policy content for
various platforms, Red Hat Enterprise
Linux, Fedora, Ubuntu, Debian, SUSE
Linux Enterpri...
Enter
buck-security
. ATTENTION: buck-security has now
moved to github. Please find the lastest
relaeses at
https://github.com/davewood/buck-security/releases
This SourceForge pag...
Enter
JWT Spring Security Demo
. This is a demo for using JWT (JSON
Web Token) with Spring Security and
Spring Boot. I completely rewrote my
first version. Now this solution is
based on the ...
Enter
The Linux Basic Security Module
. The Linux BSM is an auditing tool
that aims to bring the capabilities of
Sun's Solaris Basic Security Module
to Linux. Audience: System
Administrators. P...
Enter
Inscribe | Data Security and Privacy
. Make your data encrypted in a few
clicks! Inscribe by Crypto Ststems helps
you cut down development time by
providing you with a flexible data
encryptor inte...
Enter
PHP Security Scanner
. PHP Security Scanner is a tool
written in PHP intended to search PHP
code for vulnarabilities. MySQL DB
stores patterns to search for as well as
the results ...
Enter
Acegi Security Extensions Project
. Acegi-ext aims to provide additional
capabilities to Acegi Security
Framework,such as declarative management
of ACL entries,support for Acegi
Security in por...
Enter
arangi security
.Provide security configuration to
arangi framework. Audience: Developers.
Programming Language: Java. This is an
application that can also be fetched
from htt...
Enter
Open Source Security Gateway
. OSSEG is an IMS compatible security
gateway that adds firewall, VPN, IDS,
IPS, and monitoring functionalities to
VoIP networks. Audience: System
Administrato...
Enter
BRST - Border Router Security Tool
. The BRST - Border Router Security
Tool is a web based utility for
generating secure configuration files
for Cisco routers in a border
configuration. The admi...
Enter
RAMDisk Security OS
. RAMdisk-based Operating System for
conducting Security Audits. Includes
hping2, xprobe, netcat, lsh, wardialer,
and more -- all on 1 computer disk. Runs
off ...
Enter
MOPS:MOdelchecking Programs for Security
.The MOdelchecking Programs for
Security(MOPS) project produces software
you can use to find security bugs in
your C programs. Examples include time
to check t...
Enter
Darkfire Security Project
. A stable and fast Linux/Unix toolset
to aid in the security and ease of use
of *Nix. Audience: Other Audience,
System Administrators. User interface:
Cocoa (...
Enter
SecSy: Security-oriented Log Synthesis
. SecSy is a tool for security-oriented
log synthesis. Besides basic synthesis
properties (cases per day, office hours,
randomized activity duration, .), its d...
Enter
phpcs-security-audit v3
. phpcs-security-audit is a set of
PHP_CodeSniffer rules that finds
vulnerabilities and weaknesses related
to security in PHP code. It currently
has core PHP r...
Enter
Automated Security Tools
. Automated Security Tools (autosec)
aims to provide automatic tools which
network administrators may use to help
check and test the security of their
network....
Enter
OWASP Find Security Bugs
. The SpotBugs plugin for security
audits of Java web applications. Find
Security Bugs is the SpotBugs plugin for
security audits of Java web
applications. It ...
Enter
Linux Security Enhancer
. Linsec is a shell script firstly
designed for slackware linux 10 and now
supports most of linux distros. Linsec
improves security of Linux systems
(kernel pa...
Enter
JDS: Data Security
. JDS is a powerful tool for data
protection. Documents are encrypted
using a special algorithm. The data
encryption algorithm is constantly
updated to improve...
Enter
AAA Security Framework for Avalon
. A security framework for providing
AAA functionality for Avalon based
applications. The pluggable architecture
for underlying datastores and
Authentication, ...
Enter
Cobalt Security
.Firewall and Security solutions for
your Cobalt Servers. Tired of being port
scanned? Sick of foreign hackers
installing root kits? Come check it out.
Audienc...
Enter
visualNets Graphical Network Security
. visualNets is a log analysis utility
that graphically plots network packets
over time. Plot source or destination IP
or port addresses in a graphical format ...
