Tags : Browse Projects

Select a tag to browse associated projects and drill deeper into the tag cloud.

Eraser

Compare

  Analyzed 3 days ago

Eraser is a secure data removal tool for Windows. It completely removes sensitive data from your hard drive by overwriting it several times with carefully selected patterns.

310K lines of code

1 current contributors

6 months since last commit

28 users on Open Hub

Very Low Activity
4.25
   
I Use This

Aircrack-NG

Compare

  Analyzed 1 day ago

Aircrack-ng is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security: - Monitoring: Packet capture and export of data to text files for further processing by third party tools - Attacking: Replay attacks, deauthentication, fake access points ... [More] and others via packet injection - Testing: Checking WiFi cards and driver capabilities (capture and injection) - Cracking: WEP and WPA PSK (WPA 1 and 2) All tools are command line which allows for heavy scripting. A lot of GUIs have taken advantage of this feature. It works primarily Linux but also Windows, OS X, FreeBSD, OpenBSD, NetBSD, as well as Solaris and even eComStation 2. [Less]

88K lines of code

15 current contributors

2 days since last commit

27 users on Open Hub

Moderate Activity
4.36364
   
I Use This
Licenses: BSD-3-Clause, gpl

The Freenet Project

Compare

  Analyzed 5 days ago

Freenet is a peer-to-peer network designed to allow the distribution of information over the Internet in an efficient manner, without fear of censorship. It is completely decentralized (there is no person or computer essential to its operation), meaning that Freenet cannot be attacked like ... [More] centralized peer-to-peer systems such as Napster. Freenet also employs intelligent routing and caching to learn to route requests more efficiently, automatically mirror popular data, make network flooding almost impossible, and move data to where it is in greatest demand. [Less]

808K lines of code

8 current contributors

about 1 month since last commit

26 users on Open Hub

High Activity
4.63636
   
I Use This

strongSwan

Compare

  Analyzed 2 days ago

strongSwan is an open source IPsec-based VPN solution. It features IKEv1 and IKEv2 keying capabilities and runs on Linux, Android, FreeBSD, macOS, iOS and Windows.

467K lines of code

14 current contributors

5 days since last commit

25 users on Open Hub

Moderate Activity
4.8
   
I Use This

libgcrypt

Compare

  Analyzed 2 days ago

Libgcrypt is a general purpose crypto library based on the code used in GnuPG.

266K lines of code

7 current contributors

10 days since last commit

25 users on Open Hub

Moderate Activity
3.5
   
I Use This

Apache Shiro

Compare

Claimed by Apache Software Foundation Analyzed 4 days ago

Apache Shiro is an easy-to-use application security framework that cleanly handles authentication, authorization, enterprise session management and cryptography. Our mission: To provide the most robust and comprehensive application security framework available while also being very easy to understand and extremely simple to use.

121K lines of code

12 current contributors

11 days since last commit

23 users on Open Hub

High Activity
4.42857
   
I Use This

Openwall - John the Ripper

Compare

  Analyzed about 5 hours ago

John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most ... [More] commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches. [Less]

16.4K lines of code

1 current contributors

over 4 years since last commit

23 users on Open Hub

Inactive
4.0
   
I Use This

I2P

Compare

  Analyzed 2 days ago

I2P is an anonymous network, exposing a simple layer that applications can use to anonymously and securely send messages to each other. The network itself is strictly message based (ala IP), but there is a library available to allow reliable streaming communication on top of it (ala TCP). All ... [More] communication is end to end encrypted (in total there are four layers of encryption used when sending a message), and even the end points ("destinations") are cryptographic identifiers (essentially a pair of public keys). [Less]

414K lines of code

8 current contributors

3 days since last commit

17 users on Open Hub

High Activity
4.14286
   
I Use This
Licenses: bsd, mit, Public_Do...

KeePassXC

Compare

  Analyzed 2 days ago

KeePassXC is a cross-platform community fork of KeePassX. Our goal is to extend and improve it with new features and bugfixes to provide a feature-rich, fully cross-platform and modern open-source password manager.

576K lines of code

81 current contributors

5 days since last commit

14 users on Open Hub

High Activity
4.0
   
I Use This
Licenses: BSD_License, boost, cc0-1

Monero

Compare

  Analyzed 11 days ago

Monero: the secure, private, untraceable cryptocurrency

1.23M lines of code

131 current contributors

about 1 month since last commit

12 users on Open Hub

High Activity
4.33333
   
I Use This