[go: up one dir, main page]

Search Results for "network security toolkit"

Showing 2392 open source projects for "network security toolkit"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Our xDM platform turns business users into data champions. Icon
    Our xDM platform turns business users into data champions.

    Discover the Intelligent Data Hub unique platform for Master Data Management

    It empowers organizations of any size to build trusted data applications quickly, with fast time to value using a single software platform for governance, master data, reference data, data quality, enrichment, and workflows.
    Learn More
  • 1
    Wesh Network Toolkit

    Wesh Network Toolkit

    Async Mesh Network Protocol for Extreme Communication

    With Wesh's toolkit, building p2p apps has never been simpler. Wesh network is a decentralized extreme communication protocol. Wesh provides a secured, distributed and asynchronous communication protocol, both with or without internet access using IPFS and direct transports such as BLE and proximity drivers. Wesh Protocol provides end-to-end encryption and perfect forward secrecy for all the exchanged messages.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 2
    Network Security Toolkit (NST)

    Network Security Toolkit (NST)

    A network security analysis and monitoring toolkit Linux distribution.

    Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 42 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools.
    Leader badge">
    Downloads: 198 This Week
    Last Update:
    See Project
  • 3
    Mobile Verification Toolkit

    Mobile Verification Toolkit

    Helps with conducting forensics of mobile devices

    Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices. It has been developed and released by the Amnesty International Security Lab in July 2021 in the context of the Pegasus project along with a technical forensic methodology and forensic evidence.
    Downloads: 42 This Week
    Last Update:
    See Project
  • 4
    Network Flight Simulator

    Network Flight Simulator

    A utility to safely generate malicious network traffic patterns

    flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility. The tool performs tests to simulate DNS tunneling, DGA traffic, requests to known active C2 destinations, and other suspicious traffic patterns.
    Downloads: 8 This Week
    Last Update:
    See Project
  • Atera IT Autopilot Icon
    Atera IT Autopilot

    Ensure operational efficiency at any scale with 24/7 autonomous IT support.

    IT Autopilot takes the pressure off your team by handling first-tier support across the channels your end users already live in — email, chat, Slack, Teams, and your Customer Portal. It doesn’t just respond to end-user queries, issues, and crises — it solves them.
    Learn More
  • 5
    Slim Toolkit

    Slim Toolkit

    Don't change anything in your container image

    Inspect, Optimize and Debug Your Containers. You don't have to change anything in your application images to make them smaller! Keep doing what you are doing. Use the base image you want. Use the package manager you want. Don't worry about hand optimizing your Dockerfile. Don't worry about manually creating Seccomp and AppArmor security profiles. Don't worry about remembering all slim command line flags. Use the interactive mode to select the command flags and values. Use the build command...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Watt Toolkit

    Watt Toolkit

    Open source cross-platform multi-purpose game toolkit

    "Watt Toolkit" is an open-source cross-platform multi-purpose game toolkit, most of its features require you to download and install Steam to use it. Make the Steam community, Github, Google reCAPTCHA, Pixiv, Discord, Twitch and other domestic hard-to-access pages accessible properly. Some JS scripts are injected into web pages through an acceleration service that intercepts web requests, providing functionality similar to that of a web plugin. Functions similar to Steam community 302, using...
    Downloads: 65 This Week
    Last Update:
    See Project
  • 7
    AWS Toolkit for JetBrains

    AWS Toolkit for JetBrains

    A plugin for interacting with AWS from JetBrains IDEs

    The AWS Toolkit for JetBrains makes it easier to write applications built on Amazon Web Services. If you come across bugs with the toolkit or have feature requests, please raise an issue on our GitHub repository. See the user guide for how to get started, along with what features/services are supported. CodeWhisperer uses machine learning to generate code suggestions from the existing code and comments in your IDE.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    UFONet

    UFONet

    UFONet - Denial of Service Toolkit

    UFONet is a powerful and controversial Python-based toolkit for testing and conducting Distributed Denial of Service (DDoS) attacks using unconventional methods, such as leveraging third-party web applications as attack vectors. It automates the discovery of vulnerable targets and enables attackers or researchers to launch large-scale amplification attacks without directly using botnets. While primarily intended for penetration testing and educational purposes, UFONet emphasizes anonymity...
    Downloads: 39 This Week
    Last Update:
    See Project
  • 9
    Django OAuth Toolkit

    Django OAuth Toolkit

    OAuth2 goodies for the Djangonauts!