Enter
Acegi Security System for Spring
. Spring Security (formerly Acegi
Security) is now hosted on the Spring
Framework website:
http://www.springframework.org/spring-security/.
Audience: Developer...
Enter
WS-Security Wrapper
. WS-Security Wrapper is an adapter
between XML applications and SOAP Web
services implementing WS-Security. It
handles all aspects of SOAP/WS-Security
encodin...
Enter
Security Policy Manager
.Creates true post-admission network
access control by regulating network
access to admitted users on an as needed
basis. Users cannot escalate privileges
betw...
Enter
SIP Proxy - VoIP Security Test Tool
. With SIP Proxy you will have the
opportunity to eavesdrop and manipulate
SIP traffic. Furthermore, predefined
security test cases can be executed to
find wea...
Enter
Virtual Reality Security
. The purpose of this project is to
develop and maintain a Virtual Reality
network interface to provide for network
management and security for heterogenous
ne...
Enter
WS-Security implementation for Axis
.External library for the Apache
project Axis implementing UsernameToken
spec from the working draft Web Services
Security Username Token Profile
ver1.1(Sunday...
Enter
WebWalker Internet Security Tool
. QT based Linux web security tool that
it is designed to test targets for weak
passwords using crack, leech and URL
testing functions. Plugins allow
potential...
Enter
Cerber -- security module for FreeBSD
.Cerber -- system firewall mechanism.
It's a kernel module, which is a
complete security solution for FreeBSD.
Audience: Developers, System
Administrators....
Enter
Folder Security Viewer
. This software supports network
administrators to access the correct
security role for a specific folder
without having to load windows explorer
which will lo...
Enter
Enforcer Linux Security Module (LSM)
.The Enforcer is a Linux Security
Module designed to improve integrity of
a computer running Linux by ensuring no
tampering of the filesystem. It can
interact ...
Enter
Springenwerk Security Scanner
.Springenwerk is a free Cross Site
Scripting (XSS) security scanner written
in Python. Audience: Information
Technology. User interface:
Command-line, Tk. Prog...
Enter
JPA Security
. JPA Security is an Access Control
Solution for the Java Persistence API.
JPA Security enables you to configure
access control to your JPA Entity Beans
based ...
Enter
project Cubic Security
. Audience: Security. User interface:
Win32 (MS Windows). Programming
Language: C#. Database Environment:
SQL-based. Categories:Desktop Publishing...
Enter
Cookie Revolver Security Framework
.The Cookie-revolver framework provides
J2EE web-applications with two-factor
authentication security, �something I
know� (userid/password) and �something I
ha...
Enter
Qualdev Security
.The Qualdev Security Server integrates
the security services for the tools that
support the Qualdev Group. It gives the
necessary infrastructure to offer serv...
Enter
SecurityLevel - Manage security settings
. Started as part of the Google Summer
of Code 2005, this tool adjusts security
settings on Linux systems, including
firewall and SELinux policies. This tool
a...
Enter
Network Security Scorebot
. Scorebot is a scoring framework which
monitors the integrity of various
network services for the purpose of
scoring a network security exercise.
Audience: Go...
Enter
JWT Spring Security Demo
. This is a demo for using JWT (JSON
Web Token) with Spring Security and
Spring Boot. I completely rewrote my
first version. Now this solution is
based on the ...
Enter
Huorong Security
. Operation mode: EDR operation system,
network-wide threat awareness With the
Huorong terminal as the cornerstone,
while protecting users, it detects
various ...
Enter
Addons for IOSEC - DoS HTTP Security
.IOSEC PHP HTTP FLOOD PROTECTION ADDONS
IOSEC is a php component that allows you
to simply block unwanted access to your
webpage. if a bad crawler uses to much...
Enter
Distributed Active Security against DDoS
. A linux kernel implementation of a
distributed protocol to provide
pro-active defence against Distributed
Denial of Service (DDoS) attacks.
Audience: Informa...
Enter
Network Security Analysis Tool
.NSAT is a fast, highly configurable,
bulk network security scanner for over
50 different services and hundreds of
vulnerabilities. It's main advantage
is ...
