[go: up one dir, main page]

Showing 99 open source projects for "defense"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • GWI: On-demand Consumer Research Icon
    GWI: On-demand Consumer Research

    For marketing agencies and media organizations requiring a solution to get consumer insights

    Need easy access to consumer insights? Our intuitive platform is the answer. Get the ultra-reliable research that brands and agencies need to stay ahead of changing consumer behavior.
    Learn More
  • 1
    Cryptol

    Cryptol

    Cryptol: The Language of Cryptography

    ...Developed by Galois, Cryptol provides a high-level mathematical syntax for describing cryptographic primitives and enables formal verification of algorithm properties. It is used in academic, research, and defense sectors to validate correctness and security through symbolic execution and model checking, ensuring critical cryptographic code is free of design flaws.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 2
    Arcjet

    Arcjet

    Arcjet JS SDKs. Rate limiting, bot protection, email verification

    Arcjet helps developers protect their apps in just a few lines of code. Implement rate limiting, bot protection, email verification, and defense against common attacks. Native security for Bun, Next.js, Node.js, SvelteKit, Vercel, Netlify, Fly.io, and other modern platforms. Customizable protection for signup forms, login pages, API routes, and your whole app. Test security rules locally. Protection that works in every environment. No agent is required.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    macOS Security Compliance

    macOS Security Compliance

    macOS Security Compliance Project

    ...This is a joint project of federal operational IT Security staff from the National Institute of Standards and Technology (NIST), National Aeronautics and Space Administration (NASA), Defense Information Systems Agency (DISA), and Los Alamos National Laboratory (LANL).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Santa

    Santa

    A binary authorization system for macOS

    ...Santa is built to help protect users by stopping the spread of malware and analyzing what's running on a computer, but is by no means a total security system. Ideally Santa works as a part of a defense-in-depth strategy, and other measures should be in place to protect hosts.
    Downloads: 2 This Week
    Last Update:
    See Project
  • No-Nonsense Code-to-Cloud Security for Devs | Aikido Icon
    No-Nonsense Code-to-Cloud Security for Devs | Aikido

    Connect your GitHub, GitLab, Bitbucket or Azure DevOps account to start scanning your repos for free.

    Aikido provides a unified security platform for developers, combining 12 powerful scans like SAST, DAST, and CSPM. AI-driven AutoFix and AutoTriage streamline vulnerability management, while runtime protection blocks attacks.
    Learn More
  • 5

    Scalar-Defense-System

    Scalar Defense using Photon Dark Photon FDM Waves

    Scalar Defense leverages wave-like properties of Fuzzy Dark Matter to detect, track & deflect asteroids. Manipulating scalar fields (ϕ) & their interference patterns, system creates controlled gravitational potentials can alter asteroid trajectories. Foundation is the two-field FDM model, allows tuning density fringes via mass & velocity parameters
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Latte

    Latte

    The safest & truly intuitive templates for PHP

    ...It can modify the page, obtain sensitive information or even steal the user's identity. Templating systems fail to defend against XSS. Latte is the only system with an effective defense, thanks to context-sensitive escaping. Latte is based on PHP, whereas Twig is based on Python. A designer in Latte doesn't have to constantly switch between two different conventions. Stay in touch. The plugin for Tracy informs you on each page which templates and which variables are being rendered. Latte has native support in NetBeans and an excellent plugin for PhpStorm that suggests tags, filters and PHP code. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Apache APISIX

    Apache APISIX

    The cloud-native API gateway

    ...You can use Apache APISIX as a traffic entrance to process all business data, including dynamic routing, dynamic upstream, dynamic certificates, A/B testing, canary release, blue-green deployment, limit rate, defense against malicious attacks, metrics, monitoring alarms, service observability, service governance, etc.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 8
    SafeLine

    SafeLine

    Serve as a reverse proxy to protect your web services from attacks

    SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits. A web application firewall helps protect web apps by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web apps from attacks such as SQL injection, XSS, code injection, os command injection, CRLF injection, LDAP injection, XPath injection, RCE, XXE, SSRF, path traversal, backdoor, brute force, HTTP-flood, bot abuse, among others. By...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Tower Building Game

    Tower Building Game

    HTML5 Canvas Tower Building Game

    Tower Building Game is a small game project — likely implementing a classic “tower defense” or “tower-based” game — designed to showcase game-development fundamentals such as rendering, game logic, user interaction, and possibly simple physics or animations. As an open-source repository, tower_game aims not only to deliver a playable game, but also to serve as a learning resource or template: developers can inspect its code, understand how game loops, input handling, asset management, and state updates are organized. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • A warehouse and inventory management software that scales with your business. Icon
    A warehouse and inventory management software that scales with your business.

    For leading 3PLs and high-volume brands searching for an advanced WMS

    Logiwa is a leader in cloud-native fulfillment technology, revolutionizing high-volume fulfillment for third-party logistics (3PLs), B2B and B2C fulfillment networks, and direct-to-consumer brands. Our flagship product, Logiwa IO, is an advanced Fulfillment Management System (FMS) designed to scale operations in the digital era. Logiwa elevates digital warehousing to new heights, ensuring dynamic and efficient fulfillment processes. Our commitment to AI-driven technology, combined with a focus on customer-centricity, equips businesses to adeptly navigate and excel in rapidly changing market landscapes. Discover the future of smart fulfillment and how you can fulfill brilliantly with Logiwa IO.
    Learn More
  • 10
    Kata Containers

    Kata Containers

    Build a standard implementation of lightweight Virtual Machines (VMs)

    ...Kata Containers is an open source community working to build a secure container runtime with lightweight virtual machines that feel and perform like containers, but provide stronger workload isolation using hardware virtualization technology as a second layer of defense. Since launching in December 2017, the community successfully merged the best parts of Intel Clear Containers with Hyper.sh RunV and scaled to include support for major architectures including AMD64, ARM, IBM p-series, and IBM z-series in addition to x86_64. Kata Containers also supports multiple hypervisors including QEMU, Cloud-Hypervisor, and Firecracker, and integrates with the containerd project among others.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    IronClaw

    IronClaw

    IronClaw is OpenClaw inspired but focused on privacy & security

    IronClaw is a security-first, open-source personal AI assistant built in Rust and designed to keep your data fully under your control. It operates on the principle that your AI should work for you, not external vendors, ensuring all data is stored locally, encrypted, and never shared. The platform emphasizes transparency, offering auditable code with no hidden telemetry or data harvesting. IronClaw runs untrusted tools inside isolated WebAssembly (WASM) sandboxes with strict capability-based...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Rebuff

    Rebuff

    LLM Prompt Injection Detector

    A self-hardening prompt injection detector. Rebuff is designed to protect AI applications from prompt injection (PI) attacks through a multi-layered defense. Rebuff is still a prototype and cannot provide 100% protection against prompt injection attacks. Add canary tokens to prompts to detect leakages, allowing the framework to store embeddings about the incoming prompt in the vector database and prevent future attacks.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 13

    Quantum-Shield-Orbital-Detection-System

    Quantum Shield is a revolutionary defense system

    QUANTUM SHIELD - QUANTUM ENHANCED DETECTION SYSTEM 🚀 Overview Quantum Shield is a revolutionary defense system leveraging quantum sensing technologies for superior detection capabilities against stealth aircraft, drones, missiles, and submarines. By utilizing quantum entanglement, superposition, and other quantum phenomena, the system offers detection ranges and capabilities far beyond conventional radar systems. Key Advantages ✅ Stealth Penetration: Quantum radar penetrates all known stealth technologies ✅ Global Coverage: Space-based constellation provides worldwide surveillance ✅ Cost-Effective: 6-8x better cost-effectiveness than current systems (SBIRS) ✅ Multi-Domain: Single system detects missiles, aircraft, ships, and submarines ✅ Quantum Advantage: 5-10 year technology lead over conventional systems Photon Dark-Photon FDM Wave Theory https://cosmic-entanglement-visualizer-cop-844bebeb.base44.app/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Hardened Slarpx

    Hardened Slarpx

    Experimental hardened Linux based on Xennytsu and Poison engine

    WARNING: EXPERIMENTAL / UNSTABLE RESEARCH PROJECT. NOT INTENDED FOR DAILY USE. Hardened Slarpx is a Debian-based Linux distribution built with a strict security-first approach. It uses a multi-layered defense model with aggressive mitigations and extensive kernel-level hardening. Due to its highly restrictive firewall policy, anonymization tools and certain network protocols are intentionally unsupported. The distribution includes two custom security modules: Poison and Xennytsu. Poison disrupts the deterministic timing required by exploit code by injecting random delays when abnormal behavior is detected, reducing the reliability of timing-based attacks. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 15
    Mech Station Beta

    Mech Station Beta

    Mech Station Beta - Tower Defense like Game

    The mech platform floats through levels and progresses over time. It differs significantly from traditional Tower Defense or Survival games. One of the game's key features is the fine-tuned balance of hundreds of gameplay parameters, based on player-collected statistics. However, this feature is not yet fully implemented — it requires a server machine, which I currently don’t have due to personal circumstances. If anyone can provide a server machine or a service like Google Virtual Machine, it would be highly useful and greatly appreciated. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    GpgFrontend

    GpgFrontend

    A Free, Easy-to-Use, Cross-Platform OpenPGP Crypto Tool.

    ...By using GpgFrontend, you can quickly encrypt and decrypt text or files. You can also digitally sign your text or files.GpgFrontend does not need to depend on any server, therefore it may be one of the last lines of defense in protecting your privacy. Please use this tool to transmit or store information that you regard as very precious. You can also use it to guarantee the authenticity of your information.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 17
    Adaptive Intelligence

    Adaptive Intelligence

    Adaptive Intelligence also known as "Artificial General Intelligence"

    Adaptive Intelligence is the implementation of neural science, forensic psychology , behavioral science with machine-learning and artificial intelligence to provide advanced automated software platforms with the ability to adjust and thrive in dynamic environments by combining cognitive flexibility, emotional regulation, resilience, and practical problem-solving skills.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 18
    Mindustry

    Mindustry

    An open-source sandbox tower defense game

    Mindustry is a tower-defense sandbox factory game. Build supply chains of conveyor belts to fuel your turrets, produce materials for building, and defend your structures from waves of enemies.
    Downloads: 92 This Week
    Last Update:
    See Project
  • 19
    OpenDDS

    OpenDDS

    OpenDDS is open source publish/subscribe middleware

    ...Full product information, source code, documentation, build instructions, and license information are available from http://www.opendds.org. Commercial consulting, support, and training for OpenDDS are available. OpenDDS is in production use today by organizations in the Aerospace/Defense, Manufacturing/Fabrication, Home Automation, Finance, and other domains.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Open source Algol 68 implementations

    Open source Algol 68 implementations

    Implementations for the Revised Report language

    ...The project offers two implementations: Implementation 1 is Algol68G: a recent checkout hybrid compiler/interpreter by Marcel van der Veer, supporting arbitrary arithmetic, partial parametrisation, complex numbers, POSIX threads, GNU plotutils, GNU scientific library, curses, sound, TCP sockets, RegEx and PostgreSQL. Inplementation 2 is algol68toc, a port by Sian Mountbatten of the vintage Algol68RS (UK Defense Research Agency) compiler. The implementation emits C code.
    Leader badge">
    Downloads: 23 This Week
    Last Update:
    See Project
  • 21
    Udp2raw-tunnel

    Udp2raw-tunnel

    Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic

    A tunnel which turns UDP traffic into encrypted fakeTCP/UDP/ICMP traffic by using Raw Socket, helps you bypass UDP FireWalls(or unstable UDP environment). When used alone, Udp2raw tunnels only UDP traffic. Nevertheless, if you used udp2raw + any UDP-based VPN together, you can tunnel any traffic(include TCP/UDP/ICMP), currently, OpenVPN/L2TP/ShadowVPN and tinyfecVPN are confirmed to be supported. Linux host (including desktop Linux,Android phone/tablet,OpenWRT router,or Raspberry PI) with...
    Downloads: 36 This Week
    Last Update:
    See Project
  • 22
    Log4jScanner

    Log4jScanner

    A log4j vulnerability filesystem scanner and Go package

    ...Clear, machine-readable output allows the tool to plug into CI/CD checks and fleet-wide inventory jobs. For responders, it reduces time-to-visibility by surfacing exactly which paths and bundles require patching or remediation. It’s a pragmatic addition to defense-in-depth programs that need verifiable evidence of exposure without deploying agents.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23
    BlooketHack

    BlooketHack

    One of the First Blooket hacks online

    ...Third you need to extract the files from the .zip file you downloaded. Finally, just double click the main.py file. Original code by: kgsensei. Works on most game modes, Gold Quest (Tested - Working) Tower Defense (Tested - Working) Café (Tested - Working) Factory (Tested - Working) Racing (Tested - Working) Classic (Tested - Working) and Crypto (Tested - Working).
    Downloads: 5 This Week
    Last Update:
    See Project
  • 24
    Gestão de Clientes Defense
    Software para gerenciamento de clientes, serviços e parceiros para a empresa Defense Antimultas
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    OpenSK

    OpenSK

    OpenSK is an open-source implementation for security keys

    ...It provides the full authenticator stack—USB/NFC transport, CTAP protocol handling, credential management, and cryptographic operations—so you can build and audit your own hardware token. The project emphasizes defense-in-depth: memory-safe Rust, hardened crypto, isolation via an embedded OS, and explicit user presence/verification flows. Developers can flash reference hardware, customize UX (LEDs, buttons, PIN), and experiment with extensions while staying interoperable with major browsers and platforms. A test and conformance suite validates protocol behavior against the WebAuthn/CTAP specs to ensure compatibility.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next