    Django OAuth Toolkit can help you by providing, out of the box, all the endpoints, data, and logic needed to add OAuth2 capabilities to your Django projects. Django OAuth Toolkit makes extensive use of the excellent OAuthLib, so that everything is rfc-compliant. OAuth is an open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords. Django is a high-level...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Pylon is an All-in-one B2B Support Platform for modern B2B businesses. Icon
    Pylon is an All-in-one B2B Support Platform for modern B2B businesses.

    Pylon is a modern support system that integrates with all B2B channels like Slack and Team.

    We bring together everything a post-sales teams team needs including a ticketing system, B2B omnichannel integrations (Slack Connect, Microsoft Teams), modern chat widget, knowledge base, AI support bot, account management, customer marketing, and more.
    Learn More
  • 10
    Personal Security Checklist

    Personal Security Checklist

    A compiled checklist of 300+ tips for protecting digital security

    Personal Security Checklist is a comprehensive, plain-language checklist for improving personal digital security and privacy across devices, accounts, and everyday workflows. It’s organized so that complete beginners can make quick, high-impact changes, while advanced users can dig into deeper hardening steps. The guidance spans topics like passwords, 2FA, device encryption, browser hygiene, network safety, backups, and incident response planning.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    frida

    frida

    Dynamic instrumentation toolkit for developers

    Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers. Inject your own scripts into black box processes. Hook any function, spy on crypto APIs or trace private application code, no source code needed. Edit, hit save, and instantly see the results. All without compilation steps or program restarts. Works on Windows, macOS, GNU/Linux, iOS, Android, and QNX.
    Downloads: 501 This Week
    Last Update:
    See Project
  • 12
    Arkime

    Arkime

    A full packet capturing, indexing, and database system

    Arkime is an open source, large-scale, full packet capturing, indexing, and database system designed to augment existing security infrastructure by storing and indexing network traffic in standard PCAP format. It offers full network visibility, facilitating the swift identification and resolution of security and network issues. Security teams gain access to the necessary network visibility data essential for responding to and investigating incidents to expose the full attack scope. ...
    Downloads: 54 This Week
    Last Update:
    See Project
  • 13
    Kubernetes Network Policy Recipes

    Kubernetes Network Policy Recipes

    Example recipes for Kubernetes Network Policies that you can just copy

    Kubernetes Network Policy Recipes is a practical, example-driven repository offering ready-to-use Kubernetes NetworkPolicy manifests and patterns for real application networking scenarios. Rather than just listing theoretical API specs, it groups recipes that implement common intent-based policies — such as isolating namespaces, restricting cross-pod traffic, enabling ingress from specific services, and locking down egress to only necessary endpoints — so users can pick and apply what they...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Zeek

    Zeek

    Zeek is a powerful network analysis framework

    ...Rather, Zeek sits on a “sensor,” a hardware, software, virtual, or cloud platform that quietly and unobtrusively observes network traffic. Zeek interprets what it sees and creates compact, high-fidelity transaction logs, file content, and fully customized output, suitable for manual review on disk or in a more analyst-friendly tool like a security and information event management (SIEM) system.
    Downloads: 19 This Week
    Last Update:
    See Project
  • 15
    bettercap

    bettercap

    The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks

    bettercap is a powerful, easily extensible and portable framework written in Go which aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking WiFi networks, Bluetooth Low Energy devices, wireless HID devices and Ethernet networks.
    Downloads: 74 This Week
    Last Update:
    See Project
  • 16
    ZAP

    ZAP

    The OWASP ZAP core project

    The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by a dedicated international team of volunteers. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. It's also a great tool for experienced pentesters to use for manual security testing. ZAP is an easy to use integrated penetration testing tool for finding vulnerabilities in web...
    Downloads: 133 This Week
    Last Update:
    See Project
  • 17
    MetaRemover Toolkit