Enter
Spring Security
. Spring Security is a powerful and
highly customizable authentication and
access-control framework. It is the
de-facto standard for securing
Spring-based appl...
Enter
kkp NetBIOS Security Tool
. kkp is a security tool based on a
vulnerability in handling of the NetBIOS
protocol by the Microsoft Windows 9x
platform. It is meant to be the most
reliable...
Enter
Blindeye Security Monitoring
. The Blindeye web application is a
front end for the Blindeyes Distributed
Command Framework. Blindeye will be
specifically tailored towards the
viewing and d...
Enter
Warify Information Security Toolkit
.An Information Security toolkit to
help companies understand what
information can be gleaned about them
without performing any hacking attempts
Audience: Adva...
Enter
phpcs-security-audit v3
. phpcs-security-audit is a set of
PHP_CodeSniffer rules that finds
vulnerabilities and weaknesses related
to security in PHP code. It currently
has core PHP r...
Enter
SecSy: Security-oriented Log Synthesis
. SecSy is a tool for security-oriented
log synthesis. Besides basic synthesis
properties (cases per day, office hours,
randomized activity duration, .), its d...
Enter
SMSec - Simplicity Makes Security
. SMSec is a free , open source, GPLed
implementation of two-factor
authentication via SMS (Short Message
Service). It uses SMSD to "talk"
to GSM modem...
Enter
hack://src Security Suite
.Software repository of the hack://src
project. Includes security related
software for crypto, vulnerability/patch
notification & management, and ultra
low...
Enter
OWASP Find Security Bugs
. The SpotBugs plugin for security
audits of Java web applications. Find
Security Bugs is the SpotBugs plugin for
security audits of Java web
applications. It ...
Enter
BRST - Border Router Security Tool
.The BRST - Border Router Security Tool
is a web based utility for generating
secure configuration files for Cisco
routers in a border configuration. The
admin...
Enter
HellFire-IRC Security Services
. Hellfire (Formally Sentinel) is a set
of IRC statistical and operator services
for Hybrid, ircd-ratbox, csircd, +CS,
and Bahamut ircd's.Hellfire provides...
Enter
Security Tools Collection
. Collection of open source security
tools that enhance the ability of people
and companies to secure their
environment. These tools will build upon
the founda...
Enter
phpBB-Security Enhanced
. A phpBB BBS modded version, with
security in mind. If you are looking for
a secure phpBB, you are in the right
Project. Audience: End Users/Desktop.
Programm...
Enter
Omega IRC Security Services
. Omega IRC Security Services - is a
*nix based, modularized security
services coded in C. Which supports
multiple IRCd protocols.
Features:Dynamic configurati...
Enter
AAA Security Framework for Avalon
. A security framework for providing
AAA functionality for Avalon based
applications. The pluggable architecture
for underlying datastores and
Authentication, ...
Enter
JAK Security Suite
. Open Source Security Suite
Verschl�ssselung mit Blowfish/Twofish/
AES. Datenl�schung mit Guttmann
(Default)/Pseudorandom Data/US DoD
5220-22.M Methode. User ...
Enter
Security-Tools Database
. Security-Tools Database is an easy to
use tool to manage tool-tipps (e.g. from
the SecurityFocus.com Newsletters and
other sources). Simply copy + paste tipp...
Enter
Web Image Security
.Web Image Security combines some
javascript, php, and htaccess techniques
to make it extremely challenging for
would-be image- or bandwidth-thieves
from viola...
Enter
WS-Security implementation for Axis
.External library for the Apache
project Axis implementing UsernameToken
spec from the working draft Web Services
Security Username Token Profile
ver1.1(Sunday...
Enter
SempGate Network Security Accelerator
. FPGA based hardware card which
implements above 4 giga bps network
traffic throughput under affordable
hardware cost. With linux driver and
kernel patch, sof...
Enter
Security Code Scan
. Detects various security
vulnerability patterns. SQL Injection,
Cross-Site Scripting (XSS), Cross-Site
Request Forgery (CSRF), XML eXternal
Entity Injection ...
