Our Security (o-security)
.Osec is a lightweight integrity
checking system. WARNING! Project moved
to https://github.com/legionus/osec.
Audience: System Administrators.
Programming Lang...
Enter
Liferay Security Patches
.The Liferay Community Security Team is
an all-volunteer group of community
members who manage security issues
related to Liferay CE. When
security-related iss...
Enter
Security Onion
.Security Onion is a Linux distro for
IDS (Intrusion Detection) and NSM
(Network Security Monitoring). It's
based on Ubuntu and contains Snort,
Suricata, B...
Enter
XML-Security Plug-In
. The Eclipse XML-Security Plug-In
allows you to experiment with the W3C
recommendations on digital signatures
and encryption and to learn all about
their back...
Enter
Liferay Security Patches
.The Liferay Community Security Team is
an all-volunteer group of community
members who manage security issues
related to Liferay CE. When
security-related iss...
Enter
Security Onion
.Security Onion is a Linux distro for
IDS (Intrusion Detection) and NSM
(Network Security Monitoring). It's
based on Ubuntu and contains Snort,
Suricata, B...
Enter
SeaMonster - Security Modeling Software
.SeaMonster is a security modeling tool
for threat models. It supports notations
that security experts and analyzers are
already familiar with, namely attack t...
Enter
aws-security-viz
. Need a quick way to visualize your
current aws/amazon ec2 security group
configuration? aws-security-viz does
just that based on the EC2 security
group ingre...
Enter
OWASP Mantra - Security Framework
.OWASP Mantra - Free and Open Source
Browser based Security Framework, is a
collection of free and open source tools
integrated into a web browser, which can
b...
Enter
Security VMS
. Features:Intuitive, Responsive and
Resource-effective . This is an
application that can also be fetched
from
https://sourceforge.net/projects/security-vms/....
Enter
Web Security Audit
.The goal of this project is to build
an add-on for browser that passively
audits the security posture of the
websites that the user is visiting.
Assume that t...
Enter
InstallFix Security Suite
. Uses NSIS as a coding language to
create tiny installer-like programs that
remove cookies, junk, and adware. While
no longer in development, it remains
usefu...
Enter
Simple Security Policy Editor
. SSPE: Simple Security Policy Editor
is a simple distributed firewall with an
central ascii administration. It uses
two plain manually edited ascii-files
and ...
Enter
Tiny Security Suite
.Tiny Security Suite is a software that
consists of encryption, shredding, VPN,
folder hiding, Firewall, and Tor
Browser. Tiny Security Suite has: - File
Encry...
Enter
JDS: Data Security
. JDS is a powerful tool for data
protection. Documents are encrypted
using a special algorithm. The data
encryption algorithm is constantly
updated to improve...
Enter
WS-Security Wrapper
. WS-Security Wrapper is an adapter
between XML applications and SOAP Web
services implementing WS-Security. It
handles all aspects of SOAP/WS-Security
encodin...
Enter
XML-Security Plug-In
. The Eclipse XML-Security Plug-In
allows you to experiment with the W3C
recommendations on digital signatures
and encryption and to learn all about
their back...
Enter
Acegi Security System for Spring
. Spring Security (formerly Acegi
Security) is now hosted on the Spring
Framework website:
http://www.springframework.org/spring-security/.
Audience: Developer...
Enter
visualNets Graphical Network Security
. visualNets is a log analysis utility
that graphically plots network packets
over time. Plot source or destination IP
or port addresses in a graphical format ...
Enter
SIP Proxy - VoIP Security Test Tool
. With SIP Proxy you will have the
opportunity to eavesdrop and manipulate
SIP traffic. Furthermore, predefined
security test cases can be executed to
find wea...
Enter
DSI / DigSig: linux kernel security++
.- DSI is a security framework
addressing security needs of
carrier-grade Linux clusters. - DigSig
is a linux kernel module checking RSA
signatures of ELF exec...
Enter
OWASP Security Shepherd
. The OWASP Security Shepherd project
enables users to learn or to improve
upon existing manual penetration testing
skills. Utilizing the OWASP top ten as a
ch...
Enter
SeaMonster - Security Modeling Software
.SeaMonster is a security modeling tool
for threat models. It supports notations
that security experts and analyzers are
already familiar with, namely attack t...
Enter
Network Security Response Framework
. The Network Security Response
Framework (NSRF) allows for testing
different computer security response
engines and methodologies. It supports
simulated and r...
Enter
Linux Security Auditing Tool
. Linux Security Auditing Tool (LSAT)
is a post install security auditing
tool. It is modular in design, so new
features can be added quickly. It checks
many s...
