Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security daemon
daemon
x
security
x
33 search results found
Cis Docker Benchmark
⭐
438
CIS Docker Benchmark - InSpec Profile
Bpfd
⭐
402
Framework for running BPF programs with rules on Linux as a daemon. Container aware.
Gsa
⭐
196
Greenbone Security Assistant - The web frontend for the Greenbone Community Edition
Fapolicyd
⭐
179
File Access Policy Daemon
Haaukins
⭐
176
A Highly Accessible and Automated Virtualization Platform for Security Education
Particl Desktop
⭐
164
The GUI application for Particl Markeplace and PART coin wallet. A decentralized peer to peer marketplace –free, secure, private, untraceable.
Openbsm
⭐
140
OpenBSM open audit implementation
Reserved Email Addresses List
⭐
139
List of 1250+ generic, admin, mailer-daemon, and no-reply usernames reserved for security concerns. Made for @forwardemail.
Ncdns
⭐
126
🌐 Namecoin to DNS bridge daemon
Bolt
⭐
122
⚡🐧 - Thunderbolt 3 device manager | This is a MIRROR of bolt from fd.o
Dnss
⭐
116
DNS over HTTPS [mirror]
Tarssh
⭐
102
A simple SSH tarpit inspired by endlessh
Gate
⭐
96
Benign remote code execution
Yubikeylockd
⭐
78
Simple daemon for locking and unlocking macOS with Yubikey
Spin
⭐
73
SPIN Core Software
Drydock
⭐
58
drydock provides a flexible way of assessing the security of your Docker daemon configuration and containers using editable audit templates
Lbry.tech
⭐
45
Technical documentation website for the LBRY protocol
Cetusguard
⭐
36
CetusGuard is a tool that protects the Docker daemon socket by filtering calls to its API endpoints.
Rvrrpd
⭐
34
A lightweight, fast, and highly secure VRRP daemon.
Desktop App Daemon
⭐
31
Official IVPN Desktop app (service)
Gpumagic
⭐
29
A C++ Nix AMD Graphics Card Control Server And Client
Fyne Opensnitch
⭐
28
An OpenSnitch UI in Go using Fyne
Desktop App Ui
⭐
26
Official IVPN Desktop app (legacy version)
Ebph
⭐
20
ebpH (Extended BPF Process Homeostasis) monitors process behavior on your system to establish normal behavioral patterns. ebpH reports anomalous behavior and prevents attacks by denying anoamlous access requests.
Desktop App Cli
⭐
19
Official IVPN command-line interface (CLI)
Shithub
⭐
9
ShitHub is a collaborative platform, created to check your own and/or foreign code for security vulnerabilitys and design issues.
Dpow Blur
⭐
8
A rewrite of Komodo's Delayed Proof of Work mechanism for compatibility with The Blur Network (BLUR) and, by extension, all RingCT-capable coins. An attempt at the first-ever cross-chain security mechanism between XMR, ZEC, and BTC worlds.
Libslack
⭐
8
A UNIX/C library of general utilities for programmers with Slack
Tlspool
⭐
6
TLS daemon with PKCS #11 backend
Privacyfocusedlinux
⭐
5
An Ubuntu-Minimal script which keeps privacy and security in mind. Fully open-sourced and well-explained. Look at 'README.md' for more information!
Sssd
⭐
5
System Security Services Daemon
Zaproxy
⭐
5
Kxd
⭐
5
[mirror] Key exchange daemon
Related Searches
Security Vulnerabilities (11,840)
Laravel Security (11,580)
Php Security (10,611)
Html Security (2,284)
Python Security (1,733)
Python Daemon (1,463)
Golang Security (1,316)
Shell Security (1,213)
C Daemon (1,142)
Javascript Daemon (931)
1-33 of 33 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.