[go: up one dir, main page]

Security Software for BSD

Browse free open source Security software and projects for BSD below. Use the toggles on the left to filter open source Security software by OS, license, language, programming language, and project status.

  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Yeastar: Business Phone System and Unified Communications Icon
    Yeastar: Business Phone System and Unified Communications

    Go beyond just a PBX with all communications integrated as one.

    User-friendly, optimized, and scalable, the Yeastar P-Series Phone System redefines business connectivity by bringing together calling, meetings, omnichannel messaging, and integrations in one simple platform—removing the limitations of distance, platforms, and systems.
    Learn More
  • 1

    LOIC

    A network stress testing application

    Low Orbit Ion Cannon. The project only keeps and maintains (bug fixing) the code written by the original author - Praetox, but is not associated or related to it. DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES.
    Downloads: 1,579 This Week
    Last Update:
    See Project
  • 2
    Msieve is a C library implementing a suite of algorithms to factor large integers. It contains an implementation of the SIQS and GNFS algorithms; the latter has helped complete some of the largest public factorizations known
    Leader badge">
    Downloads: 67 This Week
    Last Update:
    See Project
  • 3
    Foremost is a linux tool for conducting forensic examinations. Although intended for law enforcement purposes, it may be useful to other members of the community. Foremost reads through a file, such as a dd image file or a disk partition and extracts file
    Leader badge">
    Downloads: 33 This Week
    Last Update:
    See Project
  • 4
    The purpose of the tool is to perform fingerprinting of remote TCP/IP stacks based on Ofir Arkin's ICMP fingerprinting research. This tool is a practical implementation of results discovered during 'project X' http://www.sys-security.com/index.php
    Downloads: 10 This Week
    Last Update:
    See Project
  • Unrivaled Embedded Payments Solutions | NMI Icon
    Unrivaled Embedded Payments Solutions | NMI

    For SaaS builders, software companies, ISVs and ISOs who want to embed payments into their tech stack

    NMI Payments is an embedded payments solution that lets SaaS platforms, Software companies and ISVs integrate, brand, and manage payment acceptance directly within their software—without becoming a PayFac or building complex infrastructure. As a full-stack processor, acquirer, and technology partner, NMI handles onboarding, compliance, and risk so you can stay focused on growth. The modular, white-label platform supports omnichannel payments, from online, mobile and in-app to in-store and unattended. Choose from full-code, low-code, or no-code integration paths and launch in weeks, not months. Built-in risk tools, flexible monetization, and customizable branding help you scale faster while keeping full control of your experience. With NMI’s developer-first tools, sandbox testing, and modern APIs, you can embed payments quickly and confidently.
    Learn More
  • 5
    File Encoder Application

    File Encoder Application

    Java application for encryption

    Java application for encryption with a GUI. It is based in the XOR symetric encryption combined with a pseudorandom resorting of the bytes. Strenth and time to encrypt/decyrpt per MB adapted to size of input file. Multithread. zoom Multilanguage Dark mode JDK-17 compatibility It includes detailed documentation in English, Spanish and Catalan.
    Downloads: 17 This Week
    Last Update:
    See Project
  • 6
    TinyCrypt is a simple secure program for encrypting files. The core encryption code is only 76 lines of C code, based on the well known ARC4-D(768) algorithm.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    netool toolkit 4.6

    netool toolkit 4.6

    MitM pentesting opensource toolkit

    Operative Systems Suported are: Linux-ubuntu, kali-linux, backtack-linux (un-continued), freeBSD, Mac osx (un-continued) Netool its a toolkit written using 'bash, python, ruby' that allows you to automate frameworks like Nmap, Driftnet, Sslstrip, Metasploit and Ettercap MitM attacks. this toolkit makes it easy tasks such as SNIFFING tcp/udp traffic, Man-In-The-Middle attacks, SSL-sniff, DNS-spoofing, D0S attacks in wan/lan networks, TCP/UDP packet manipulation using etter-filters, and gives you the ability to capture pictures of target webbrowser surfing (driftnet), also uses macchanger to decoy scans changing the mac address. Rootsector module allows you to automate some attacks over DNS_SPOOF + MitM (phishing - social engineering) using metasploit, apache2 and ettercap frameworks. Like the generation of payloads, shellcode, backdoors delivered using dns_spoof and MitM method to redirect a target to your phishing webpage. recent as introducted the scanner inurlbr (by cleiton)
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    OW.NET -- 1-Wire API port from Java (and J#) to C#. Use the Dallas 1-Wire and iButton chips with standard C# using a serial adapter (also CF.net) or the TMEX drivers on the Windows platform. No J# distribution installation required.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    Web Scanner is a command-line program that is designed to scans web servers to find default and potentially vulnerable web pages. 2.0 - Java, 1.3 - Perl Web scanner supports both HTTP and HTTPS protocols and can be configured to use custom data files.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Empower Your Contact Center with Human-Like AI Conversations Icon
    Empower Your Contact Center with Human-Like AI Conversations

    Deliver faster resolutions, lower costs, and better CX without hiring another agent.

    Enterprise Bot, based in Switzerland, is a pioneer in Conversational AI, Process Automation, and Generative AI. With the trust of esteemed enterprise giants across industries like Generali, SIX, SBB, DHL, and SWICA, Enterprise Bot is revolutionizing both customer and employee experiences. Through its advanced integration with Large Language Models (LLM) such as ChatGPT and Llama 2, and its unique patent-pending DocBrain technology, the company delivers unparalleled personalization, active engagement, and omnichannel solutions across platforms like email, voice, and chat. Furthermore, Enterprise Bot integrates with existing core systems, such as SAP, CRMs, Confluence and more, and with its proprietary middleware, Blitzico, enables the AI to not only respond to queries but also take action to resolve them. This dedication to innovation in four main use case areas, Customer Support, Sales and Marketing, Knowledge Management and Digital Coworker, elevates both CX and employee productivity.
    Learn More
  • 10
    Common Hardware Recovery Solutions by Ukrainian-Russian network
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    A Bash script for downloading and installing additional Clamav definition files.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Enigma Encryption any OS

    Enigma Encryption any OS

    A cross-plattform encryption tool for texts and files

    Enigma encrypts texts (PINs, Passwords, Messages, etc.) of any kind and is available for any OS, because it's just an HTML-Webpage with JavaScript in the back. So you can share secrets with friends on any device which has a HTML-Browser. On my Homepage you can find out how to use file-encryption.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Raiden block cipher: An extremely lightweight and fast block cipher, developed using genetic programming, with the intention to be an alternative to TEA. This cipher is as fast as TEA, and without many of its known weaknesses.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    A small program that allows the user to delete files in a secure manner.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15

    truecrypt-wxGTK3

    Truecrypt Ported to wxGTK3

    This is the final release of truecrypt (7.1a) ported to use wxGTK3 instead of 2.8. None of the underlying code has changed, instead the compile errors due to modern distros using and updated version of wxGTK have been resolved (for now).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    A set of simple shell scripts to query (via SNMP) any router in an enterprise network for a list of active ARP cache entries. These entries are then merged into a host table with timestamp of last seen entry.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    BankOfEuler stores a set of accounts, each with a set of values. Value can be split into two parts, merged into a sum, or transferred between accounts. The server is never aware of the quantities being manipulated because they are encrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    It moves by itself inside networks like virus infection & plagues, it is being written to solve computer virus problem drastically and responsibly. It is legal, free and open for public domain to improve W3 ICT Security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Botkiller is a php-script which helps to flood the databases of bots, searching the web for email-adresses. Its goal is to create a huge network of servers running the script and to trap the bots in it while feeding it useless adresses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Easy x509 certificate generation, with multi-user administration and safe distribution. Predefined types for User/Clients/Server/Mail/CA. Users integrate information from LDAP or AD directory. Full revocation(CRL) support with ftp distribution of CRLs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    CartoReso intends to facilitate enterprise computer network mapping.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Utility to encrypt files and streams. Features: encryption with AES, Serpent, Twofish and many other block ciphers supported by Botan; PBKDF2 key derivation; HMAC verification; does not require files, works with pipe input and output
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    DownRoll: The downloadable RickRoll. How many people can you fool? Instructions: 1. Download it. 2. Change the file name. 3. Upload it to a file sharing site. 4. Trick people into running it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Fwall is a professional firewall software for Linux (Newt interface). The software has been adopted by private and governmental companies in Brazil. Fwall can be used with clients, servers, and (mainly) gateway machines.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Hardware-ID is a small Linux module providing a program by program assignment of certain hardware specific values. Useful for preparing master hard drives, hardware independend backup/restore and some exotic hardware.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next