Tags : Browse Projects

Select a tag to browse associated projects and drill deeper into the tag cloud.

FreeIPA

Compare

  Analyzed 4 months ago

FreeIPA is an integrated solution which combines the following technologies: * 389 Directory Server * MIT Kerberos * NTP * DNS * Web and command-line provisioning and administration tools

405K lines of code

39 current contributors

4 months since last commit

15 users on Open Hub

Activity Not Available
4.0
   
I Use This

ApacheWhisker

Compare

Claimed by Apache Software Foundation Analyzed about 1 year ago

Apache Whisker assists assembled applications maintain correct legal documentation. Whisker is part of the Apache Creadur suite of tools for auditing and comprehending software distributions. Whisker can be used from the command line or as a plugin for Apache Maven.

40.2K lines of code

1 current contributors

about 1 year since last commit

9 users on Open Hub

Activity Not Available
0.0
 
I Use This

CDO Model Repository

Compare

Claimed by Eclipse Foundation Analyzed 6 days ago

CDO Model Repository ===================== CDO is both a development-time model repository and a run-time persistence framework. Being highly optimized it supports object graphs of arbitrary size. CDO offers transactions with save points, explicit locking, change notification, queries ... [More] , temporality, branching, merging, offline and fail-over modes, ... The storage back-end is pluggable and migrations between direct JDBC, Hibernate, Objectivity/DB, MongoDB or DB4O are seamless for CDO applications. [Less]

2.38M lines of code

1 current contributors

14 days since last commit

8 users on Open Hub

Moderate Activity
4.72727
   
I Use This

Envers

Compare

  Analyzed over 2 years ago

The Envers project makes it simple to version entities. The only thing required is annotating them with @Versioned. Storing historical data (versions) is completely transparent to the developer. He/she may interact with the entities as always. Not only basic properties of an entity can be ... [More] versioned, but also relations, making it possible to view parts of the database as they were at a given revision (each revision has an associated timestamp, one revision = one transaction, in which versioned data has changed). Moreover, Envers provides a straightforward interface for retrieving historical data, a criteria-like query interface, and the possibility to store additional information alongside each revision. Envers works with Hibernate and Hibernate Entity Manager. [Less]

22K lines of code

0 current contributors

almost 14 years since last commit

7 users on Open Hub

Activity Not Available
5.0
 
I Use This

Apache Rat

Compare

Claimed by Apache Software Foundation Analyzed about 1 year ago

Release Audit Tool (RAT) is a tool to improve accuracy and efficiency when checking releases. It is heuristic in nature: making guesses about possible problems. It will produce false positives and cannot find every possible issue with a release. It's reports require interpretation. RAT was ... [More] developed in response to a need felt in the Apache Incubator to be able to review releases for the most common faults less labour intensively. It is therefore highly tuned to the Apache style of releases. [Less]

27.5K lines of code

0 current contributors

about 1 year since last commit

4 users on Open Hub

Activity Not Available
5.0
 
I Use This

Lynis

Compare

Claimed by CISOfy Analyzed 3 months ago

Lynis is an auditing tool for systems running Linux, BSD, or other Unix derivatives. It performs a security scan and determines the hardening state of the machine. Any detected security issues will be provided in the form of a suggestion or warning. Beside security related information it will also ... [More] scan for general system information, installed packages, and possible configuration errors. This software assists with automated auditing, compliance audits (PCI DSS, HIPAA, etc), system hardening, software patch management, vulnerability detection, and malware scanning. It can be run without prior installation. Lynis is typically used by system administrators and security professionals. [Less]

20.2K lines of code

28 current contributors

3 months since last commit

2 users on Open Hub

Activity Not Available
5.0
 
I Use This

opencount

Compare

  Analyzed over 2 years ago

Tools to count votes on paper ballots

0 lines of code

0 current contributors

0 since last commit

2 users on Open Hub

Activity Not Available
5.0
 
I Use This
Mostly written in language not available
Licenses: BSD-3-Clause

Fedora Security Lab

Compare

  Analyzed 2 days ago

The Fedora Security Spin provides a safe test environment to work on security auditing, forensics, system rescue and teaching security testing methodologies in universities and other organizations. The spin is maintained by a community of security testers and developers. It comes with the clean ... [More] and fast LXDE Desktop Environment and a customized menu that provides all the instruments needed to follow a proper test path for security testing or to rescue a broken system. The Live image has been crafted to make it possible to install software while running, and if you are running it from a USB stick created with LiveUSB Creator using the overlay feature, you can install and update software and save your test results permanently. [Less]

8.24K lines of code

0 current contributors

5 months since last commit

1 users on Open Hub

Very Low Activity
0.0
 
I Use This

log4jscanwin

Compare

  Analyzed about 15 hours ago

Log4j Vulnerability Scanner for Windows

212K lines of code

0 current contributors

4 months since last commit

1 users on Open Hub

New Project
0.0
 
I Use This
Licenses: No declared licenses

Api-do

Compare

  Analyzed over 2 years ago

Api-do is a collection of tools inspired by and extending Joshua Wright's original KillerBee. It is a martial art aspect of ZigBee networking apiculture: the Way of the Bee. The goal is to produce methods and tools for accessing security of ZigBee and other IEEE 802.15.4 deployments and/or ... [More] implementations. Specifically, the project seeks to advance the state-of-the-art in device discovery and enumeration, geographical mapping, fingerprinting, and exploitation, while providing recommendations for remediation. “Security will not get better until tools for practical exploration of the attack surface are made available.” ("Wright's law", Joshua Wright) This project originated from the ZigBee/802.15.4 security research at the Dartmouth Trust Lab. [Less]

0 lines of code

0 current contributors

0 since last commit

1 users on Open Hub

Activity Not Available
0.0
 
I Use This
Mostly written in language not available
Licenses: BSD-3-Clause