Enter
Fatsec Security Driver
. Emulate filesystem security on
Windows 9x systems with FAT16/32
filesystems. Files, directories, and
drives can be assigned
read/write/execute permissions wh...
Enter
Cookie Revolver Security Framework
.The Cookie-revolver framework provides
J2EE web-applications with two-factor
authentication security, �something I
know� (userid/password) and �something I
ha...
Enter
Addons for IOSEC - DoS HTTP Security
.IOSEC PHP HTTP FLOOD PROTECTION ADDONS
IOSEC is a php component that allows you
to simply block unwanted access to your
webpage. if a bad crawler uses to much...
Enter
Host.Deny- Your Fast Track Security Reso
. A HOST.DENY file is a file that, when
loaded to the /etc folder of your web
server, will ban any paople using the
IP's on this compiled list. There is
al...
Enter
Domain Analyzer Security Tool
. Domain analyzer is a security
analysis tool which automatically
discovers and reports information about
the given domain. Its main purpose is to
analyze doma...
Enter
Video security client/server system
. ARGUVISION - an enterprise class
Video surveillance system. ARGUVISION is
based on distributed Linux or Unix
cluster architecture, with up to 1000
cameras pe...
Enter
Blindeye Security Monitoring
.The Blindeye web application is a
front end for the Blindeyes Distributed
Command Framework. Blindeye will be
specifically tailored towards the
viewing and da...
Enter
Security Center
. This toolkit has complete security
Package start from Tweak manager ,
Updater , Virus scanner ,Proxy server
and many more This will be help full for
user fro...
Enter
Opportunistic E-Mail-Security-System
. Securing mails without involving
user. Secures them as often as possible
if it is possible. Shows security-state
and process of mails and mail-partners.
Audi...
Enter
SMSec - Simplicity Makes Security
. SMSec is a free , open source, GPLed
implementation of two-factor
authentication via SMS (Short Message
Service). It uses SMSD to "talk"
to GSM modem...
Enter
Secure layers for improving security
. Squrelayerproxy is a project aimed
for adding more privacy for existing
messengers, proxy and security features.
For windows you have a free and good
HTTP pr...
Enter
hack://src Security Suite
. Software repository of the hack://src
project. Includes security related
software for crypto, vulnerability/patch
notification & management, and ultra
lo...
Enter
Security Code Scan
. Detects various security
vulnerability patterns. SQL Injection,
Cross-Site Scripting (XSS), Cross-Site
Request Forgery (CSRF), XML eXternal
Entity Injection ...
Enter
Enterprise Laptop Security System
. It was made for Universities/Colleges
to manage their students' laptops in
order to prevent theft cases. If your
university or college is prone to such c...
Enter
Code Quality and Security for C#
. Sonar offers a single cohesive
solution with a consistent set of
metrics and hundreds of static analysis
rules to detect your coding issues
early. Plus fast ...
Enter
SEPIA: Security-oriented PN Framework
.SEPIA provides implementations for
various types of Petri nets. Along
Place/Transition-nets, it supports Petri
nets with distinguishable token colors
and defi...
Enter
SEPIA: Security-oriented PN Framework to run in Linux online
.SEPIA provides implementations for
various types of Petri nets. Along
Place/Transition-nets, it supports Petri
nets with distinguishable token colors
and defi...
Enter
Code Quality and Security for Java
. Hundreds of unique rules to find Java
bugs, code smells & vulnerabilities.
Sonar static analysis helps you build
and maintain high-quality Java code. Cov...
Enter
iSpy Camera Security Software
. iSpy uses your USB webcams, IP cams,
capture cards, desktops and microphones
to detect and record movement or sound
and provides security, surveillance,
moni...
Enter
DefectDojo
. DefectDojo is a security
orchestration and vulnerability
management platform. DefectDojo allows
you to manage your application security
program, maintain pro...
Enter
Code Quality and Security for C#
. Sonar offers a single cohesive
solution with a consistent set of
metrics and hundreds of static analysis
rules to detect your coding issues
early. Plus fast ...
Enter
SEPIA: Security-oriented PN Framework to run in Windows online over Linux online
.SEPIA provides implementations for
various types of Petri nets. Along
Place/Transition-nets, it supports Petri
nets with distinguishable token colors
and defi...
Enter
SEWOL: Security-oriented Workflow Lib
. SEWOL provides support for the
handling of workflow traces. It allows
to specify the shape and content of
process traces in terms of entries
representing the...
Enter
Code Quality and Security for Java
. Hundreds of unique rules to find Java
bugs, code smells & vulnerabilities.
Sonar static analysis helps you build
and maintain high-quality Java code. Cov...
Enter
Deffend.net Otus
. Deffend.net Otus aims to help small
companies and individuals to avoid cyber
security threats through cyber hygiene.
It runs on Windows desktop and looks for...
Enter
Sihas
. Deffend.net Sihas aims to help small
companies and individuals to avoid cyber
security threats through cyber hygiene.
It runs on Windows desktop and looks fo...
Enter
Prowler
. Prowler is an Open Source security
tool to perform AWS security best
practices assessments, audits, incident
response, continuous monitoring,
hardening, and ...
Enter
Advanced Persistent Security
. The architecture of the system is
integrated by different Fingerprinting
mechanisms. The system is designed from
a core that avoids the detection of
sdhash a...
Enter
SEWOL: Security-oriented Workflow Lib
. SEWOL provides support for the
handling of workflow traces. It allows
to specify the shape and content of
process traces in terms of entries
representing the...
Enter
ZAP
. The OWASP Zed Attack Proxy (ZAP) is
one of the world�s most popular free
security tools and is actively
maintained by a dedicated international
team of volun...
Enter
AAT Direct Connect Hub Project
. Scripts and hub mods written to
enhance OpenDCHub. The Hub-Security
script filters unregistered users by
country, and adds op commands and
security features....
Enter
Agnitio
. A tool to help developers and
security professionals conduct manual
security code reviews in a consistent
and repeatable way. Agnitio aims to
replace the adh...
Enter
Mythril
. Mythril is a security analysis tool
for EVM bytecode. It detects security
vulnerabilities in smart contracts built
for Ethereum, Hedera, Quorum, Vechain,
Roo...
Enter
Advanced Persistent Security
. The architecture of the system is
integrated by different Fingerprinting
mechanisms. The system is designed from
a core that avoids the detection of
sdhash a...
Enter
Eolos VoipAudit
. Visual Framework Tool to scan/sniff
address space, enumerate users, crack
credentials, pattern based dial spoofing
and security reporting for Voip
protocols....
Enter
Prowler
. Prowler is an Open Source security
tool to perform AWS security best
practices assessments, audits, incident
response, continuous monitoring,
hardening, and ...
Enter
VeraCrypt
. VeraCrypt is a free disk encryption
software brought to you by IDRIX
(https://www.idrix.fr) and based on
TrueCrypt 7.1a. It adds enhanced
security to the alg...
Enter
ZAP
. The OWASP Zed Attack Proxy (ZAP) is
one of the world�s most popular free
security tools and is actively
maintained by a dedicated international
team of volun...
Enter
LibreWolf-for-Void
. A fork of Firefox, focused on
privacy, security and freedom. This
project is an independent fork of
Firefox, with the primary goals of
privacy, security and ...
Enter
openGalaxy
. This project aims to provide a method
for listening on a serial port and
decode incoming messages from a Galaxy
security control panel. The messages are
tran...
Enter
XML DSIG and Encryption (C++)
.A C++ library implementing the XML
DSIG and XML Encryption standards. Based
on the Apache project's Xerces
(DOM/SAX parser) and Xalan (XSL/XPATH
processor...
Enter
Terrascan
. Detect compliance and security
violations across Infrastructure as Code
to mitigate risk before provisioning
cloud native infrastructure. As you
embrace Infr...
Enter
NetSPOC
. NetSPOC is a Network Security POlicy
Compiler. A tool for simplified security
management of networks with multiple
security domains. NetSPOC takes a
descript...
Enter
AAT Direct Connect Hub Project
. Scripts and hub mods written to
enhance OpenDCHub. The Hub-Security
script filters unregistered users by
country, and adds op commands and
security features....
Enter
Mythril
. Mythril is a security analysis tool
for EVM bytecode. It detects security
vulnerabilities in smart contracts built
for Ethereum, Hedera, Quorum, Vechain,
Roo...
Enter
Eolos VoipAudit
. Visual Framework Tool to scan/sniff
address space, enumerate users, crack
credentials, pattern based dial spoofing
and security reporting for Voip
protocols....
Enter
TinySecuritySuite
. Tiny Security Suite is a simple
collection of portable security tools
that are essentials. It consist of
Clamwin Antivrius, PAPI Firewall, and
the developer ...
Enter
VeraCrypt
. VeraCrypt is a free disk encryption
software brought to you by IDRIX
(https://www.idrix.fr) and based on
TrueCrypt 7.1a. It adds enhanced
security to the alg...
Enter
Sn1per
. Sn1per Professional is an all-in-one
offensive security platform that
provides a comprehensive view of your
internal and external attack surface and
offers a...
Enter
Tsunami
. Tsunami is a general purpose network
security scanner with an extensible
plugin system for detecting high
severity vulnerabilities with high
confidence. When...
Enter
Enlightn
. Enlightn scans your Laravel app code
to provide you actionable
recommendations on improving its
performance, security & more.
We'll perform over 100 ...
Enter
Catnip
. Servlet container extensions that
help web developers write full featured
Java web applications.
Features:Security: XSS Filter/Valve
infrastructure for Apach...
Enter
LibreWolf-for-Void
. A fork of Firefox, focused on
privacy, security and freedom. This
project is an independent fork of
Firefox, with the primary goals of
privacy, security and ...
Enter
Terrascan
. Detect compliance and security
violations across Infrastructure as Code
to mitigate risk before provisioning
cloud native infrastructure. As you
embrace Infr...
Enter
XML DSIG and Encryption (C++)
.A C++ library implementing the XML
DSIG and XML Encryption standards. Based
on the Apache project's Xerces
(DOM/SAX parser) and Xalan (XSL/XPATH
processor...
Enter
HISPACTA
.Example java web application using
layered architecture and Hibernate
(persistence), Spring (integration, AOP)
+ Acegi security, Tapestry (GUI) and
JUnit (tes...
Enter
NetSPOC
. NetSPOC is a Network Security POlicy
Compiler. A tool for simplified security
management of networks with multiple
security domains. NetSPOC takes a
descript...
Enter
OSCAL
. NIST is developing the Open Security
Controls Assessment Language (OSCAL), a
set of hierarchical, XML-, JSON-, and
YAML-based formats that provide a
standard...
Enter
FATE
. FATE (Federated AI Technology
Enabler) is the world's first
industrial grade federated learning open
source framework to enable enterprises
and instituti...
Enter
openGalaxy
. This project aims to provide a method
for listening on a serial port and
decode incoming messages from a Galaxy
security control panel. The messages are
tran...
Enter
Tsunami
. Tsunami is a general purpose network
security scanner with an extensible
plugin system for detecting high
severity vulnerabilities with high
confidence. When...
Enter
lynis
. Lynis is a battle-tested security
tool for systems running Linux, macOS,
or Unix-based operating system. It
performs an extensive health scan of
your systems...
Enter
firejail
. Firejail is a SUID program that
reduces the risk of security breaches by
restricting the running environment of
untrusted applications using Linux
namespaces...
Enter
Enlightn
. Enlightn scans your Laravel app code
to provide you actionable
recommendations on improving its
performance, security & more.
We'll perform over 100 ...
Enter
FaceAccess Facial Recognition System
. With the growing need to exchange
information and share resources,
information security has become more
important than ever in both the public
and private se...
Enter
Prueba
. This is an application that can also
be fetched from
https://sourceforge.net/projects/prueba/.
It has been hosted in OnWorks in order
to be run online in an ...
Enter
Catnip
. Servlet container extensions that
help web developers write full featured
Java web applications.
Features:Security: XSS Filter/Valve
infrastructure for Apach...
