[go: up one dir, main page]

Showing 211 open source projects for "defense"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Project Management Software Icon
    Project Management Software

    Understand how PI® can automate your processes

    Project Insight offers powerful tools for project managers and teams in order to deliver optimal performance and ensure success. An enterprise project and portfolio management software, Project Insight offers personalized dashboards, intelligent scheduling, resource management, collaboration, time and expense tracking, project and portfolio tracking, workflow, and reporting features to help teams work better and get real results. Project Insight is suitable for small teams, mid-market companies, and large enterprises.
    Learn More
  • 1
    AzureAD Attack Defense

    AzureAD Attack Defense

    This publication is a collection of various common attack scenarios

    AzureAD-Attack-Defense is a community-maintained playbook that collects common attack scenarios against Microsoft Entra ID (formerly Azure Active Directory) together with detection and mitigation guidance. The repository is organized into focused chapters — for example: Password Spray, Consent Grant, Service Principals in Azure DevOps, Entra Connect Sync Service Account, Replay of Primary Refresh Token (PRT), Entra ID Security Config Analyzer, and Adversary-in-the-Middle — each written to explain the attack, show detection approaches, and recommend mitigation steps. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Cryptol

    Cryptol

    Cryptol: The Language of Cryptography

    ...Developed by Galois, Cryptol provides a high-level mathematical syntax for describing cryptographic primitives and enables formal verification of algorithm properties. It is used in academic, research, and defense sectors to validate correctness and security through symbolic execution and model checking, ensuring critical cryptographic code is free of design flaws.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 3
    Arcjet

    Arcjet

    Arcjet JS SDKs. Rate limiting, bot protection, email verification

    Arcjet helps developers protect their apps in just a few lines of code. Implement rate limiting, bot protection, email verification, and defense against common attacks. Native security for Bun, Next.js, Node.js, SvelteKit, Vercel, Netlify, Fly.io, and other modern platforms. Customizable protection for signup forms, login pages, API routes, and your whole app. Test security rules locally. Protection that works in every environment. No agent is required.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    macOS Security Compliance

    macOS Security Compliance

    macOS Security Compliance Project

    ...This is a joint project of federal operational IT Security staff from the National Institute of Standards and Technology (NIST), National Aeronautics and Space Administration (NASA), Defense Information Systems Agency (DISA), and Los Alamos National Laboratory (LANL).
    Downloads: 1 This Week
    Last Update:
    See Project
  • Run your private office with the ONLYOFFICE Icon
    Run your private office with the ONLYOFFICE

    Secure office and productivity apps

    A Comprehensive Alternative to Office 365 for Business
    Learn More
  • 5
    Santa

    Santa

    A binary authorization system for macOS

    ...Santa is built to help protect users by stopping the spread of malware and analyzing what's running on a computer, but is by no means a total security system. Ideally Santa works as a part of a defense-in-depth strategy, and other measures should be in place to protect hosts.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6

    Scalar-Defense-System

    Scalar Defense using Photon Dark Photon FDM Waves

    Scalar Defense leverages wave-like properties of Fuzzy Dark Matter to detect, track & deflect asteroids. Manipulating scalar fields (ϕ) & their interference patterns, system creates controlled gravitational potentials can alter asteroid trajectories. Foundation is the two-field FDM model, allows tuning density fringes via mass & velocity parameters
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Latte

    Latte

    The safest & truly intuitive templates for PHP

    ...It can modify the page, obtain sensitive information or even steal the user's identity. Templating systems fail to defend against XSS. Latte is the only system with an effective defense, thanks to context-sensitive escaping. Latte is based on PHP, whereas Twig is based on Python. A designer in Latte doesn't have to constantly switch between two different conventions. Stay in touch. The plugin for Tracy informs you on each page which templates and which variables are being rendered. Latte has native support in NetBeans and an excellent plugin for PhpStorm that suggests tags, filters and PHP code. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    GOAD (Game of Active Directory)

    GOAD (Game of Active Directory)

    game of active directory

    GOAD (Gather Open Attack Data) is a security reconnaissance framework for collecting, enriching, and visualizing open-source intelligence (OSINT) around hosts, domains, and certificates. It automates queries to certificate transparency logs, passive DNS, subdomain enumeration, web endpoints, and other public threat feeds. The tool aggregates results into structured formats and can produce interactive graphs to highlight relationships between entities (e.g. domain → IP → cert → ASN). Analysts...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 9
    Apache APISIX

    Apache APISIX

    The cloud-native API gateway

    ...You can use Apache APISIX as a traffic entrance to process all business data, including dynamic routing, dynamic upstream, dynamic certificates, A/B testing, canary release, blue-green deployment, limit rate, defense against malicious attacks, metrics, monitoring alarms, service observability, service governance, etc.
    Downloads: 6 This Week
    Last Update:
    See Project
  • Safetica Data Loss Prevention Software for Businesses Icon
    Safetica Data Loss Prevention Software for Businesses

    For companies that want to protect their sensitive data against leakages, insider threats and want to be compliant with regulations.

