Showing 27 open source projects for "self-host"

View related business solutions
  • Get full visibility and control over your tasks and projects with Wrike. Icon
    Get full visibility and control over your tasks and projects with Wrike.

    A cloud-based collaboration, work management, and project management software

    Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
    Learn More
  • Securden Privileged Account Manager Icon
    Securden Privileged Account Manager

    Unified Privileged Access Management

    Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.
    Learn More
  • 1
    nsjail

    nsjail

    A lightweight process isolation tool that utilizes Linux namespaces

    A lightweight process isolation tool that utilizes Linux namespaces, cgroups, rlimits and seccomp-bpf syscall filters, leveraging the Kafel BPF language for enhanced security. It utilizes Linux namespace subsystem, resource limits, and the seccomp-bpf syscall filters of the Linux kernel.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    OmniEdge

    OmniEdge

    Bringing intranet on the internet with Zero-Config Mesh VPNS.

    OmniEdge is an Open source p2p layer 2 , zero-config mesh VPN infrastructure, a traditional VPN, AWS VPC, Ngrok, DDNS alternative. No central server, easy to scale with less maintenance. What happens in intranet, stays in in intranet.
    Leader badge
    Downloads: 163 This Week
    Last Update:
    See Project
  • 3
    1654 — encryption system

    1654 — encryption system

    1024-bit encryption system (functional safe or disk) | С++20

    This release marks the first production-ready publication of 1654, a dependency-free cryptographic vault engine built around a strict vault abstraction and a wide-state cryptographic design. 1654 is not a wrapper around existing crypto libraries. It is a self-contained system whose cryptographic behavior is fully defined within the repository. Key Characteristics Vault-oriented model Encrypted data is treated as a sealed container-safe with explicit operations, not as a password-wrapped file. Dependency-free design The entire cryptographic surface is auditable in-tree. PetoronHash as the cryptographic core All key material derivation, diffusion, and internal transformations are driven by PetoronHash 1024-bit wide internal state The architecture uses a wide internal state to increase diffusion depth and structural safety margins. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    PetoronHash-System

    PetoronHash-System

    PHASH | post-quantum XOF hashing algorithm | C++20

    PHASH is a self-contained, dependency-free, post-quantum XOF hashing algorithm implemented in modern C++20. This release delivers the first fully stable production implementation of the PetoronHash-System — a 1600-bit sponge-based hash function with domain separation, extendable output, and deterministic behavior. Key Features No external dependencies — pure C++20 implementation.
    Downloads: 2 This Week
    Last Update:
    See Project
  • The AI-powered unified PSA-RMM platform for modern MSPs. Icon
    The AI-powered unified PSA-RMM platform for modern MSPs.

    Trusted PSA-RMM partner of MSPs worldwide

    SuperOps.ai is the only PSA-RMM platform powered by intelligent automation and thoughtfully crafted for the new-age MSP. The platform also helps MSPs manage their projects, clients, and IT documents from a single place.
    Learn More
  • 5
    Udp2raw-tunnel

    Udp2raw-tunnel

    Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic

    ...Nevertheless, if you used udp2raw + any UDP-based VPN together, you can tunnel any traffic(include TCP/UDP/ICMP), currently, OpenVPN/L2TP/ShadowVPN and tinyfecVPN are confirmed to be supported. Linux host (including desktop Linux,Android phone/tablet,OpenWRT router,or Raspberry PI) with root account or cap_net_raw capability. ICMP/FakeTCP headers help you bypass UDP blocking, UDP QOS or improper UDP NAT behavior on some ISPs. In ICMP header mode,udp2raw works like an ICMP tunnel. UDP headers are also supported. In UDP header mode, it behaves just like a normal UDP tunnel, and you can just make use of the other features (such as encryption, anti-replay, or connection stalization).
    Downloads: 24 This Week
    Last Update:
    See Project
  • 6

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes:...
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Certificate create and sign tool

    Certificate create and sign tool

    Easy create and sign x509 certificates and generate RSA key pairs

    With this tool you can create and sign x509 certificates, certificate request, create self-signed certificates, RSA private and public keys with simple and intuitive GUI. This program is using OpenSSL.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    BlackBelt WASTE - ipv4 / Tor / i2p + AI

    BlackBelt WASTE - ipv4 / Tor / i2p + AI

    A modern, AI-Smart, WASTE p2p for ipv4 and invisible address spaces

    ...For Windows XP 32/64, Vista 32/64, Win7 32/64, Win8 32/64, Win 10, Linux (WINE). *** NEW *** Distributed Autonomic-Performance-Tuning - A Goal-Seeking Swarming-Semiotic AI *** *** Built-in Self-Organising Anti-Spoofing Technology *** *** Medusa - Pure Ephemeral RNG - Routing, Security Extensions *** PLEASE ENSURE YOUR NETWORK USES THE SAME BUILD. FOR BEST RESULTS.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    SSHTOOLS

    SSHTOOLS

    Java SSH API

    ...This API is available to the community under the LGPL open source license. This update includes ed25519 support, support for the new OpenSSH private key file format and stronger key exchange algorithms. The project continues to host both the original API and legacy applications created around it, however, these are now considered deprecated and we do not recommend their use in anyway.
    Leader badge
    Downloads: 46 This Week
    Last Update:
    See Project
  • Streamline Hiring with Skill Assessments Icon
    Streamline Hiring with Skill Assessments

    Say goodbye to hiring guesswork. Use Canditech’s job simulation tests to assess real-world skills and make data-driven decisions.