Enter
Umbrella Security Project
. Umbrella is a security mechanism that
implements a combination of
Process-Based Access Control (PBAC) and
authentication of Digital Signed
Binaries (DSB). Um...
Enter
OWASP Mantra - Security Framework
.OWASP Mantra - Free and Open Source
Browser based Security Framework, is a
collection of free and open source tools
integrated into a web browser, which can
b...
Enter
Automatic Security
. A security scanner coded in a tcl/tk
extension for use with linux and unix
systems . It automatically downloads
patches and exploits how ever testing of
them...
Enter
Springenwerk Security Scanner
.Springenwerk is a free Cross Site
Scripting (XSS) security scanner written
in Python. Audience: Information
Technology. User interface:
Command-line, Tk. Prog...
Enter
JPA Security
. JPA Security is an Access Control
Solution for the Java Persistence API.
JPA Security enables you to configure
access control to your JPA Entity Beans
based ...
Enter
Hcon Security Testing Framework
. HconSTF is Open Source Penetration
Testing Framework based on different
browser technologies, Which helps any
security professional to assists in the
Penetra...
Enter
SCAP Security Guide
. The purpose of this project is to
create security policy content for
various platforms, Red Hat Enterprise
Linux, Fedora, Ubuntu, Debian, SUSE
Linux Enterpri...
Enter
buck-security
. ATTENTION: buck-security has now
moved to github. Please find the lastest
relaeses at
https://github.com/davewood/buck-security/releases
This SourceForge pag...
Enter
JWT Spring Security Demo
. This is a demo for using JWT (JSON
Web Token) with Spring Security and
Spring Boot. I completely rewrote my
first version. Now this solution is
based on the ...
Enter
CesTa - Security Framework
.CesTa (Code Enhancing Security
Transformation and Analysis) is a tool
for enhancing security by program
transformations. Focused on Smart Cards
(Java Card in ...
Enter
The Linux Basic Security Module
. The Linux BSM is an auditing tool
that aims to bring the capabilities of
Sun's Solaris Basic Security Module
to Linux. Audience: System
Administrators. P...
Enter
Inscribe | Data Security and Privacy
. Make your data encrypted in a few
clicks! Inscribe by Crypto Ststems helps
you cut down development time by
providing you with a flexible data
encryptor inte...
Enter
Web Security Audit
.The goal of this project is to build
an add-on for browser that passively
audits the security posture of the
websites that the user is visiting.
Assume that t...
Enter
PHP Security Scanner
. PHP Security Scanner is a tool
written in PHP intended to search PHP
code for vulnarabilities. MySQL DB
stores patterns to search for as well as
the results ...
Enter
Acegi Security Extensions Project
. Acegi-ext aims to provide additional
capabilities to Acegi Security
Framework,such as declarative management
of ACL entries,support for Acegi
Security in por...
Enter
arangi security
.Provide security configuration to
arangi framework. Audience: Developers.
Programming Language: Java. This is an
application that can also be fetched
from htt...
Enter
Open Source Security Gateway
. OSSEG is an IMS compatible security
gateway that adds firewall, VPN, IDS,
IPS, and monitoring functionalities to
VoIP networks. Audience: System
Administrato...
Enter
BRST - Border Router Security Tool
. The BRST - Border Router Security
Tool is a web based utility for
generating secure configuration files
for Cisco routers in a border
configuration. The admi...
Enter
Web Application Security Papers Archive
.Aimed for web app security with hope
of quick reference. WAS papers are
scattered among hundreds of resources,
some of which are likely to be broken
links in ...
Enter
RAMDisk Security OS
. RAMdisk-based Operating System for
conducting Security Audits. Includes
hping2, xprobe, netcat, lsh, wardialer,
and more -- all on 1 computer disk. Runs
off ...
Enter
MOPS:MOdelchecking Programs for Security
.The MOdelchecking Programs for
Security(MOPS) project produces software
you can use to find security bugs in
your C programs. Examples include time
to check t...
Enter
PHP Security Audit Tool
.This is an open source tool to do
static analysis of php code for security
exploits . This is an application that
can also be fetched from
https://sourceforge...
Enter
Darkfire Security Project
. A stable and fast Linux/Unix toolset
to aid in the security and ease of use
of *Nix. Audience: Other Audience,
System Administrators. User interface:
Cocoa (...
Enter
SecSy: Security-oriented Log Synthesis
. SecSy is a tool for security-oriented
log synthesis. Besides basic synthesis
properties (cases per day, office hours,
randomized activity duration, .), its d...
Enter
phpcs-security-audit v3
. phpcs-security-audit is a set of
PHP_CodeSniffer rules that finds
vulnerabilities and weaknesses related
to security in PHP code. It currently
has core PHP r...
Enter
Automated Security Tools
. Automated Security Tools (autosec)
aims to provide automatic tools which
network administrators may use to help
check and test the security of their
network....
Enter
JSSF - Java Security Server Faces
.JSSF - Java Server Security Faces
it's framework for security layer.
With JSP tags and pages/resource access
control. Support MyFaces and Sun RI JSF
Audie...
Enter
OWASP Find Security Bugs
. The SpotBugs plugin for security
audits of Java web applications. Find
Security Bugs is the SpotBugs plugin for
security audits of Java web
applications. It ...
Enter
Security Tools Collection
.Collection of open source security
tools that enhance the ability of people
and companies to secure their
environment. These tools will build upon
the foundat...
Enter
Linux Security Enhancer
. Linsec is a shell script firstly
designed for slackware linux 10 and now
supports most of linux distros. Linsec
improves security of Linux systems
(kernel pa...
Enter
JDS: Data Security
. JDS is a powerful tool for data
protection. Documents are encrypted
using a special algorithm. The data
encryption algorithm is constantly
updated to improve...
Enter
AAA Security Framework for Avalon
. A security framework for providing
AAA functionality for Avalon based
applications. The pluggable architecture
for underlying datastores and
Authentication, ...
Enter
Cobalt Security
.Firewall and Security solutions for
your Cobalt Servers. Tired of being port
scanned? Sick of foreign hackers
installing root kits? Come check it out.
Audienc...
Enter
PHP Login System w/ 5 Levels of Security
.PHP/MYSQL Login System with 5 Levels
of Security meaning "THE HEIRARCHY
OF ADMINISTRATION" (Admin/Director
-> Manager -> Assistant Manager
->...
Enter
visualNets Graphical Network Security
. visualNets is a log analysis utility
that graphically plots network packets
over time. Plot source or destination IP
or port addresses in a graphical format ...
Enter
Acegi Security System for Spring
. Spring Security (formerly Acegi
Security) is now hosted on the Spring
Framework website:
http://www.springframework.org/spring-security/.
Audience: Developer...
Enter
WS-Security Wrapper
. WS-Security Wrapper is an adapter
between XML applications and SOAP Web
services implementing WS-Security. It
handles all aspects of SOAP/WS-Security
encodin...
Enter
Security Policy Manager
.Creates true post-admission network
access control by regulating network
access to admitted users on an as needed
basis. Users cannot escalate privileges
betw...
Enter
OWASP Security Shepherd
.The OWASP Security Shepherd project
enables users to learn or to improve
upon existing manual penetration testing
skills. Utilizing the OWASP top ten as a
cha...
Enter
SIP Proxy - VoIP Security Test Tool
. With SIP Proxy you will have the
opportunity to eavesdrop and manipulate
SIP traffic. Furthermore, predefined
security test cases can be executed to
find wea...
Enter
RIPS - PHP Security Analysis
.RIPS is a static code analysis tool
for the automated detection of security
vulnerabilities in PHP applications. It
was released 2010 during the Month of
PHP ...
Enter
Virtual Reality Security
. The purpose of this project is to
develop and maintain a Virtual Reality
network interface to provide for network
management and security for heterogenous
ne...
Enter
WS-Security implementation for Axis
.External library for the Apache
project Axis implementing UsernameToken
spec from the working draft Web Services
Security Username Token Profile
ver1.1(Sunday...
Enter
WebWalker Internet Security Tool
. QT based Linux web security tool that
it is designed to test targets for weak
passwords using crack, leech and URL
testing functions. Plugins allow
potential...
Enter
Cerber -- security module for FreeBSD
.Cerber -- system firewall mechanism.
It's a kernel module, which is a
complete security solution for FreeBSD.
Audience: Developers, System
Administrators....
Enter
Folder Security Viewer
. This software supports network
administrators to access the correct
security role for a specific folder
without having to load windows explorer
which will lo...
Enter
Enforcer Linux Security Module (LSM)
.The Enforcer is a Linux Security
Module designed to improve integrity of
a computer running Linux by ensuring no
tampering of the filesystem. It can
interact ...
Enter
Hcon Security Testing Framework
.HconSTF is Open Source Penetration
Testing Framework based on different
browser technologies, Which helps any
security professional to assists in the
Penetrat...
Enter
Springenwerk Security Scanner
.Springenwerk is a free Cross Site
Scripting (XSS) security scanner written
in Python. Audience: Information
Technology. User interface:
Command-line, Tk. Prog...
Enter
JPA Security
. JPA Security is an Access Control
Solution for the Java Persistence API.
JPA Security enables you to configure
access control to your JPA Entity Beans
based ...
Enter
project Cubic Security
. Audience: Security. User interface:
Win32 (MS Windows). Programming
Language: C#. Database Environment:
SQL-based. Categories:Desktop Publishing...
Enter
Cookie Revolver Security Framework
.The Cookie-revolver framework provides
J2EE web-applications with two-factor
authentication security, �something I
know� (userid/password) and �something I
ha...
Enter
Acegi Security Extensions Project
.Acegi-ext aims to provide additional
capabilities to Acegi Security
Framework,such as declarative management
of ACL entries,support for Acegi
Security in port...
Enter
Security Privacy Complete
.Security & Privacy Complete is
mainly a security tool for Windows. It
can disable all services which might be
a securit-risk, harden registry
settings. Al...
Enter
Qualdev Security
.The Qualdev Security Server integrates
the security services for the tools that
support the Qualdev Group. It gives the
necessary infrastructure to offer serv...
Enter
SecurityLevel - Manage security settings
. Started as part of the Google Summer
of Code 2005, this tool adjusts security
settings on Linux systems, including
firewall and SELinux policies. This tool
a...
Enter
Network Security Scorebot
. Scorebot is a scoring framework which
monitors the integrity of various
network services for the purpose of
scoring a network security exercise.
Audience: Go...
Enter
CesTa - Security Framework
.CesTa (Code Enhancing Security
Transformation and Analysis) is a tool
for enhancing security by program
transformations. Focused on Smart Cards
(Java Card in ...
Enter
JWT Spring Security Demo
. This is a demo for using JWT (JSON
Web Token) with Spring Security and
Spring Boot. I completely rewrote my
first version. Now this solution is
based on the ...
Enter
Huorong Security
. Operation mode: EDR operation system,
network-wide threat awareness With the
Huorong terminal as the cornerstone,
while protecting users, it detects
various ...
Enter
Addons for IOSEC - DoS HTTP Security
.IOSEC PHP HTTP FLOOD PROTECTION ADDONS
IOSEC is a php component that allows you
to simply block unwanted access to your
webpage. if a bad crawler uses to much...
Enter
Distributed Active Security against DDoS
. A linux kernel implementation of a
distributed protocol to provide
pro-active defence against Distributed
Denial of Service (DDoS) attacks.
Audience: Informa...
Enter
Network Security Analysis Tool
.NSAT is a fast, highly configurable,
bulk network security scanner for over
50 different services and hundreds of
vulnerabilities. It's main advantage
is ...
Enter
Spring Security
. Spring Security is a powerful and
highly customizable authentication and
access-control framework. It is the
de-facto standard for securing
Spring-based appl...
Enter
kkp NetBIOS Security Tool
. kkp is a security tool based on a
vulnerability in handling of the NetBIOS
protocol by the Microsoft Windows 9x
platform. It is meant to be the most
reliable...
Enter
Blindeye Security Monitoring
. The Blindeye web application is a
front end for the Blindeyes Distributed
Command Framework. Blindeye will be
specifically tailored towards the
viewing and d...
Enter
Warify Information Security Toolkit
.An Information Security toolkit to
help companies understand what
information can be gleaned about them
without performing any hacking attempts
Audience: Adva...
Enter
Security System using ANPR
.security system using number plate
recognition . This is an application
that can also be fetched from
https://sourceforge.net/projects/securitysysanpr/.
It ha...
Enter
The ButterFly - Security Project
.The ButterFly project is an
educational environment intended to give
an insight into common web application
and PHP vulnerabilities. The environment
also incl...
Enter
Web Application Security Papers Archive
.Aimed for web app security with hope
of quick reference. WAS papers are
scattered among hundreds of resources,
some of which are likely to be broken
links in ...
Enter
phpcs-security-audit v3
. phpcs-security-audit is a set of
PHP_CodeSniffer rules that finds
vulnerabilities and weaknesses related
to security in PHP code. It currently
has core PHP r...
Enter
SecSy: Security-oriented Log Synthesis
. SecSy is a tool for security-oriented
log synthesis. Besides basic synthesis
properties (cases per day, office hours,
randomized activity duration, .), its d...
Enter
SMSec - Simplicity Makes Security
. SMSec is a free , open source, GPLed
implementation of two-factor
authentication via SMS (Short Message
Service). It uses SMSD to "talk"
to GSM modem...
Enter
PHP Security Audit Tool
.This is an open source tool to do
static analysis of php code for security
exploits . This is an application that
can also be fetched from
https://sourceforge...
Enter
JEDI API Library Security Code Library
.The JWA library aims to provide a
conversion from C to Delphi of as many
headers as possible from the PSDK etc.
The JWSCL (security library) is an
advanced ob...
