[go: up one dir, main page]

Showing 40 open source projects for "cyber security"

View related business solutions
  • Relax: PRTG Monitors Your IT for You Icon
    Relax: PRTG Monitors Your IT for You

    Stay in control and avoid IT headaches. PRTG monitors your network, devices, and apps - receive alerts when it matters most.

    You’re the go-to IT person, always putting out fires and keeping things running. With PRTG, you get reliable alerts to monitor your entire IT infrastructure, without the noise. Our intuitive setup gives you a clear overview of your network, devices, and applications in real time. Get instant alerts only when something needs your attention, whether you’re at your desk or on the move. Spend less time worrying about outages and more time focusing on what matters. Set up PRTG once and let it work for you - PRTG has you covered.
    Start Your Free PRTG Trial Now
  • Cloud-based observability solution that helps businesses track and manage workload and performance on a unified dashboard. Icon
    Cloud-based observability solution that helps businesses track and manage workload and performance on a unified dashboard.

    For developers, engineers, and operational teams in organizations of all sizes

    Monitor everything you run in your cloud without compromising on cost, granularity, or scale. groundcover is a full stack cloud-native APM platform designed to make observability effortless so that you can focus on building world-class products. By leveraging our proprietary sensor, groundcover unlocks unprecedented granularity on all your applications, eliminating the need for costly code changes and development cycles to ensure monitoring continuity.
    Learn More
  • 1
    Pacu

    Pacu

    The AWS exploitation framework, designed for testing security

    Pacu (named after a type of Piranha in the Amazon) is a comprehensive AWS security-testing toolkit designed for offensive security practitioners. While several AWS security scanners currently serve as the proverbial “Nessus” of the cloud, Pacu is designed to be the Metasploit equivalent. Written in Python 3 with a modular architecture, Pacu has tools for every step of the pen testing process, covering the full cyber kill chain. Pacu is the aggregation of all of the exploitation experience...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Sandia Cyber Omni Tracker

    Sandia Cyber Omni Tracker

    Sandia Cyber Omni Tracker (SCOT)

    SCOT is an open-source cybersecurity incident response and threat intelligence management system developed by Sandia National Laboratories. It centralizes alert collection, facilitates team collaboration, and enriches data with automated analysis, enhancing the efficiency and effectiveness of security operations teams.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    cybr

    cybr

    cybr - "Your gateway to cyber security and pen testing"

    Welcome to cybr, a minimalist Kali Linux fork on Arch with Hyprland where you get to pick and choose your tools (Guide and resources for newbies on how to install basic cyber security tools at https://wolfos.uk) for anyone and everyone who wants to learn or do cyber security. CREDIT TO END_4 FOR DOTFILES
    Leader badge">
    Downloads: 32 This Week
    Last Update:
    See Project
  • 4
    Adaptive Intelligence

    Adaptive Intelligence

    Adaptive Intelligence also known as "Artificial General Intelligence"

    Adaptive Intelligence is the implementation of neural science, forensic psychology , behavioral science with machine-learning and artificial intelligence to provide advanced automated software platforms with the ability to adjust and thrive in dynamic environments by combining cognitive flexibility, emotional regulation, resilience, and practical problem-solving skills.
    Downloads: 6 This Week
    Last Update:
    See Project
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • 5

    DosiTron

    A powerful network stress testing application

    DoSitron is a powerful Denial of Service (DoS) testing tool developed in Python. Designed for security professionals and researchers, this tool allows them to simulate various DoS attacks, providing a realistic environment for assessing the resilience of networks, systems, and applications against potential cyber threats.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    tirreno

    tirreno

    Open Source Security Analytics

    The open-source security analytics. tirreno helps you to understand, monitor, and protect your platforms from cyber fraud, account threats, and abuse. Proactively defend against internal and external threats, ensure sovereignty through on-premises deployment, and secure your digital platforms.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    S2OPC - Safe & Secure OPC UA

    S2OPC - Safe & Secure OPC UA

    An Open Source Safe & Secure OPC UA stack

    ## S2OPC OPC UA Toolkit - Safe: IEC61508 and EN50128 integration ready, - Secure: CSPN certification, IEC62443 targeted, - Open-source: Apache 2.0 (non contaminating, no copy-left, no paid version), - Embedded: multiplatform (Linux, Windows, FreeRTOS, Zephyr), optimized footprint, real-time capable, - Industrial support by Systerel: support, training, specific integration and developments, certification support. For more information about support pricing, please contact us at...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    Ultramarker