    Canditech offers innovative, cheat-proof skill assessments and job simulations to transform your hiring process. From technical skills to soft skills, we help you assess candidates on actual job performance. With over 500 customizable tests and powerful video interview features, you can evaluate real-world capabilities, streamline your hiring, and reduce biases. Whether you’re hiring for remote roles, mass hiring, or looking to expand your diversity pool, Canditech’s data-driven platform ensures the right candidates are chosen for the job every time.
    Get a Free Demo
  • 10
    ARP AntiSpoofer
    A utility for detecting and resisting BIDIRECTIONAL ARP spoofing. It can anti-spoof for not only the local host, but also other hosts in the same subnet. It is as well a handy helper for gateways which don't work well with ARP.
    Downloads: 24 This Week
    Last Update:
    See Project
  • 11
    TrojanCockroach

    TrojanCockroach

    A Stealthy Trojan Spyware

    This program is a Trojan Virus that steals data (ID, password; every key stroke) from PC (Windows XP or later) and emails it back to the host. It spreads among PCs through USB drives. It is almost undetectable to any antivirus software.
    Downloads: 117 This Week
    Last Update:
    See Project
  • 12

    Selective Data Backup (DoS App)

    Select the files you want backed up.

    This program was made because windows backup isn't enough if the size of your hard drive changes. This program directly copies any files/folders you list, to an empty folder. It copies the entire folder structure, so you know exactly where your files and everything backed up, are/were. Now, also included in this is my Password Safe program. Store all your passwords in 1 convenient location. But, wait "wouldn't that be dangerous?", NOPE! It's all encrypted useing my special Cypher...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    AVRL
    AVRL is a Opensource Antivirus for Windows. AVRL has a key feature called 'Computer Vaccine' , which is self-replication and spreading through removable device to cleanup malware on other computer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    localwebfaker tests whether a LAN is vulnerable to a potential arp poisoning attack. . It redirects to a local website all the requests sent from an arbitrary host when the original destination matches the one specified in its GUI.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    WHIPS (Windows Host Intrusion Prevention System) is a Host Intrusion Prevention System for Windows NT/XP/2003. WHIPS uses the system call interposition technics and it is developed as a kernel module.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    NetSentry Gofer is a personal software firewall which secures your personal computer from unauthorized access through a remote host, such as the Internet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Corporate Data Protection and Network Security is a IT project targeting policy-based and fully-automated data protection, encryption and transmission. We plan to create self-diagnostic risk-predict enterprise environment with artificial intelligence.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Computer Breaker is a network testing tool that allows networking administrators to test if a computer is vulnerable to malicious attacks. Using the Nessus scanner, computer-breaker scans the remote host and automaticaly exploits its vulnerabilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Ncat - The culmination of many key features from various Netcat incarnations such as Netcat 1.10, Netcat6, SOcat, Cryptcat, GNU Netcat, etc. Ncat also has a host of new features such as "Connection Brokering", TCP redir (proxying), SOCKS client/server,
    Downloads: 11 This Week
    Last Update:
    See Project
  • 20
    IPsec2k is a C++ library that implements API for interacting with built-in Windows IPsec driver. It is self-contained and is capable of creating all policies one can create with MMC, IPsecPol or VPNtool.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This project aims to be an iptables configurator. Host platform is Win32. Programming language is Borland C++ Builder. This mix was chosen to enable non-Linux network administrators administrate a Linux firewall / NAT Proxy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Free Agents DIDS is a distributed intrusion detection system that you place on each host on your network. Agents intercommunicate with aes encryption, automatically alert you, and secure your network for free!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    libpam-sfs is a Pluggable Authentication Module that allows for the mounting of home directories from SFS-enabled (www.fs.net; Self-certifying File System) servers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    NetBios Scan is a tool that scan ip ranges and searchs host with share resources. With this program you can get information like machine name, workgroup,the user list, share resources... and you can connect and disconnect to these resources!!.
    Leader badge
    Downloads: 7 This Week
    Last Update:
    See Project
  • 25
    ethernet host availibality monitoring (logging to sql/file) checks active hosts with database/files active operation - contously sends out arp packets and tries to detect promiscous mode enabled machines
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB