XML-Security Plug-In
. The Eclipse XML-Security Plug-In
allows you to experiment with the W3C
recommendations on digital signatures
and encryption and to learn all about
their back...
Enter
aws-security-viz
. Need a quick way to visualize your
current aws/amazon ec2 security group
configuration? aws-security-viz does
just that based on the EC2 security
group ingre...
Enter
Security VMS
. Features:Intuitive, Responsive and
Resource-effective . This is an
application that can also be fetched
from
https://sourceforge.net/projects/security-vms/....
Enter
InstallFix Security Suite
. Uses NSIS as a coding language to
create tiny installer-like programs that
remove cookies, junk, and adware. While
no longer in development, it remains
usefu...
Enter
Simple Security Policy Editor
. SSPE: Simple Security Policy Editor
is a simple distributed firewall with an
central ascii administration. It uses
two plain manually edited ascii-files
and ...
Enter
WS-Security Wrapper
. WS-Security Wrapper is an adapter
between XML applications and SOAP Web
services implementing WS-Security. It
handles all aspects of SOAP/WS-Security
encodin...
Enter
XML-Security Plug-In
. The Eclipse XML-Security Plug-In
allows you to experiment with the W3C
recommendations on digital signatures
and encryption and to learn all about
their back...
Enter
visualNets Graphical Network Security
. visualNets is a log analysis utility
that graphically plots network packets
over time. Plot source or destination IP
or port addresses in a graphical format ...
Enter
SIP Proxy - VoIP Security Test Tool
. With SIP Proxy you will have the
opportunity to eavesdrop and manipulate
SIP traffic. Furthermore, predefined
security test cases can be executed to
find wea...
Enter
Network Security Response Framework
. The Network Security Response
Framework (NSRF) allows for testing
different computer security response
engines and methodologies. It supports
simulated and r...
Enter
Linux Security Auditing Tool
. Linux Security Auditing Tool (LSAT)
is a post install security auditing
tool. It is modular in design, so new
features can be added quickly. It checks
many s...
Enter
Umbrella Security Project
. Umbrella is a security mechanism that
implements a combination of
Process-Based Access Control (PBAC) and
authentication of Digital Signed
Binaries (DSB). Um...
Enter
Hcon Security Testing Framework
. HconSTF is Open Source Penetration
Testing Framework based on different
browser technologies, Which helps any
security professional to assists in the
Penetra...
Enter
SCAP Security Guide
. The purpose of this project is to
create security policy content for
various platforms, Red Hat Enterprise
Linux, Fedora, Ubuntu, Debian, SUSE
Linux Enterpri...
Enter
buck-security
. ATTENTION: buck-security has now
moved to github. Please find the lastest
relaeses at
https://github.com/davewood/buck-security/releases
This SourceForge pag...
Enter
JWT Spring Security Demo
. This is a demo for using JWT (JSON
Web Token) with Spring Security and
Spring Boot. I completely rewrote my
first version. Now this solution is
based on the ...
Enter
The Linux Basic Security Module
. The Linux BSM is an auditing tool
that aims to bring the capabilities of
Sun's Solaris Basic Security Module
to Linux. Audience: System
Administrators. P...
Enter
Inscribe | Data Security and Privacy
. Make your data encrypted in a few
clicks! Inscribe by Crypto Ststems helps
you cut down development time by
providing you with a flexible data
encryptor inte...
Enter
PHP Security Scanner
. PHP Security Scanner is a tool
written in PHP intended to search PHP
code for vulnarabilities. MySQL DB
stores patterns to search for as well as
the results ...
Enter
Open Source Security Gateway
. OSSEG is an IMS compatible security
gateway that adds firewall, VPN, IDS,
IPS, and monitoring functionalities to
VoIP networks. Audience: System
Administrato...
Enter
BRST - Border Router Security Tool
. The BRST - Border Router Security
Tool is a web based utility for
generating secure configuration files
for Cisco routers in a border
configuration. The admi...
Enter
RAMDisk Security OS
. RAMdisk-based Operating System for
conducting Security Audits. Includes
hping2, xprobe, netcat, lsh, wardialer,
and more -- all on 1 computer disk. Runs
off ...
Enter
Darkfire Security Project
. A stable and fast Linux/Unix toolset
to aid in the security and ease of use
of *Nix. Audience: Other Audience,
System Administrators. User interface:
Cocoa (...
Enter
SecSy: Security-oriented Log Synthesis
. SecSy is a tool for security-oriented
log synthesis. Besides basic synthesis
properties (cases per day, office hours,
randomized activity duration, .), its d...
Enter
phpcs-security-audit v3
. phpcs-security-audit is a set of
PHP_CodeSniffer rules that finds
vulnerabilities and weaknesses related
to security in PHP code. It currently
has core PHP r...
Enter
Automated Security Tools
. Automated Security Tools (autosec)
aims to provide automatic tools which
network administrators may use to help
check and test the security of their
network....
Enter
OWASP Find Security Bugs
. The SpotBugs plugin for security
audits of Java web applications. Find
Security Bugs is the SpotBugs plugin for
security audits of Java web
applications. It ...
Enter
Linux Security Enhancer
. Linsec is a shell script firstly
designed for slackware linux 10 and now
supports most of linux distros. Linsec
improves security of Linux systems
(kernel pa...
Enter
visualNets Graphical Network Security
. visualNets is a log analysis utility
that graphically plots network packets
over time. Plot source or destination IP
or port addresses in a graphical format ...
Enter
Acegi Security System for Spring
. Spring Security (formerly Acegi
Security) is now hosted on the Spring
Framework website:
http://www.springframework.org/spring-security/.
Audience: Developer...
Enter
WS-Security Wrapper
. WS-Security Wrapper is an adapter
between XML applications and SOAP Web
services implementing WS-Security. It
handles all aspects of SOAP/WS-Security
encodin...
Enter
SIP Proxy - VoIP Security Test Tool
. With SIP Proxy you will have the
opportunity to eavesdrop and manipulate
SIP traffic. Furthermore, predefined
security test cases can be executed to
find wea...
Enter
Virtual Reality Security
. The purpose of this project is to
develop and maintain a Virtual Reality
network interface to provide for network
management and security for heterogenous
ne...
Enter
WebWalker Internet Security Tool
. QT based Linux web security tool that
it is designed to test targets for weak
passwords using crack, leech and URL
testing functions. Plugins allow
potential...
Enter
Folder Security Viewer
. This software supports network
administrators to access the correct
security role for a specific folder
without having to load windows explorer
which will lo...
Enter
project Cubic Security
. Audience: Security. User interface:
Win32 (MS Windows). Programming
Language: C#. Database Environment:
SQL-based. Categories:Desktop Publishing...
Enter
SecurityLevel - Manage security settings
. Started as part of the Google Summer
of Code 2005, this tool adjusts security
settings on Linux systems, including
firewall and SELinux policies. This tool
a...
Enter
Network Security Scorebot
. Scorebot is a scoring framework which
monitors the integrity of various
network services for the purpose of
scoring a network security exercise.
Audience: Go...
Enter
JWT Spring Security Demo
. This is a demo for using JWT (JSON
Web Token) with Spring Security and
Spring Boot. I completely rewrote my
first version. Now this solution is
based on the ...
Enter
Huorong Security
. Operation mode: EDR operation system,
network-wide threat awareness With the
Huorong terminal as the cornerstone,
while protecting users, it detects
various ...
Enter
Distributed Active Security against DDoS
. A linux kernel implementation of a
distributed protocol to provide
pro-active defence against Distributed
Denial of Service (DDoS) attacks.
Audience: Informa...
Enter
Spring Security
. Spring Security is a powerful and
highly customizable authentication and
access-control framework. It is the
de-facto standard for securing
Spring-based appl...
Enter
kkp NetBIOS Security Tool
. kkp is a security tool based on a
vulnerability in handling of the NetBIOS
protocol by the Microsoft Windows 9x
platform. It is meant to be the most
reliable...
Enter
Blindeye Security Monitoring
. The Blindeye web application is a
front end for the Blindeyes Distributed
Command Framework. Blindeye will be
specifically tailored towards the
viewing and d...
Enter
phpcs-security-audit v3
. phpcs-security-audit is a set of
PHP_CodeSniffer rules that finds
vulnerabilities and weaknesses related
to security in PHP code. It currently
has core PHP r...
Enter
SMSec - Simplicity Makes Security
. SMSec is a free , open source, GPLed
implementation of two-factor
authentication via SMS (Short Message
Service). It uses SMSD to "talk"
to GSM modem...
Enter
OWASP Find Security Bugs
. The SpotBugs plugin for security
audits of Java web applications. Find
Security Bugs is the SpotBugs plugin for
security audits of Java web
applications. It ...
Enter
HellFire-IRC Security Services
. Hellfire (Formally Sentinel) is a set
of IRC statistical and operator services
for Hybrid, ircd-ratbox, csircd, +CS,
and Bahamut ircd's.Hellfire provides...
Enter
Security Tools Collection
. Collection of open source security
tools that enhance the ability of people
and companies to secure their
environment. These tools will build upon
the founda...
Enter
phpBB-Security Enhanced
. A phpBB BBS modded version, with
security in mind. If you are looking for
a secure phpBB, you are in the right
Project. Audience: End Users/Desktop.
Programm...
Enter
Omega IRC Security Services
. Omega IRC Security Services - is a
*nix based, modularized security
services coded in C. Which supports
multiple IRCd protocols.
Features:Dynamic configurati...
Enter
JAK Security Suite
. Open Source Security Suite
Verschl�ssselung mit Blowfish/Twofish/
AES. Datenl�schung mit Guttmann
(Default)/Pseudorandom Data/US DoD
5220-22.M Methode. User ...
Enter
Security-Tools Database
. Security-Tools Database is an easy to
use tool to manage tool-tipps (e.g. from
the SecurityFocus.com Newsletters and
other sources). Simply copy + paste tipp...
Enter
SempGate Network Security Accelerator
. FPGA based hardware card which
implements above 4 giga bps network
traffic throughput under affordable
hardware cost. With linux driver and
kernel patch, sof...
Enter
Security Code Scan
. Detects various security
vulnerability patterns. SQL Injection,
Cross-Site Scripting (XSS), Cross-Site
Request Forgery (CSRF), XML eXternal
Entity Injection ...
Enter
Fatsec Security Driver
. Emulate filesystem security on
Windows 9x systems with FAT16/32
filesystems. Files, directories, and
drives can be assigned
read/write/execute permissions wh...
Enter
Host.Deny- Your Fast Track Security Reso
. A HOST.DENY file is a file that, when
loaded to the /etc folder of your web
server, will ban any paople using the
IP's on this compiled list. There is
al...
Enter
Domain Analyzer Security Tool
. Domain analyzer is a security
analysis tool which automatically
discovers and reports information about
the given domain. Its main purpose is to
analyze doma...
Enter
Video security client/server system
. ARGUVISION - an enterprise class
Video surveillance system. ARGUVISION is
based on distributed Linux or Unix
cluster architecture, with up to 1000
cameras pe...
Enter
Security Center
. This toolkit has complete security
Package start from Tweak manager ,
Updater , Virus scanner ,Proxy server
and many more This will be help full for
user fro...
Enter
Opportunistic E-Mail-Security-System
. Securing mails without involving
user. Secures them as often as possible
if it is possible. Shows security-state
and process of mails and mail-partners.
Audi...
Enter
SMSec - Simplicity Makes Security
. SMSec is a free , open source, GPLed
implementation of two-factor
authentication via SMS (Short Message
Service). It uses SMSD to "talk"
to GSM modem...
Enter
Secure layers for improving security
. Squrelayerproxy is a project aimed
for adding more privacy for existing
messengers, proxy and security features.
For windows you have a free and good
HTTP pr...
Enter
hack://src Security Suite
. Software repository of the hack://src
project. Includes security related
software for crypto, vulnerability/patch
notification & management, and ultra
lo...
Enter
Security Code Scan
. Detects various security
vulnerability patterns. SQL Injection,
Cross-Site Scripting (XSS), Cross-Site
Request Forgery (CSRF), XML eXternal
Entity Injection ...
Enter
Enterprise Laptop Security System
. It was made for Universities/Colleges
to manage their students' laptops in
order to prevent theft cases. If your
university or college is prone to such c...
Enter
Code Quality and Security for C#
. Sonar offers a single cohesive
solution with a consistent set of
metrics and hundreds of static analysis
rules to detect your coding issues
early. Plus fast ...
Enter
Code Quality and Security for Java
. Hundreds of unique rules to find Java
bugs, code smells & vulnerabilities.
Sonar static analysis helps you build
and maintain high-quality Java code. Cov...
Enter
iSpy Camera Security Software
. iSpy uses your USB webcams, IP cams,
capture cards, desktops and microphones
to detect and record movement or sound
and provides security, surveillance,
moni...
Enter
DefectDojo
. DefectDojo is a security
orchestration and vulnerability
management platform. DefectDojo allows
you to manage your application security
program, maintain pro...
Enter
Code Quality and Security for C#
. Sonar offers a single cohesive
solution with a consistent set of
metrics and hundreds of static analysis
rules to detect your coding issues
early. Plus fast ...
Enter
SEWOL: Security-oriented Workflow Lib
. SEWOL provides support for the
handling of workflow traces. It allows
to specify the shape and content of
process traces in terms of entries
representing the...
Enter
Code Quality and Security for Java
. Hundreds of unique rules to find Java
bugs, code smells & vulnerabilities.
Sonar static analysis helps you build
and maintain high-quality Java code. Cov...
Enter
Deffend.net Otus
. Deffend.net Otus aims to help small
companies and individuals to avoid cyber
security threats through cyber hygiene.
It runs on Windows desktop and looks for...
Enter
Sihas
. Deffend.net Sihas aims to help small
companies and individuals to avoid cyber
security threats through cyber hygiene.
It runs on Windows desktop and looks fo...
Enter
Prowler
. Prowler is an Open Source security
tool to perform AWS security best
practices assessments, audits, incident
response, continuous monitoring,
hardening, and ...
Enter
Advanced Persistent Security
. The architecture of the system is
integrated by different Fingerprinting
mechanisms. The system is designed from
a core that avoids the detection of
sdhash a...
Enter
ZAP
. The OWASP Zed Attack Proxy (ZAP) is
one of the world�s most popular free
security tools and is actively
maintained by a dedicated international
team of volun...
Enter
AAT Direct Connect Hub Project
. Scripts and hub mods written to
enhance OpenDCHub. The Hub-Security
script filters unregistered users by
country, and adds op commands and
security features....
Enter
Mythril
. Mythril is a security analysis tool
for EVM bytecode. It detects security
vulnerabilities in smart contracts built
for Ethereum, Hedera, Quorum, Vechain,
Roo...
Enter
Advanced Persistent Security
. The architecture of the system is
integrated by different Fingerprinting
mechanisms. The system is designed from
a core that avoids the detection of
sdhash a...
Enter
Eolos VoipAudit
. Visual Framework Tool to scan/sniff
address space, enumerate users, crack
credentials, pattern based dial spoofing
and security reporting for Voip
protocols....
Enter
Prowler
. Prowler is an Open Source security
tool to perform AWS security best
practices assessments, audits, incident
response, continuous monitoring,
hardening, and ...
Enter
VeraCrypt
. VeraCrypt is a free disk encryption
software brought to you by IDRIX
(https://www.idrix.fr) and based on
TrueCrypt 7.1a. It adds enhanced
security to the alg...
Enter
LibreWolf-for-Void
. A fork of Firefox, focused on
privacy, security and freedom. This
project is an independent fork of
Firefox, with the primary goals of
privacy, security and ...
Enter
openGalaxy
. This project aims to provide a method
for listening on a serial port and
decode incoming messages from a Galaxy
security control panel. The messages are
tran...
Enter
Terrascan
. Detect compliance and security
violations across Infrastructure as Code
to mitigate risk before provisioning
cloud native infrastructure. As you
embrace Infr...
Enter
NetSPOC
. NetSPOC is a Network Security POlicy
Compiler. A tool for simplified security
management of networks with multiple
security domains. NetSPOC takes a
descript...
Enter
AAT Direct Connect Hub Project
. Scripts and hub mods written to
enhance OpenDCHub. The Hub-Security
script filters unregistered users by
country, and adds op commands and
security features....
Enter
Mythril
. Mythril is a security analysis tool
for EVM bytecode. It detects security
vulnerabilities in smart contracts built
for Ethereum, Hedera, Quorum, Vechain,
Roo...
Enter
Eolos VoipAudit
. Visual Framework Tool to scan/sniff
address space, enumerate users, crack
credentials, pattern based dial spoofing
and security reporting for Voip
protocols....
Enter
TinySecuritySuite
. Tiny Security Suite is a simple
collection of portable security tools
that are essentials. It consist of
Clamwin Antivrius, PAPI Firewall, and
the developer ...
Enter
VeraCrypt
. VeraCrypt is a free disk encryption
software brought to you by IDRIX
(https://www.idrix.fr) and based on
TrueCrypt 7.1a. It adds enhanced
security to the alg...
Enter
Sn1per
. Sn1per Professional is an all-in-one
offensive security platform that
provides a comprehensive view of your
internal and external attack surface and
offers a...
Enter
Tsunami
. Tsunami is a general purpose network
security scanner with an extensible
plugin system for detecting high
severity vulnerabilities with high
confidence. When...
Enter
Enlightn
. Enlightn scans your Laravel app code
to provide you actionable
recommendations on improving its
performance, security & more.
We'll perform over 100 ...
Enter
Catnip
. Servlet container extensions that
help web developers write full featured
Java web applications.
Features:Security: XSS Filter/Valve
infrastructure for Apach...
Enter
LibreWolf-for-Void
. A fork of Firefox, focused on
privacy, security and freedom. This
project is an independent fork of
Firefox, with the primary goals of
privacy, security and ...
Enter
Terrascan
. Detect compliance and security
violations across Infrastructure as Code
to mitigate risk before provisioning
cloud native infrastructure. As you
embrace Infr...
Enter
NetSPOC
. NetSPOC is a Network Security POlicy
Compiler. A tool for simplified security
management of networks with multiple
security domains. NetSPOC takes a
descript...
Enter
OSCAL
. NIST is developing the Open Security
Controls Assessment Language (OSCAL), a
set of hierarchical, XML-, JSON-, and
YAML-based formats that provide a
standard...
Enter
FATE
. FATE (Federated AI Technology
Enabler) is the world's first
industrial grade federated learning open
source framework to enable enterprises
and instituti...
Enter
Tsunami
. Tsunami is a general purpose network
security scanner with an extensible
plugin system for detecting high
severity vulnerabilities with high
confidence. When...
Enter
lynis
. Lynis is a battle-tested security
tool for systems running Linux, macOS,
or Unix-based operating system. It
performs an extensive health scan of
your systems...
Enter
firejail
. Firejail is a SUID program that
reduces the risk of security breaches by
restricting the running environment of
untrusted applications using Linux
namespaces...
Enter
Enlightn
. Enlightn scans your Laravel app code
to provide you actionable
recommendations on improving its
performance, security & more.
We'll perform over 100 ...
Enter
Prueba
. This is an application that can also
be fetched from
https://sourceforge.net/projects/prueba/.
It has been hosted in OnWorks in order
to be run online in an ...
Enter
Catnip
. Servlet container extensions that
help web developers write full featured
Java web applications.
Features:Security: XSS Filter/Valve
infrastructure for Apach...
Enter
BunkerWeb
. Being a full-featured web server
(based on NGINX under the hood), it will
protect your web services to make them
"secure by default". BunkerWeb
integ...
Enter
SIGOF
. SIGOF (Security Information Graphics
Oriented Forensic) aims at synthetizing
security log, stored in a acid/base
database schema, in order to provide a
graph...
Enter
secheck
. secheck is a script which imitates
currently existing log checkers but with
a focus on security. secheck does some
basic system security checking, then
email...
Enter
SSH-MITM
. ssh man-in-the-middle (ssh-mitm)
server for security audits supporting
publickey authentication, session
hijacking and file manipulation.
SSH-MITM is a man i...
Enter
OWASP Juice Shop
. It can be used in security trainings,
awareness demos, CTFs and as a guinea
pig for security tools! Juice Shop
encompasses vulnerabilities from the
entire OW...
Enter
Sippts
. Sippts is a set of tools to audit
VoIP servers and devices using SIP
protocol. Sippts is programmed in Python
and it allows us to check the security
of a VoI...
Enter
imntr
. imntr (inode monitor) can be used to
montior activity on files or
directories. Monitoring is accomplished
through the inotify API, which is
available on Linu...
Enter
Algo VPN
. Introducing Algo, a self-hosted
personal VPN server designed for ease of
deployment and security. Algo
automatically deploys an on-demand VPN
service in the ...
Enter
Universal Password Manager
. Universal Password Manager allows you
to store all your passwords in one
highly secure encrypted database. Its
strengths are simplicity, portability
and secu...
Enter
Project Alumni
. Project Alumni is an open source
project with the intention of giving any
education (or non education) institution
with alumni members the ability to
easily ...
Enter
firejail
. Firejail is a SUID program that
reduces the risk of security breaches by
restricting the running environment of
untrusted applications using Linux
namespaces...
Enter
FedStage FedSAML
. FedStage FedSAML is a software aiming
to implement security SAML2.0 standard,
supporting low ((de)serialization) and
higher level (easy way of creating and v...
Enter
Sobelow
. Sobelow is a security-focused static
analysis tool for the Phoenix framework.
For security researchers, it is a useful
tool for getting a quick view of point...
Enter
WiFi Password Recovery
. WiFi Password Recovery is a free
utility to recover the passwords of the
WiFi networks saved on your computer.
For example if you forgot the password
of a Wi...
Enter
Advisory Check
. Advisory Check is a tool for
monitoring the security of installed
software. It gathers security advisories
using RSS/RDF/XML feeds, compares them
against a l...
Enter
pam_duration
. pam_duration provides a module for
the Pluggable Authentication Module
(PAM) authorization framework that sets
per-day limits on total usage by
particular Li...
Enter
Prueba
. This is an application that can also
be fetched from
https://sourceforge.net/projects/prueba/.
It has been hosted in OnWorks in order
to be run online in an ...
Enter
Ragna Scribe
. Ragna Scribe is a versatile text
editor which can hold multiple documents
at the same time and each document
organises a set of articles in a tree
order. The...
Enter
SIPVicious
. SIPVicious OSS has been around since
2007 and is actively updated to help
security teams, QA and developers test
SIP-based VoIP systems and applications.
Ope...
Enter
Lighthouse Ethereum
. Lighthouse is an Ethereum consensus
client that connects to other Ethereum
consensus clients to form a resilient
and decentralized proof-of-stake
blockchain....
Enter
OWASP Amass
. The OWASP Amass Project has developed
a tool to help information security
professionals perform network mapping of
attack surfaces and perform external
asset...
Enter
Tstconfig
. Tstconfig is a system administration
tool that tests (a large number of)
configuration files automatically.
Mainly intended for security, it can be
used to t...
Enter
AWS EKS Terraform module
. Terraform module which creates AWS
EKS (Kubernetes) resources.
Windows-based node support is limited to
a default user data template that is
provided due to ...
Enter
Cibet
. The cibet framework provides
developers with functionality of the
following topics: - Dual Control (4-Eyes
Principle .) - Extended Authorisation
(Enhance Spr...
Enter
PHP thumbnail Photo Gallery
. A graphical PHP coded thumbnail image
gallery using either a simple text file
database OR Mysql database. really easy
to install. features include multiple i...
Enter
Simple Event Correlator
. Simple Event Correlator (SEC) is a
lightweight event correlator for network
management, log file monitoring,
security management, fraud detection,
and other ...
Enter
Nebular
. Nebular is a customizable Angular UI
library that contains 40+ UI components,
four visual themes, and Auth and
Security modules. Recognized at the
prestigiou...
Enter
EDSS
. EDSS stands for Easy Debian Security
Script and it is a very easy to use
script that installs additional
software, configures the software, and
scans a GNU/L...
Enter
Pacu
. Pacu (named after a type of Piranha
in the Amazon) is a comprehensive AWS
security-testing toolkit designed for
offensive security practitioners. While
sever...
Enter
SSH-MITM
. ssh man-in-the-middle (ssh-mitm)
server for security audits supporting
publickey authentication, session
hijacking and file manipulation.
SSH-MITM is a man i...
Enter
dnmap
. dnmap is a distributed nmap framwork
using a client/server architecture. The
server reads the commands from a file
and send them to each client. The client
e...
Enter
Sippts
. Sippts is a set of tools to audit
VoIP servers and devices using SIP
protocol. Sippts is programmed in Python
and it allows us to check the security
of a VoI...
Enter
FileHashler
. Java based API and console utility
for cross-platform file encryption and
archiving (currently encrypts single
files up to 9.2 EB length). Uses Twofish
(CBC)...
Enter
Tranalyzer
. The Anteater moves to a new site,
available under ...
Enter
AnonyROM
. AnonyROM is as the name suggests, A
ROM based around anonymity for the HTC
Amaze 4G. It is built on HTC's stock
4.04 ROM, with Sense completetly
stripped...
Enter
pfyshnet
. Pfyshnet is a public anonymous peer
to peer network and file-system.
Security is its primary concern, and it
provides security for all aspects of
participati...
Enter
Falco
. Falco is a open source project to
detect abnormal application behavior in
a cloud native environment like
Kubernetes. This cloud native runtime
security proj...
Enter
BrowserBox
. Remote isolated browser API for
security, automation visibility and
interactivity. Run-on our cloud, or
bring your own. Full scope double
reverse web proxy w...
Enter
nuclei
. Nuclei is used to send requests
across targets based on a template,
leading to zero false positives and
providing fast scanning on a large
number of hosts. N...
Enter
passlog
. Passlog is a Visual Basic program to
allow windows access to be logged to
syslog. While it is not intended to be a
high security program it can provide
some ...
Enter
Universal Password Manager
. Universal Password Manager allows you
to store all your passwords in one
highly secure encrypted database. Its
strengths are simplicity, portability
and secu...
Enter
bearer
. Welcome to the Bearer documentation.
Bearer is a static application security
testing (SAST) tool that scans your
source code and analyzes your data flows
to ...
Enter
Commius
. Community-based interoperability
Utility for SMEs. Commius main objective
is to support the SMEs with a zero, or
very low-cost, entry into
interoperability, ...
Enter
Algo VPN
. Introducing Algo, a self-hosted
personal VPN server designed for ease of
deployment and security. Algo
automatically deploys an on-demand VPN
service in the ...
Enter
LinuxSA
. LinuxSA is a Python project that
scans a remote or a local Linux machine
for security vulnerabilities and then
creates a report of the findings. The
scan is ...
Enter
Sobelow
. Sobelow is a security-focused static
analysis tool for the Phoenix framework.
For security researchers, it is a useful
tool for getting a quick view of point...
Enter
FedStage FedSAML
. FedStage FedSAML is a software aiming
to implement security SAML2.0 standard,
supporting low ((de)serialization) and
higher level (easy way of creating and v...
Enter
Nokia Firewall Manager
. The goal of this project is to allow
a network security professional to
manage multiple Nokia security devices
simultaneously. Check Home Page at
http://nfm....
Enter
Infection Monkey
. Infection Monkey is a open source
automated security testing tool for
testing a network's security
baseline. Monkey is a tool that infects
machines and p...
Enter
APIthet
. APIthet is an application to security
test RESTful web APIs. Assessing APIs
help in detecting security
vulnerabilities at an early stage of the
SDLC. Compare...
Enter
inventory-scoring
. A tool (adobe air) to do maturity
scoring of solutions. This is an
offspring of projet ESIS, we use this
tool with customer to assess which
solutions could b...
Enter
Ragna Scribe
. Ragna Scribe is a versatile text
editor which can hold multiple documents
at the same time and each document
organises a set of articles in a tree
order. The...
Enter
SIPVicious
. SIPVicious OSS has been around since
2007 and is actively updated to help
security teams, QA and developers test
SIP-based VoIP systems and applications.
Ope...
Enter
jGuard
. jGuard is written in java. his goal
is to provide a security framework based
on jaas (java authentication and
authorization security) . this framework
is wri...
Enter
amazon-vpc-resource-controller-k8s
. Controller for managing Trunk &
Branch Network Interfaces on EKS Cluster
using Security Group For Pod feature and
IPv4 Addresses for Windows Node. Contro...
Enter
Application Inspector
. Microsoft Application Inspector is a
software source code characterization
tool that helps identify coding features
of first or third party software
componen...
Enter
GridTrust
. The objective of the GridTrust
project is to develop new Grid Security
technologies in order to manage Trust
and Security in Grid for the Next
Generation Gri...
Enter
httpshell
. httpshell is an interactive https
command exploit to test the perimeter
security of your network. This is a
customized HTTPS encrypted reverse
shell. It illu...
Enter
Bandit
. Bandit is a tool designed to find
common security issues in Python code.
To do this, Bandit processes each file,
builds an AST from it, and runs
appropriate ...
Enter
AWS EKS Terraform module
. Terraform module which creates AWS
EKS (Kubernetes) resources.
Windows-based node support is limited to
a default user data template that is
provided due to ...
Enter
Lighthouse Ethereum
. Lighthouse is an Ethereum consensus
client that connects to other Ethereum
consensus clients to form a resilient
and decentralized proof-of-stake
blockchain....
Enter
secure-electron-template
. A current electron app template with
the most popular frameworks, designed
and built with security in mind. Once
cloned, install the dependencies for the
rep...
Enter
Zeek
. Zeek has a long history in the open
source and digital security worlds. Vern
Paxson began developing the project in
the 1990s under the name �Bro� as a
means...
Enter
Cipherbox
. Cipherbox is what I consider to be a
cryptographic swiss knife. It utilizes
six encryption algorithms, and it's
also a vault that's locked with four
...
Enter
Cibet
. The cibet framework provides
developers with functionality of the
following topics: - Dual Control (4-Eyes
Principle .) - Extended Authorisation
(Enhance Spr...
Enter
Role Manager
. Role Manager is a security management
framework based on the NIST model for
Role Based Access Control (RBAC) and the
Java[TM] 2 Platform security standards. ...
Enter
PHP thumbnail Photo Gallery
. A graphical PHP coded thumbnail image
gallery using either a simple text file
database OR Mysql database. really easy
to install. features include multiple i...
Enter
ELF Workbench
. ELF Workbench is a program intended
for analyzing/inspecting ELF object
files that also allows to patch them. It
provides an interactive user interface
simil...
Enter
Nebular
. Nebular is a customizable Angular UI
library that contains 40+ UI components,
four visual themes, and Auth and
Security modules. Recognized at the
prestigiou...
Enter
WipeFreeSpace
. WipeFreeSpace is a program to
securely erase/wipe/overwrite the free
space on file systems to prevent
recovery of deleted sensitive data. This
allows protect...
Enter
U-Tranz
. U-Tranz is a free application
developed on the characteristics of UDP
allows the transmission of unlimited
file size. Most of the applications
based on UDP r...
Enter
Powerful files and text searcher
. Last release: 29/7/2023. Enhanced
program . In the interface font size is
big for ease of access. You can download
source code that can be found in
'sour...
Enter
Simple Event Correlator
. Simple Event Correlator (SEC) is a
lightweight event correlator for network
management, log file monitoring,
security management, fraud detection,
and other ...
Enter
smartIDS
. The aim of the project is a
lightweight intrusion detection library
for embedded devices which supports
MSP430 and ARM Cortex based devices.
Features include...
Enter
Mobile Verification Toolkit
. Mobile Verification Toolkit (MVT) is
a collection of utilities to simplify
and automate the process of gathering
forensic traces helpful to identify a
potent...
Enter
Media-Cert
. The Re-launch is now ready and live.
Feel free to try and enjoy it out.
Should you experience any issues just
create a ticket and I will look into it
asap. T...
Enter
xxxxxxxxxxxxxxxxxx
. Features:Portable.Simple, fast and
user friendly interface.Implements
256-bit AES to encrypt files.Effective
password
protection.Uninstalling/Removing will n...
Enter
Not Another MAC Address Generator
. NAMAG (Not Another MAC Address
Generator) Generates using (OUI)
Verified MAC Addresses using oui.csv -
OUI = Organizationally unique identifier
from Standard...
Enter
UserUnlock
. There is an age old issue with
security / windows domains / shared
workstations. If several users share a
workstation, then from an audit /
security standpoi...
Enter
WiKID Strong Authentication System
. The WiKID Strong Authentication
System is a public-key based two-factor
authentication system. It is a flexible,
extensible, and secure alternative to
tokens...
Enter
Falco
. Falco is a open source project to
detect abnormal application behavior in
a cloud native environment like
Kubernetes. This cloud native runtime
security proj...
Enter
FileHashler
. Java based API and console utility
for cross-platform file encryption and
archiving (currently encrypts single
files up to 9.2 EB length). Uses Twofish
(CBC)...
Enter
BrowserBox
. Remote isolated browser API for
security, automation visibility and
interactivity. Run-on our cloud, or
bring your own. Full scope double
reverse web proxy w...
Enter
Secure P2P Framework (SePP)
. This project develops a secure P2P
framework in Java (SePP). Existing P2P
frameworks are not covering security by
design but rather implement only some
high ...
Enter
nuclei
. Nuclei is used to send requests
across targets based on a template,
leading to zero false positives and
providing fast scanning on a large
number of hosts. N...
Enter
bearer
. Welcome to the Bearer documentation.
Bearer is a static application security
testing (SAST) tool that scans your
source code and analyzes your data flows
to ...
Enter
CapAnalysis
. CapAnalysis is a web visual tool for
information security specialists, system
administrators and everyone who needs to
analyze large amounts of captured netw...
Enter
ANNFiD
. Just carved a bunch of bytes and have
no idea what they could be? Maybe ANNFiD
can help. ANNFiD uses neural network to
identify byte patterns. It can be trai...
Enter
Commius
. Community-based interoperability
Utility for SMEs. Commius main objective
is to support the SMEs with a zero, or
very low-cost, entry into
interoperability, ...
Enter
YASeMI
. YASeMI (Yet Another Security
Monitoring Interface) consists of a Web
interface that can be of aid to
SysAdmins and Security Admins, in
detecting possible ano...
Enter
CaptfEncoder
. Captfencoder is a rapid
cross-platform network security tool
suite, providing network
security-related code conversion,
classical cryptography, cryptography,...
Enter
Java Sec Code
. Java sec code is a very powerful and
friendly project for learning Java
vulnerability code. This project can
also be called Java vulnerability code.
Each vul...
Enter