[go: up one dir, main page]

Browse free open source Boot software and projects below. Use the toggles on the left to filter open source Boot software by OS, license, language, programming language, and project status.

  • Full Control for Complex IT - Try PRTG Now Icon
    Full Control for Complex IT - Try PRTG Now

    Gain deeper insights and proactive alerts for your entire network. PRTG empowers you to optimize uptime and prevent costly outages.

    As an IT monitoring expert, you need more than basic alerts - you need actionable data and full transparency. PRTG gives your team a single pane of glass for all systems, devices, and applications, with customizable dashboards and granular user management. Detect issues before they escalate, automate reporting, and ensure compliance with SLAs. PRTG’s scalable engine and advanced analytics help you optimize resources, reduce manual effort, and keep your organization running smoothly. Take control of your IT landscape and make smarter decisions with real-time, enterprise-grade monitoring.
    Activate Your PRTG Trial Today
  • The All-in-One Commerce Platform for Businesses - Shopify Icon
    The All-in-One Commerce Platform for Businesses - Shopify

    Shopify offers plans for anyone that wants to sell products online and build an ecommerce store, small to mid-sized businesses as well as enterprise

    Shopify is a leading all-in-one commerce platform that enables businesses to start, build, and grow their online and physical stores. It offers tools to create customized websites, manage inventory, process payments, and sell across multiple channels including online, in-person, wholesale, and global markets. The platform includes integrated marketing tools, analytics, and customer engagement features to help merchants reach and retain customers. Shopify supports thousands of third-party apps and offers developer-friendly APIs for custom solutions. With world-class checkout technology, Shopify powers over 150 million high-intent shoppers worldwide. Its reliable, scalable infrastructure ensures fast performance and seamless operations at any business size.
    Learn More
  • 1
    Network Security Toolkit (NST)

    Network Security Toolkit (NST)

    A network security analysis and monitoring toolkit Linux distribution.

    Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 42 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available in the toolkit. An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, network monitoring, host geolocation, network analysis and configuration of many network and security applications found within the NST distribution. In the virtual world, NST can be used as a network security analysis, validation and monitoring tool on enterprise virtual servers hosting virtual machines.
    Leader badge">
    Downloads: 311 This Week
    Last Update:
    See Project
  • 2
    loginx

    loginx

    a getty/login/xinit combination

    A complete tty login experience, replacing getty, login, and xinit. Features a friendly curses UI with a username picker box. Acts as a display manager and launches X when .xinitrc exists. Handles failures and falls back to a plain shell if X does not start.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 3
    qingy is a replacement of getty. Written in C, it uses DirectFB to provide a fast, nice GUI without the overhead of the X Window System. It allows the user to log in and start the session of his choice (text console, gnome, kde, wmaker, ...).
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    Getwifi allows Linux users to join wireless networks easily by joining available networks in an order specified by the user. Getwifi is configured using a single file which specifies networks, optional WEP keys, and the order in which to join networks.
    Downloads: 2 This Week
    Last Update:
    See Project
  • FusionAuth: Authentication and User Management Software Icon
    FusionAuth: Authentication and User Management Software

    Offer your users flexible authentication options, including passwords, passwordless, single sign-on (SSO), and multi-factor authentication (MFA).

    FusionAuth adds login, registration, SSO, MFA, and a bazillion other features to your app in days - not months.
    Learn More
  • 5
    watches for Regristry-changes of keys like HKLMSoftwareMicrosoftWindowsCurrentVersionRun etc. and pops up if something has changed, logs it, can ask google for the key found. Protects against Trojans and Viruses.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Boot Integrity Services (BIS) is a CDSA application. BIS adds digital signatures to boot images obtained via PXE and DHCP/BOOTP protocols. BIS includes tools for creating keys, certificates, and digital signatures, and remotely configuring BIS clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Eselstall Secure Environment to Launch Software you don't Trust At aLL: Combined chroot/setuid tool to easily launch background processes (servers) in a confined environment. Eliminates the need for su in the changeroot directory.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    RAMdisk-based Operating System for conducting Security Audits. Includes hping2, xprobe, netcat, lsh, wardialer, and more -- all on 1 computer disk. Runs off your RAM, so there is no need to reformat your computer. Great for pen testing!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Find out just how much your login box can do for your customer | Auth0 Icon
    Find out just how much your login box can do for your customer | Auth0

    With over 53 social login options, you can fast-track the signup and login experience for users.

    From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
    Sign up
  • 10
    This project is based off of Sam Rape. The final product is a bootable floppy which copies the sam file, compresses it and puts it on a disk. A detailed description can be found at datastronghold.com/archive/t10429.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    This project provides a modification of the Linux boot sequence that allows a continuation of the boot process only if an encrypted filesystem can be used after entering a password. Without a successfully mounted filesystem the boot process will stop
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Set of tools needed to setup and maintain encrypted partitions under unix systems (initially linux). Especially helpfull when doing root device encryption. Features xml configuration, multiple users, usb "tokens" (usb mass storage) and key hierarchy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    rcstagger

    secure network aware process monitoring system

    rcstagger is a network aware process monitoring system designed to work alongside the init process (Note that it makes no attempt to replace init). It utilizes openssl to maintain PKI authentication to verify the identify of sibling daemons and any control clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    sTrayD hides icons from the systray (system tray) in Microsoft Windows or it hides the systray entirely.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next