    Ultramarker

    Ultramarker assessment criteria, marking and report generation system

    Is a Windows (and Linux) based application that allows educators and assessors to design criteria based assessment rubrics. It specifically allows generic feedback to be defined based upon common errors and individualised feedback. Grading schema can be easily designed to define levels of achievment or compliance to standards . Multiple weighted criteria can be included in the assessment and the same criteria used for multiple sessions. Sessions may be used to assess typically laboratory...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    BTS-SIO-SLAM-CYBER-INTERVENTION

    Cybersecurity intervention for BTS SIO SLAM

    You will find all the files to prepare a security intervention in a BTS SIO (SLAM - development part). This training aims to highlight the role of the developer in cybersecurity. Different software vulnerabilities are presented as well as the good practices that allow limiting them. To this goal, some aspects of a secure system design are addressed. Informations and documentation are here: https://sourceforge.net/p/bts-sio-slam-cyberintervention/wiki/Home/.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cloud data warehouse to power your data-driven innovation Icon
    Cloud data warehouse to power your data-driven innovation

    BigQuery is a serverless and cost-effective enterprise data warehouse that works across clouds and scales with your data.

    BigQuery Studio provides a single, unified interface for all data practitioners of various coding skills to simplify analytics workflows from data ingestion and preparation to data exploration and visualization to ML model creation and use. It also allows you to use simple SQL to access Vertex AI foundational models directly inside BigQuery for text processing tasks, such as sentiment analysis, entity extraction, and many more without having to deal with specialized models.
    Try for free
  • 10
    Kubesploit

    Kubesploit

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command

    ... to run the exploit to simulate a real-world attack that will be used to determine corporate resilience across the network. When running an exploit, it will practice the organization's cyber event management, which doesn't happen when scanning for cluster issues. It can help the organization learn how to operate when real attacks happen, see if its other detection system works as expected and what changes should be made.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    ReconSpider

    ReconSpider

    Most Advanced Open Source Intelligence (OSINT) Framework

    ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Addresses, Emails, Websites, and Organizations and find out information from different sources. ReconSpider can be used by Infosec Researchers, Penetration Testers, Bug Hunters, and Cyber Crime Investigators to find deep information about their target. ReconSpider aggregate all the raw data, visualize it on a dashboard, and facilitate alerting and monitoring on the data. Recon Spider also combines...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 12
    0xsp Mongoose RED for Windows

    0xsp Mongoose RED for Windows

    Framework for cybersecurity simulation and red teaming operations

    0xsp mongoose red version is provided to assist your needs during cyber security simulation, by using this version you will be able to audit a targeted Windows operation system for system vulnerabilities, misconfiguration, and privilege escalation attacks and replicate the tactics and techniques of an advanced adversary in a network. With node js support for web application API, it becomes much easier for installation and customization in a timely manner, the windows sensor agent...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    CyphyOS

    CyphyOS

    CyphyOS is Debian-based Distro for Cyber Physical System Hackers

    CyphyOS is Debian 10 x86_64 Based Distro Flavor, specifically for Cyber Physical System penetration testing. Powered with XFCE4. Out-Of-The-Box Dedicated to All Hardware Hackers. Especially for those who are still using the common pentesting tools and in need of hardware, Embedded System, IoT and SCADA tools as well. Also SDR tools are in place and configurations are made for HackRF, RTL-SDR and BladeRF. Tools Are Listed In Discussion Tab. Default Username : hackerman Default Password...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Falcon_ArchLinux

    Falcon_ArchLinux

    Falcon ArchLinux pruple team tools cyber security

    uses repo BlackArchlinux and ArchLinux
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    GRASSMARLIN

    GRASSMARLIN

    Provides situational awareness of Industrial Control Systems (ICS)

    GRASSMARLIN provides IP network situational awareness of industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks to support network security. Passively map, and visually display, an ICS/SCADA network topology while safely conducting device discovery, accounting, and reporting on these critical cyber-physical systems.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 16

    Cyber Probe

    Capturing, analysing and responding to cyber attacks.