Enter
hack://src Security Suite
.Software repository of the hack://src
project. Includes security related
software for crypto, vulnerability/patch
notification & management, and ultra
low...
Enter
OWASP Find Security Bugs
. The SpotBugs plugin for security
audits of Java web applications. Find
Security Bugs is the SpotBugs plugin for
security audits of Java web
applications. It ...
Enter
JSSF - Java Security Server Faces
.JSSF - Java Server Security Faces
it's framework for security layer.
With JSP tags and pages/resource access
control. Support MyFaces and Sun RI JSF
Audie...
Enter
Foundstone Free Security Tools Project
.Foundstone Free Security Tools . This
is an application that can also be
fetched from
https://sourceforge.net/projects/foundstone/.
It has been hosted in OnWo...
Enter
BRST - Border Router Security Tool
.The BRST - Border Router Security Tool
is a web based utility for generating
secure configuration files for Cisco
routers in a border configuration. The
admin...
Enter
HellFire-IRC Security Services
. Hellfire (Formally Sentinel) is a set
of IRC statistical and operator services
for Hybrid, ircd-ratbox, csircd, +CS,
and Bahamut ircd's.Hellfire provides...
Enter
Security Tools Collection
. Collection of open source security
tools that enhance the ability of people
and companies to secure their
environment. These tools will build upon
the founda...
Enter
phpBB-Security Enhanced
. A phpBB BBS modded version, with
security in mind. If you are looking for
a secure phpBB, you are in the right
Project. Audience: End Users/Desktop.
Programm...
Enter
PHP Login System w/ 5 Levels of Security
.PHP/MYSQL Login System with 5 Levels
of Security meaning "THE HEIRARCHY
OF ADMINISTRATION" (Admin/Director
-> Manager -> Assistant Manager
->...
Enter
Omega IRC Security Services
. Omega IRC Security Services - is a
*nix based, modularized security
services coded in C. Which supports
multiple IRCd protocols.
Features:Dynamic configurati...
Enter
AAA Security Framework for Avalon
. A security framework for providing
AAA functionality for Avalon based
applications. The pluggable architecture
for underlying datastores and
Authentication, ...
Enter
RIPS - PHP Security Analysis
.RIPS is a static code analysis tool
for the automated detection of security
vulnerabilities in PHP applications. It
was released 2010 during the Month of
PHP ...
Enter
JAK Security Suite
. Open Source Security Suite
Verschl�ssselung mit Blowfish/Twofish/
AES. Datenl�schung mit Guttmann
(Default)/Pseudorandom Data/US DoD
5220-22.M Methode. User ...
Enter
Security-Tools Database
. Security-Tools Database is an easy to
use tool to manage tool-tipps (e.g. from
the SecurityFocus.com Newsletters and
other sources). Simply copy + paste tipp...
Enter
Web Image Security
.Web Image Security combines some
javascript, php, and htaccess techniques
to make it extremely challenging for
would-be image- or bandwidth-thieves
from viola...
Enter
WS-Security implementation for Axis
.External library for the Apache
project Axis implementing UsernameToken
spec from the working draft Web Services
Security Username Token Profile
ver1.1(Sunday...
Enter
SempGate Network Security Accelerator
. FPGA based hardware card which
implements above 4 giga bps network
traffic throughput under affordable
hardware cost. With linux driver and
kernel patch, sof...
Enter
Security Code Scan
. Detects various security
vulnerability patterns. SQL Injection,
Cross-Site Scripting (XSS), Cross-Site
Request Forgery (CSRF), XML eXternal
Entity Injection ...
Enter
Fatsec Security Driver
. Emulate filesystem security on
Windows 9x systems with FAT16/32
filesystems. Files, directories, and
drives can be assigned
read/write/execute permissions wh...
Enter
Cookie Revolver Security Framework
.The Cookie-revolver framework provides
J2EE web-applications with two-factor
authentication security, �something I
know� (userid/password) and �something I
ha...
Enter
Addons for IOSEC - DoS HTTP Security
.IOSEC PHP HTTP FLOOD PROTECTION ADDONS
IOSEC is a php component that allows you
to simply block unwanted access to your
webpage. if a bad crawler uses to much...
Enter
Host.Deny- Your Fast Track Security Reso
. A HOST.DENY file is a file that, when
loaded to the /etc folder of your web
server, will ban any paople using the
IP's on this compiled list. There is
al...
Enter
Domain Analyzer Security Tool
. Domain analyzer is a security
analysis tool which automatically
discovers and reports information about
the given domain. Its main purpose is to
analyze doma...
Enter
Video security client/server system
. ARGUVISION - an enterprise class
Video surveillance system. ARGUVISION is
based on distributed Linux or Unix
cluster architecture, with up to 1000
cameras pe...
Enter
Blindeye Security Monitoring
.The Blindeye web application is a
front end for the Blindeyes Distributed
Command Framework. Blindeye will be
specifically tailored towards the
viewing and da...
Enter
Security Center
. This toolkit has complete security
Package start from Tweak manager ,
Updater , Virus scanner ,Proxy server
and many more This will be help full for
user fro...
Enter
Opportunistic E-Mail-Security-System
. Securing mails without involving
user. Secures them as often as possible
if it is possible. Shows security-state
and process of mails and mail-partners.
Audi...
Enter
SMSec - Simplicity Makes Security
. SMSec is a free , open source, GPLed
implementation of two-factor
authentication via SMS (Short Message
Service). It uses SMSD to "talk"
to GSM modem...
Enter
Secure layers for improving security
. Squrelayerproxy is a project aimed
for adding more privacy for existing
messengers, proxy and security features.
For windows you have a free and good
HTTP pr...
Enter
Ferret Security Auditing Toolset
.Ferret is a new software tool for
checking host vulnerabilities. Ferret
helps system administrators by quickly
finding vulnerabilities that are present
on a h...
Enter
OWASP Joomla! Security Scanner
.Note: WE ARE UNABLE TO UPDATE THE
SCANNER AT THIS MOMENT! Note: WE
APPRECIATE YOUR CONTRIBUTION. Detects
file inclusion, sql injection, command
execution vuln...
Enter
hack://src Security Suite
. Software repository of the hack://src
project. Includes security related
software for crypto, vulnerability/patch
notification & management, and ultra
lo...
Enter
Security Code Scan
. Detects various security
vulnerability patterns. SQL Injection,
Cross-Site Scripting (XSS), Cross-Site
Request Forgery (CSRF), XML eXternal
Entity Injection ...
Enter
Enterprise Laptop Security System
. It was made for Universities/Colleges
to manage their students' laptops in
order to prevent theft cases. If your
university or college is prone to such c...
Enter
HTTP Anti Flood/DoS Security Module
.This module provides attack surface
reduction enhancements against the HTTP
Flood Attacks at the web application
level. Massive crawling/scanning tools,
HTTP ...
Enter
Code Quality and Security for C#
. Sonar offers a single cohesive
solution with a consistent set of
metrics and hundreds of static analysis
rules to detect your coding issues
early. Plus fast ...
Enter
SEPIA: Security-oriented PN Framework
.SEPIA provides implementations for
various types of Petri nets. Along
Place/Transition-nets, it supports Petri
nets with distinguishable token colors
and defi...
Enter
OWASP Joomla! Security Scanner
.Note: WE ARE UNABLE TO UPDATE THE
SCANNER AT THIS MOMENT! Note: WE
APPRECIATE YOUR CONTRIBUTION. Detects
file inclusion, sql injection, command
execution vuln...
Enter
SEPIA: Security-oriented PN Framework to run in Linux online
.SEPIA provides implementations for
various types of Petri nets. Along
Place/Transition-nets, it supports Petri
nets with distinguishable token colors
and defi...
Enter
Code Quality and Security for Java
. Hundreds of unique rules to find Java
bugs, code smells & vulnerabilities.
Sonar static analysis helps you build
and maintain high-quality Java code. Cov...
Enter
HTTP Anti Flood/DoS Security Module
.This module provides attack surface
reduction enhancements against the HTTP
Flood Attacks at the web application
level. Massive crawling/scanning tools,
HTTP ...
Enter
iSpy Camera Security Software
. iSpy uses your USB webcams, IP cams,
capture cards, desktops and microphones
to detect and record movement or sound
and provides security, surveillance,
moni...
Enter
DefectDojo
. DefectDojo is a security
orchestration and vulnerability
management platform. DefectDojo allows
you to manage your application security
program, maintain pro...
Enter
Code Quality and Security for C#
. Sonar offers a single cohesive
solution with a consistent set of
metrics and hundreds of static analysis
rules to detect your coding issues
early. Plus fast ...
Enter
SEPIA: Security-oriented PN Framework to run in Windows online over Linux online
.SEPIA provides implementations for
various types of Petri nets. Along
Place/Transition-nets, it supports Petri
nets with distinguishable token colors
and defi...
Enter
SEWOL: Security-oriented Workflow Lib
. SEWOL provides support for the
handling of workflow traces. It allows
to specify the shape and content of
process traces in terms of entries
representing the...
Enter
Code Quality and Security for Java
. Hundreds of unique rules to find Java
bugs, code smells & vulnerabilities.