Enter
BunkerWeb
. Being a full-featured web server
(based on NGINX under the hood), it will
protect your web services to make them
"secure by default". BunkerWeb
integ...
Enter
SIGOF
. SIGOF (Security Information Graphics
Oriented Forensic) aims at synthetizing
security log, stored in a acid/base
database schema, in order to provide a
graph...
Enter
secheck
. secheck is a script which imitates
currently existing log checkers but with
a focus on security. secheck does some
basic system security checking, then
email...
Enter
SOMAP.org to run in Linux online
.Security Officers Management and
Analysis Project (SOMAP) is all about
defining security management work
methods and supplying Security Officers
with tools to...
Enter
SSH-MITM
. ssh man-in-the-middle (ssh-mitm)
server for security audits supporting
publickey authentication, session
hijacking and file manipulation.
SSH-MITM is a man i...
Enter
OWASP Juice Shop
. It can be used in security trainings,
awareness demos, CTFs and as a guinea
pig for security tools! Juice Shop
encompasses vulnerabilities from the
entire OW...
Enter
Sippts
. Sippts is a set of tools to audit
VoIP servers and devices using SIP
protocol. Sippts is programmed in Python
and it allows us to check the security
of a VoI...
Enter
Abdal Header Analyzer
. Abdal Header Analyzer is a software
for analyzing site and web server
headers. As you know, headers contain
information that security experts and
hackers use...
Enter
imntr
. imntr (inode monitor) can be used to
montior activity on files or
directories. Monitoring is accomplished
through the inotify API, which is
available on Linu...
Enter
Algo VPN
. Introducing Algo, a self-hosted
personal VPN server designed for ease of
deployment and security. Algo
automatically deploys an on-demand VPN
service in the ...
Enter
Universal Password Manager
. Universal Password Manager allows you
to store all your passwords in one
highly secure encrypted database. Its
strengths are simplicity, portability
and secu...
Enter
Project Alumni
. Project Alumni is an open source
project with the intention of giving any
education (or non education) institution
with alumni members the ability to
easily ...
Enter
firejail
. Firejail is a SUID program that
reduces the risk of security breaches by
restricting the running environment of
untrusted applications using Linux
namespaces...
Enter
FedStage FedSAML
. FedStage FedSAML is a software aiming
to implement security SAML2.0 standard,
supporting low ((de)serialization) and
higher level (easy way of creating and v...
Enter
Sobelow
. Sobelow is a security-focused static
analysis tool for the Phoenix framework.
For security researchers, it is a useful
tool for getting a quick view of point...
Enter
WiFi Password Recovery
. WiFi Password Recovery is a free
utility to recover the passwords of the
WiFi networks saved on your computer.
For example if you forgot the password
of a Wi...
Enter
LDAP Enabled Application Framework
.LDAP Enabled Application
Framework(LEAFs), is a J2EE based
application framework that couples a
strong security model with MVC. The
security of LEAFs is model...
Enter
Advisory Check
. Advisory Check is a tool for
monitoring the security of installed
software. It gathers security advisories
using RSS/RDF/XML feeds, compares them
against a l...
Enter
pam_duration
. pam_duration provides a module for
the Pluggable Authentication Module
(PAM) authorization framework that sets
per-day limits on total usage by
particular Li...
Enter
thc-hydra
. Number one of the biggest security
holes are passwords, as every password
security study shows. This tool is a
proof of concept code, to give
researchers and...
Enter
Prueba
. This is an application that can also
be fetched from
https://sourceforge.net/projects/prueba/.
It has been hosted in OnWorks in order
to be run online in an ...
Enter
Ragna Scribe
. Ragna Scribe is a versatile text
editor which can hold multiple documents
at the same time and each document
organises a set of articles in a tree
order. The...
Enter
SIPVicious
. SIPVicious OSS has been around since
2007 and is actively updated to help
security teams, QA and developers test
SIP-based VoIP systems and applications.
Ope...
Enter
Lighthouse Ethereum
. Lighthouse is an Ethereum consensus
client that connects to other Ethereum
consensus clients to form a resilient
and decentralized proof-of-stake
blockchain....