    Moved to http://github.com/cybermaggedon/cyberprobe
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    EQGRP

    EQGRP

    Decrypted content of eqgrp-auction-file.tar.xz

    EQGRP is a public release of the so-called Equation Group hacking tools, originally leaked online in 2017. The repository serves as an archive and reference for security researchers, documenting the exploit frameworks, implants, and utilities that were allegedly used by a highly sophisticated threat actor. The tools include network exploitation scripts, backdoors, and frameworks targeting a range of platforms and services, many of which highlight previously unknown vulnerabilities. While...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    Mercenary Linux

    Mercenary Linux

    Linux Distro Built specifically for Cyber Hunt Team Operators

    The MERCENARY Linux Distro is Built specifically for Cyber Hunt Team Operators. This is the first iteration of this distro, with several tools, including Mercenary Hunt Framework being added with the next release (Early 2017). This Distro contains the most well known and respected forensic tools all conveniently installed on one system. Tools included are: mercenary hunt framework(**soon), Powershell, OMI, SIFT, wmic, winexe, radare2, viper, pescanner, jsdetox, volatility, maltrieve, rekall...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19

    Ethical Hacking - Pokhara

    Educating Nepalese on about Cyber Security & Ethical Hacking.

    This project is basically based on giving free/paid workshop/training/seminar on "Cyber Security & Ethical Hacking", to the people/students of Nepal. Being Nepali, I always thought of helping people of Nepal in New and Rising Topic of World. Now, that topic is "Cyber Security & Ethical Hacking". My involvement in this Project can be found in detail in my own website here : http://www.bijayacharya.com/about-me/bj-as-hacker/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Greyhound-Ubuntu : Trident

    Greyhound-Ubuntu : Trident

    An all purpose Distro for Pentesters

    Greyhound Trident is a GNU/Linux, Ubuntu based security distribution designed for penetration testing and cyber forensic investigations. It is a distribution designed for security enthusiasts and professionals, can also be used normally as your default OS. >>Based on Ubuntu 12.04.2 LTS (32bit ) user/pass : root/toor >>Kernel version 3.5.0-45 (little modified to make some of unsupported tools to work, but still will able to get Ubuntu updates ) >>2 Desktop environment : Gnome3, Docky...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    Java Vulnerable Lab - Pentesting Lab

    Java Vulnerable Lab - Pentesting Lab

    a deliberately vulnerable Web application

    This is Vulnerable Web Application developed for course by Cyber Security and Privacy Foundation (www.cysecurity.org) for Java programmers The full course on Hacking and Securing Web Java Programs is available in https://www.udemy.com/hacking-securing-java-web-programming/ WAR file: ---------- https://sourceforge.net/projects/javavulnerablelab/files/latest/JavaVulnerableLab.war/download Virtualbox VM file: -------------------------- http://sourceforge.net/projects...
    Leader badge">
    Downloads: 77 This Week
    Last Update:
    See Project
  • 22
    cyborghawk v1.1

    cyborghawk v1.1

    Latest-v1.1 of The World's most advanced pen testing distribution ever

    updated version of The most advanced, powerful and yet beautiful penetration testing distribution ever created.Lined up with ultimate collection of tools for pro Ethical Hackers and Cyber Security Experts. Simplify security in your IT infrastructure with Cyborg. Its real strength comes from the understanding that a tester requires a strong and efficient system,that benefits from a strong selection of tools, integrated with a stable linux environment.
    Leader badge">
    Downloads: 70 This Week
    Last Update:
    See Project
  • 23
    ODS3 Virtual Machine Challenge

    ODS3 Virtual Machine Challenge

    Virtual Machine Image To Test Penetration Skills

    The ODS3 Virtual Machine Challenge are downloadable images that can be run as VMWare or VirtualBox instances. The Idea behind the challenge is to test and exercise web application penetration testing in a controlled environment. These images are great for cyber security students, penetration testers and hobbyist. Care should be taken if installed on an Internet access host as the application are purposely vulnerable to attack and exploitation.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 24
    cyborg hawk v 1.0

    cyborg hawk v 1.0

    The World's most advanced penetration testing distribution ever

    The most advanced, powerful and yet beautiful penetration testing distribution ever created.Lined up with ultimate collection of tools for pro Ethical Hackers and Cyber Security Experts. Simplify security in your IT infrastructure with Cyborg. Its real strength comes from the understanding that a tester requires a strong and efficient system,that benefits from a strong selection of tools, integrated with a stable linux environment.
    Leader badge">
    Downloads: 6 This Week
    Last Update:
    See Project
  • 25
    Green Bug GoogleDork Scanner Web Hacking And Security ! Underground World Of İnformation Technology Cyber-Warrior.org / Bug Researchers By Ş3H@D3T
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next