Sonar static analysis helps you build
and maintain high-quality Java code. Cov...
Enter
Deffend.net Otus
. Deffend.net Otus aims to help small
companies and individuals to avoid cyber
security threats through cyber hygiene.
It runs on Windows desktop and looks for...
Enter
Web Crawler Security Tool
.Last update on tue mar 26 16:25 UTC
2012 The Web Crawler Security is a
python based tool to automatically crawl
a web site. It is a web crawler oriented
to he...
Enter
Sihas
. Deffend.net Sihas aims to help small
companies and individuals to avoid cyber
security threats through cyber hygiene.
It runs on Windows desktop and looks fo...
Enter
Prowler
. Prowler is an Open Source security
tool to perform AWS security best
practices assessments, audits, incident
response, continuous monitoring,
hardening, and ...
Enter
Advanced Persistent Security
. The architecture of the system is
integrated by different Fingerprinting
mechanisms. The system is designed from
a core that avoids the detection of
sdhash a...
Enter
SEWOL: Security-oriented Workflow Lib
. SEWOL provides support for the
handling of workflow traces. It allows
to specify the shape and content of
process traces in terms of entries
representing the...
Enter
ZAP
. The OWASP Zed Attack Proxy (ZAP) is
one of the world�s most popular free
security tools and is actively
maintained by a dedicated international
team of volun...
Enter
AAT Direct Connect Hub Project
. Scripts and hub mods written to
enhance OpenDCHub. The Hub-Security
script filters unregistered users by
country, and adds op commands and
security features....
Enter
Agnitio
. A tool to help developers and
security professionals conduct manual
security code reviews in a consistent
and repeatable way. Agnitio aims to
replace the adh...
Enter
Mythril
. Mythril is a security analysis tool
for EVM bytecode. It detects security
vulnerabilities in smart contracts built
for Ethereum, Hedera, Quorum, Vechain,
Roo...
Enter
Advanced Persistent Security
. The architecture of the system is
integrated by different Fingerprinting
mechanisms. The system is designed from
a core that avoids the detection of
sdhash a...
Enter
Eolos VoipAudit
. Visual Framework Tool to scan/sniff
address space, enumerate users, crack
credentials, pattern based dial spoofing
and security reporting for Voip
protocols....
Enter
Prowler
. Prowler is an Open Source security
tool to perform AWS security best
practices assessments, audits, incident
response, continuous monitoring,
hardening, and ...
Enter
VeraCrypt
. VeraCrypt is a free disk encryption
software brought to you by IDRIX
(https://www.idrix.fr) and based on
TrueCrypt 7.1a. It adds enhanced
security to the alg...
Enter
ZAP
. The OWASP Zed Attack Proxy (ZAP) is
one of the world�s most popular free
security tools and is actively
maintained by a dedicated international
team of volun...
Enter
LibreWolf-for-Void
. A fork of Firefox, focused on
privacy, security and freedom. This
project is an independent fork of
Firefox, with the primary goals of
privacy, security and ...
Enter
openGalaxy
. This project aims to provide a method
for listening on a serial port and
decode incoming messages from a Galaxy
security control panel. The messages are
tran...
Enter
XML DSIG and Encryption (C++)
.A C++ library implementing the XML
DSIG and XML Encryption standards. Based
on the Apache project's Xerces
(DOM/SAX parser) and Xalan (XSL/XPATH
processor...
Enter
HISPACTA
.Example java web application using
layered architecture and Hibernate
(persistence), Spring (integration, AOP)
+ Acegi security, Tapestry (GUI) and
JUnit (tes...
Enter
Terrascan
. Detect compliance and security
violations across Infrastructure as Code
to mitigate risk before provisioning
cloud native infrastructure. As you
embrace Infr...
Enter
NetSPOC
. NetSPOC is a Network Security POlicy
Compiler. A tool for simplified security
management of networks with multiple
security domains. NetSPOC takes a
descript...
Enter
AAT Direct Connect Hub Project
. Scripts and hub mods written to
enhance OpenDCHub. The Hub-Security
script filters unregistered users by
country, and adds op commands and
security features....
Enter
Mythril
. Mythril is a security analysis tool
for EVM bytecode. It detects security
vulnerabilities in smart contracts built
for Ethereum, Hedera, Quorum, Vechain,
Roo...
Enter
Eolos VoipAudit
. Visual Framework Tool to scan/sniff
address space, enumerate users, crack
credentials, pattern based dial spoofing
and security reporting for Voip
protocols....
Enter
TinySecuritySuite
. Tiny Security Suite is a simple
collection of portable security tools
that are essentials. It consist of
Clamwin Antivrius, PAPI Firewall, and
the developer ...
Enter
VeraCrypt
. VeraCrypt is a free disk encryption
software brought to you by IDRIX
(https://www.idrix.fr) and based on
TrueCrypt 7.1a. It adds enhanced
security to the alg...
Enter
Sn1per
. Sn1per Professional is an all-in-one
offensive security platform that
provides a comprehensive view of your
internal and external attack surface and
offers a...
Enter
Tsunami
. Tsunami is a general purpose network
security scanner with an extensible
plugin system for detecting high
severity vulnerabilities with high
confidence. When...
Enter
Enlightn
. Enlightn scans your Laravel app code
to provide you actionable
recommendations on improving its
performance, security & more.
We'll perform over 100 ...
Enter
Catnip
. Servlet container extensions that
help web developers write full featured
Java web applications.
Features:Security: XSS Filter/Valve
infrastructure for Apach...
Enter
LibreWolf-for-Void
. A fork of Firefox, focused on
privacy, security and freedom. This
project is an independent fork of
Firefox, with the primary goals of
privacy, security and ...
Enter
Sagacity
.We have migrated development of
Sagacity to GitHub at ...
Enter
Terrascan
. Detect compliance and security
violations across Infrastructure as Code
to mitigate risk before provisioning
cloud native infrastructure. As you
embrace Infr...
Enter
XML DSIG and Encryption (C++)
.A C++ library implementing the XML
DSIG and XML Encryption standards. Based
on the Apache project's Xerces
(DOM/SAX parser) and Xalan (XSL/XPATH
processor...
Enter
HISPACTA
.Example java web application using
layered architecture and Hibernate
(persistence), Spring (integration, AOP)
+ Acegi security, Tapestry (GUI) and
JUnit (tes...
Enter
NetSPOC
. NetSPOC is a Network Security POlicy
Compiler. A tool for simplified security
management of networks with multiple
security domains. NetSPOC takes a
descript...
Enter
ClouDAT
.The ClouDAT tool supports tasks for
planning an Information Security
Management System (ISMS) cloud services
that accords to ISO 27001. For this
purpose the C...
Enter
OSCAL
. NIST is developing the Open Security
Controls Assessment Language (OSCAL), a
set of hierarchical, XML-, JSON-, and
YAML-based formats that provide a
standard...
Enter
FATE
. FATE (Federated AI Technology
Enabler) is the world's first
industrial grade federated learning open
source framework to enable enterprises
and instituti...
Enter
openGalaxy
. This project aims to provide a method
for listening on a serial port and
decode incoming messages from a Galaxy
security control panel. The messages are
tran...
Enter
Tsunami
. Tsunami is a general purpose network
security scanner with an extensible
plugin system for detecting high
severity vulnerabilities with high
confidence. When...
Enter
lynis
. Lynis is a battle-tested security
tool for systems running Linux, macOS,
or Unix-based operating system. It
performs an extensive health scan of
your systems...
Enter
firejail
. Firejail is a SUID program that
reduces the risk of security breaches by
restricting the running environment of
untrusted applications using Linux
namespaces...
Enter
Enlightn
. Enlightn scans your Laravel app code
to provide you actionable
recommendations on improving its
performance, security & more.
We'll perform over 100 ...
Enter
FaceAccess Facial Recognition System
. With the growing need to exchange
information and share resources,
information security has become more
important than ever in both the public
and private se...
Enter
Prueba
. This is an application that can also
be fetched from
https://sourceforge.net/projects/prueba/.
It has been hosted in OnWorks in order
to be run online in an ...
Enter
Catnip
. Servlet container extensions that
help web developers write full featured
Java web applications.
Features:Security: XSS Filter/Valve
infrastructure for Apach...
Enter
ClouDAT
.The ClouDAT tool supports tasks for
planning an Information Security
Management System (ISMS) cloud services
that accords to ISO 27001. For this
purpose the C...
Enter
BunkerWeb
. Being a full-featured web server
(based on NGINX under the hood), it will
protect your web services to make them
"secure by default". BunkerWeb
integ...
Enter
SOMAP.org
.Security Officers Management and
Analysis Project (SOMAP) is all about
defining security management work
methods and supplying Security Officers
with tools to...
Enter
SIGOF
. SIGOF (Security Information Graphics
Oriented Forensic) aims at synthetizing
security log, stored in a acid/base
database schema, in order to provide a
graph...
Enter
OWASP Bricks
.Bricks is a deliberately vulnerable
web application built on PHP and MySQL.
The project focuses on variations of
commonly seen application security
vulnerabil...
Enter
secheck
. secheck is a script which imitates
currently existing log checkers but with
a focus on security. secheck does some
basic system security checking, then
email...
Enter