    Safetica is a cost-effective, easy-to-use Data Loss Prevention (DLP) solution. It performs security audits, prevents sensitive data from leaving your company, and sheds light on what is going on in your organization.
    Learn More
  • 10
    SafeLine

    SafeLine

    Serve as a reverse proxy to protect your web services from attacks

    SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits. A web application firewall helps protect web apps by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web apps from attacks such as SQL injection, XSS, code injection, os command injection, CRLF injection, LDAP injection, XPath injection, RCE, XXE, SSRF, path traversal, backdoor, brute force, HTTP-flood, bot abuse, among others. By...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Tower Building Game

    Tower Building Game

    HTML5 Canvas Tower Building Game

    Tower Building Game is a small game project — likely implementing a classic “tower defense” or “tower-based” game — designed to showcase game-development fundamentals such as rendering, game logic, user interaction, and possibly simple physics or animations. As an open-source repository, tower_game aims not only to deliver a playable game, but also to serve as a learning resource or template: developers can inspect its code, understand how game loops, input handling, asset management, and state updates are organized. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    Kata Containers

    Kata Containers

    Build a standard implementation of lightweight Virtual Machines (VMs)

    ...Kata Containers is an open source community working to build a secure container runtime with lightweight virtual machines that feel and perform like containers, but provide stronger workload isolation using hardware virtualization technology as a second layer of defense. Since launching in December 2017, the community successfully merged the best parts of Intel Clear Containers with Hyper.sh RunV and scaled to include support for major architectures including AMD64, ARM, IBM p-series, and IBM z-series in addition to x86_64. Kata Containers also supports multiple hypervisors including QEMU, Cloud-Hypervisor, and Firecracker, and integrates with the containerd project among others.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    Rebuff

    Rebuff

    LLM Prompt Injection Detector

    A self-hardening prompt injection detector. Rebuff is designed to protect AI applications from prompt injection (PI) attacks through a multi-layered defense. Rebuff is still a prototype and cannot provide 100% protection against prompt injection attacks. Add canary tokens to prompts to detect leakages, allowing the framework to store embeddings about the incoming prompt in the vector database and prevent future attacks.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14

    Quantum-Shield-Orbital-Detection-System

    Quantum Shield is a revolutionary defense system

    QUANTUM SHIELD - QUANTUM ENHANCED DETECTION SYSTEM 🚀 Overview Quantum Shield is a revolutionary defense system leveraging quantum sensing technologies for superior detection capabilities against stealth aircraft, drones, missiles, and submarines. By utilizing quantum entanglement, superposition, and other quantum phenomena, the system offers detection ranges and capabilities far beyond conventional radar systems. Key Advantages ✅ Stealth Penetration: Quantum radar penetrates all known stealth technologies ✅ Global Coverage: Space-based constellation provides worldwide surveillance ✅ Cost-Effective: 6-8x better cost-effectiveness than current systems (SBIRS) ✅ Multi-Domain: Single system detects missiles, aircraft, ships, and submarines ✅ Quantum Advantage: 5-10 year technology lead over conventional systems Photon Dark-Photon FDM Wave Theory https://cosmic-entanglement-visualizer-cop-844bebeb.base44.app/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    UUSEC WAF

    UUSEC WAF

    AI and semantic technology Web Application Firewall

    UUSEC WAF Web Application Firewall is an industrial grade free, high-performance, and highly scalable web application and API security protection product that supports AI and semantic engines. It is a comprehensive website protection product launched by UUSEC Technology, which first realizes the three-layer defense function of traffic layer, system layer, and runtime layer.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Hardened Slarpx

    Hardened Slarpx

    Experimental hardened Linux based on Xennytsu and Poison engine

    WARNING: EXPERIMENTAL / UNSTABLE RESEARCH PROJECT. NOT INTENDED FOR DAILY USE. Hardened Slarpx is a Debian-based Linux distribution built with a strict security-first approach. It uses a multi-layered defense model with aggressive mitigations and extensive kernel-level hardening. Due to its highly restrictive firewall policy, anonymization tools and certain network protocols are intentionally unsupported. The distribution includes two custom security modules: Poison and Xennytsu. Poison disrupts the deterministic timing required by exploit code by injecting random delays when abnormal behavior is detected, reducing the reliability of timing-based attacks. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 17
    Mech Station Beta

    Mech Station Beta

    Mech Station Beta - Tower Defense like Game

    The mech platform floats through levels and progresses over time. It differs significantly from traditional Tower Defense or Survival games. One of the game's key features is the fine-tuned balance of hundreds of gameplay parameters, based on player-collected statistics. However, this feature is not yet fully implemented — it requires a server machine, which I currently don’t have due to personal circumstances. If anyone can provide a server machine or a service like Google Virtual Machine, it would be highly useful and greatly appreciated. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    GpgFrontend

    GpgFrontend

    A Free, Easy-to-Use, Cross-Platform OpenPGP Crypto Tool.

    ...By using GpgFrontend, you can quickly encrypt and decrypt text or files. You can also digitally sign your text or files.GpgFrontend does not need to depend on any server, therefore it may be one of the last lines of defense in protecting your privacy. Please use this tool to transmit or store information that you regard as very precious. You can also use it to guarantee the authenticity of your information.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 19
    Betabot

    Betabot

    BDEF, WIE, MInfantry AI opponent

    A basic Bot for old half life 1 mod Support: -Base Defense version 1605: Betabot0001 -War In Europe beta 3: Betabot0101 -Mobile Infantry Beta 1- Training camp: betabot0200
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    .... 🛠️ The focus is on its technical workings, the ethical implications, and how it can be used in controlled environments for educational purposes. 🎓 It aims to raise awareness about network security 🔐 and the importance of understanding malicious tools for defense and prevention strategies. Fire Your Cannon Now! This is for EDUCATIONAL PURPOSES ONLY thanks!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Adaptive Intelligence

    Adaptive Intelligence

    Adaptive Intelligence also known as "Artificial General Intelligence"

    Adaptive Intelligence is the implementation of neural science, forensic psychology , behavioral science with machine-learning and artificial intelligence to provide advanced automated software platforms with the ability to adjust and thrive in dynamic environments by combining cognitive flexibility, emotional regulation, resilience, and practical problem-solving skills.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 22
    Dune 2000 Extra

    Dune 2000 Extra

    Dune 2000 Extra Modification (aka D2kx)

    ...The latest modification, *Dune 2000 Extra* (D2kx), takes the game to the next level by introducing a variety of new buildings and units, building on the gameplay improvements introduced in the game's latest patch, version 1.06. This mod adds fresh layers of strategic depth and complexity, offering players new ways to approach both offense and defense on the sand dunes of Arrakis.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 23
    mdtscan

    mdtscan

    Scans for software

    ...It does cursory brute force password audits upon request. It has a toy like interface. Rated Tol Barad 6 to 8 in under 7 minutes. Scans 300k machines per hour. Defense network coverage within Swiss extrapolation. I'd been requested to program this & provide it after 10 years. Requestors include MSFT, KPMG, USM, RUM, Newman Springs. License Ms-PL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Phish Alert  Button for Outlook

    Phish Alert Button for Outlook

    Free Outlook plugin to report phishing emails with one click

    ...Features: – One-click phishing email reporting – Compatible with Outlook 2013 and later – Simple configuration and fast deployment – Sends reports to a custom email address – Fully customizable: customize button name, ribbon and other details. Empower your users to become part of your phishing defense strategy with the free Phish Alert Button for Outlook.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    WP Email Registration Blacklist Plugin

    WP Email Registration Blacklist Plugin

    WordPress plugin to block or allow user registrations

    ...The plugin’s flexibility lies in its whitelist feature, which allows administrators to selectively permit engagement from approved entities. Functioning as a robust defense against spam and unauthorized activities, the plugin is equipped with extensive capabilities to administer blacklists and whitelists for both IPs and domains. Tailored to prevent sign-ups from temporary email services and to facilitate user management, this plugin is indispensable for safeguarding the integrity and security of WordPress sites.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next