    MetaRemover Toolkit

    Open-source toolkit for removing metadata from files locally

    MetaRemover Toolkit is an open-source Python-based toolkit for removing metadata (EXIF, GPS, author, device information) from images and documents. The project demonstrates privacy-first metadata removal using local processing without uploading files to third-party servers. This toolkit complements the online service https://metaremover.com and can be used by developers, researchers, and privacy-conscious users.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18
    LinuxKit

    LinuxKit

    A toolkit for building secure, portable and lean operating systems

    LinuxKit, is a toolkit for building custom minimal, immutable Linux distributions. A toolkit for building secure, portable, and lean operating systems for containers. Designed for building and running clustered applications, including but not limited to container orchestration such as Docker or Kubernetes. Designed from the experience of building Docker Editions, but redesigned as a general-purpose toolkit.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 19
    apk-mitm

    apk-mitm

    Application that automatically prepares Android APK files for HTTPS

    Inspecting a mobile app's HTTPS traffic using a proxy is probably the easiest way to figure out how it works. However, with the Network Security Configuration introduced in Android 7 and app developers trying to prevent MITM attacks using certificate pinning, getting an app to work with an HTTPS proxy has become quite tedious.
    Downloads: 18 This Week
    Last Update:
    See Project
  • 20
    Vault

    Vault

    Tool for secrets management and encryption as a service

    ...Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. The shift from static, on-premise infrastructure to dynamic, multi-provider infrastructure changes the approach to security. Security in static infrastructure relies on dedicated servers, static IP addresses, and a clear network perimeter. Security in dynamic infrastructure is defined by ephemeral applications and servers, trusted sources of user and application identity, and software-based encryption. Datacenters with inherently high-trust networks with clear network perimeters. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 21
    XRAY

    XRAY

    XRay for recon, mapping and OSINT gathering from public networks

    XRAY is a modular security toolset that helps developers and security professionals analyze, fuzz, and test web applications, protocols, and network services for vulnerabilities. It provides a framework for writing and executing inspection modules that can parse structured data (JSON, XML, HTML), traverse graphs of endpoints, and perform intelligent probing guided by discovered surface area.
    Downloads: 19 This Week
    Last Update:
    See Project
  • 22
    NeoPass

    NeoPass

    Your Essential Exam Companion for the Iamneo Portal & NPTEL Exams

    NeoPass is an offline, cross-platform password manager designed with simplicity and privacy in mind. It allows users to securely store and manage their credentials in an encrypted local file, with no cloud synchronization or network connectivity involved. The application is built with Python and Qt, providing a clean graphical user interface and cross-platform compatibility. It uses industry-standard AES encryption to protect user data and emphasizes complete user control without any...
    Downloads: 97 This Week
    Last Update:
    See Project
  • 23
    Onion Browser

    Onion Browser

    An open-source, privacy-enhancing web browser for iOS

    Encrypted traffic through the Tor network gives you the highest standard of security and privacy. No extra eyes see your activity, save your history or influence your browsing. Targeted ads are history. Tabs don’t hang around. They close when you’re done, so every search is new. Onion Browser is your trusted connection to Tor on iOS. Tor offers the highest standard of privacy.
    Downloads: 114 This Week
    Last Update:
    See Project
  • 24
    theHarvester

    theHarvester

    E-mails, subdomains and names

    theHarvester is a very simple to use, yet powerful and effective tool designed to be used in the early stages of a penetration test or red team engagement. Use it for open source intelligence (OSINT) gathering to help determine a company's external threat landscape on the internet. The tool gathers emails, names, subdomains, IPs and URLs using multiple public data sources.
    Downloads: 83 This Week
    Last Update:
    See Project
  • 25
    ntopng

    ntopng

    Web-based Traffic and Security Network Traffic Monitoring

    ntopng® is a web-based network traffic monitoring application released under GPLv3. It is the new incarnation of the original ntop written in 1998, and is now revamped in terms of performance, usability, and features. ntopng is a network traffic probe that provides 360° Network visibility, with its ability to gather traffic information from traffic mirrors, NetFlow exporters, SNMP devices, Firewall logs, and Intrusion Detection systems. ntopng has been written in a portable way in order to...
    Downloads: 33 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next