Enter
OWASP Amass
. The OWASP Amass Project has developed
a tool to help information security
professionals perform network mapping of
attack surfaces and perform external
asset...
Enter
Tstconfig
. Tstconfig is a system administration
tool that tests (a large number of)
configuration files automatically.
Mainly intended for security, it can be
used to t...
Enter
AWS EKS Terraform module
. Terraform module which creates AWS
EKS (Kubernetes) resources.
Windows-based node support is limited to
a default user data template that is
provided due to ...
Enter
Cibet
. The cibet framework provides
developers with functionality of the
following topics: - Dual Control (4-Eyes
Principle .) - Extended Authorisation
(Enhance Spr...
Enter
SOMAP.org
. Security Officers Management and
Analysis Project (SOMAP) is all about
defining security management work
methods and supplying Security Officers
with tools t...
Enter
PHP thumbnail Photo Gallery
. A graphical PHP coded thumbnail image
gallery using either a simple text file
database OR Mysql database. really easy
to install. features include multiple i...
Enter
Drive Badger
. Drive Badger is a software tool for
data exfiltration � which means, for
copying data from the computer to
external USB drive. Unlike many other
tools from I...
Enter
Simple Event Correlator
. Simple Event Correlator (SEC) is a
lightweight event correlator for network
management, log file monitoring,
security management, fraud detection,
and other ...
Enter
Nebular
. Nebular is a customizable Angular UI
library that contains 40+ UI components,
four visual themes, and Auth and
Security modules. Recognized at the
prestigiou...
Enter
EDSS
. EDSS stands for Easy Debian Security
Script and it is a very easy to use
script that installs additional
software, configures the software, and
scans a GNU/L...
Enter
Pacu
. Pacu (named after a type of Piranha
in the Amazon) is a comprehensive AWS
security-testing toolkit designed for
offensive security practitioners. While
sever...
Enter
SSH-MITM
. ssh man-in-the-middle (ssh-mitm)
server for security audits supporting
publickey authentication, session
hijacking and file manipulation.
SSH-MITM is a man i...
Enter
dnmap
. dnmap is a distributed nmap framwork
using a client/server architecture. The
server reads the commands from a file
and send them to each client. The client
e...
Enter
Simple Event Correlator to run in Linux online
.Simple Event Correlator (SEC) is a
lightweight event correlator for network
management, log file monitoring,
security management, fraud detection,
and other t...
Enter
Sippts
. Sippts is a set of tools to audit
VoIP servers and devices using SIP
protocol. Sippts is programmed in Python
and it allows us to check the security
of a VoI...
Enter
SOMAP.org to run in Windows online over Linux online
.Security Officers Management and
Analysis Project (SOMAP) is all about
defining security management work
methods and supplying Security Officers
with tools to...
Enter
FileHashler
. Java based API and console utility
for cross-platform file encryption and
archiving (currently encrypts single
files up to 9.2 EB length). Uses Twofish
(CBC)...
Enter
Tranalyzer
. The Anteater moves to a new site,
available under ...
Enter
AnonyROM
. AnonyROM is as the name suggests, A
ROM based around anonymity for the HTC
Amaze 4G. It is built on HTC's stock
4.04 ROM, with Sense completetly
stripped...
Enter
pfyshnet
. Pfyshnet is a public anonymous peer
to peer network and file-system.
Security is its primary concern, and it
provides security for all aspects of
participati...
Enter
Falco
. Falco is a open source project to
detect abnormal application behavior in
a cloud native environment like
Kubernetes. This cloud native runtime
security proj...
Enter
BrowserBox
. Remote isolated browser API for
security, automation visibility and
interactivity. Run-on our cloud, or
bring your own. Full scope double
reverse web proxy w...
Enter
nuclei
. Nuclei is used to send requests
across targets based on a template,
leading to zero false positives and
providing fast scanning on a large
number of hosts. N...
Enter
passlog
. Passlog is a Visual Basic program to
allow windows access to be logged to
syslog. While it is not intended to be a
high security program it can provide
some ...
Enter