Showing 194 open source projects for "secured"

View related business solutions
  • Rezku Point of Sale Icon
    Rezku Point of Sale

    Designed for Real-World Restaurant Operations

    Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
    Learn More
  • Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight Icon
    Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight

    Lock Down Any Resource, Anywhere, Anytime

    CLEAR by Quantum Knight is a FIPS-140-3 validated encryption SDK engineered for enterprises requiring top-tier security. Offering robust post-quantum cryptography, CLEAR secures files, streaming media, databases, and networks with ease across over 30 modern platforms. Its compact design, smaller than a single smartphone image, ensures maximum efficiency and low energy consumption.
    Learn More
  • 1
    Talos Linux

    Talos Linux

    Talos Linux is a modern Linux distribution built for Kubernetes

    ...It only takes 3 minutes to launch a Talos cluster on your laptop inside Docker. Talos reduces your attack surface. It's minimal, hardened and immutable. All API access is secured with mutual TLS (mTLS) authentication. Talos eliminates configuration drift, reduces unknown factors by employing immutable infrastructure ideology, and delivers atomic updates. Talos simplifies your architecture, increases your agility, and always delivers current stable Kubernetes and Linux versions. Talos consists of only a handful of binaries and shared libraries: just enough to run containerd and a small set of system services.
    Downloads: 72 This Week
    Last Update:
    See Project
  • 2
    Ghostunnel

    Ghostunnel

    A simple SSL/TLS proxy with mutual authentication

    Ghostunnel is a simple TLS proxy with mutual authentication support for securing non-TLS backend applications. Ghostunnel supports two modes, client mode and server mode. Ghostunnel in server mode runs in front of a backend server and accepts TLS-secured connections, which are then proxied to the (insecure) backend. A backend can be a TCP domain/port or a UNIX domain socket. Ghostunnel in client mode accepts (insecure) connections through a TCP or UNIX domain socket and proxies them to a TLS-secured service. In other words, ghostunnel is a replacement for stunnel. Ghostunnel is developed primarily for Linux and Darwin (macOS), although it should run on any UNIX system that exposes SO_REUSEPORT, including FreeBSD, OpenBSD and NetBSD. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 3
    shadowsocks-libev

    shadowsocks-libev

    Bug-fix-only libev port of shadowsocks

    Shadowsocks-libev is a lightweight secured SOCKS5 proxy for embedded devices and low-end boxes. Shadowsocks-libev is written in pure C and depends on libev. It's designed to be a lightweight implementation of shadowsocks protocol, in order to keep the resource usage as low as possible. Snap is the recommended way to install the latest binaries. You can build shadowsocks-libev and all its dependencies by script.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 4
    Kafdrop

    Kafdrop

    Kafka Web UI

    ...This project is a reboot of Kafdrop 2.x, dragged kicking and screaming into the world of Java 17+, Kafka 2.x, Helm and Kubernetes. It's a lightweight application that runs on Spring Boot and is dead-easy to configure, supporting SASL and TLS-secured brokers.
    Downloads: 33 This Week
    Last Update:
    See Project
  • Iris Powered By Generali - Iris puts your customer in control of their identity. Icon
    Iris Powered By Generali - Iris puts your customer in control of their identity.

    Increase customer and employee retention by offering Onwatch identity protection today.

    Iris Identity Protection API sends identity monitoring and alerts data into your existing digital environment – an ideal solution for businesses that are looking to offer their customers identity protection services without having to build a new product or app from scratch.
    Learn More
  • 5
    Telegram Drive

    Telegram Drive

    Telegram Drive

    Telegram Drive is a powerful utility that enables you to organize your telegram files and much more. Teldrive stands out among similar tools, thanks to its implementation in Go, a language known for its efficiency. Its performance surpasses alternatives written in Python and other languages, with the exception of Rust. Teldrive not only excels in speed but also offers an intuitive user interface for efficient file interaction which other tool lacks. Its compatibility with Rclone further...
    Downloads: 52 This Week
    Last Update:
    See Project
  • 6
    Element

    Element

    A glossy Matrix collaboration client for the web

    ...It offers teams, friends and organizations a secure, all in one chat app that is protected from pesky ads and data mining methods. All communications are done through the open global Matrix network, secured with end-to-end encryption. Element gives you all the services you need from a chat app: group chat, video calls, file sharing and more-- all done securely and in total privacy. Element has three different tiers of support for different environments, the most supported being the latest versions of Chrome, Firefox, and Safari on desktop OSes.
    Downloads: 32 This Week
    Last Update:
    See Project
  • 7
    OneKey

    OneKey

    Secure, open source and community driven crypto wallet

    ...OneKey is your smartest choice to secure, buy, exchange and grow your crypto assets. Use OneKey App separately to store and use your crypto assets in a secure and convenient manner. Each user's assets are appropriately secured and stored locally. Hardware wallets take the security of digital assets to another level. From physically isolating hackers to preventing Trojan horses and software attacks. All transfers must be approved by the hardware wallet, so you don't have to worry about the loss or theft of your mobile phone. No matter what platform you prefer, iOS, Android, macOS, Windows, Linux or even ChromeOS, we support it all. ...
    Downloads: 42 This Week
    Last Update:
    See Project
  • 8
    Home Assistant Companion for Android

    Home Assistant Companion for Android

    Home Assistant Companion for Android

    Control and monitor your home from anywhere in the world. Home Assistant Companion lets you control all your devices and provides advanced location and notification engines to allow for complex automation. Home Assistant is an open-source home automation platform that focuses on local control and privacy.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 9
    Strimzi

    Strimzi

    Apache Kafka® running on Kubernetes

    ...For production you can tailor the cluster to your needs, using features such as rack awareness to spread brokers across availability zones, and Kubernetes taints and tolerations to run Kafka on dedicated nodes. You can expose Kafka outside Kubernetes using NodePort, Load balancer, Ingress and OpenShift Routes, depending on your needs, and these are easily secured using TLS. The Kube-native management of Kafka is not limited to the broker. You can also manage Kafka topics, users, Kafka MirrorMaker and Kafka Connect using Custom Resources. This means you can use your familiar Kubernetes processes and tooling to manage complete Kafka applications.
    Downloads: 27 This Week
    Last Update:
    See Project
  • Award-Winning Medical Office Software Designed for Your Specialty Icon
    Award-Winning Medical Office Software Designed for Your Specialty

    Succeed and scale your practice with cloud-based, data-backed, AI-powered healthcare software.

    RXNT is an ambulatory healthcare technology pioneer that empowers medical practices and healthcare organizations to succeed and scale through innovative, data-backed, AI-powered software.
    Learn More
  • 10
    Monero

    Monero

    Secure, Private Digital Currency

    Monero is a secure, private, untraceable cryptocurrency. It is decentralized-- dependent on a distributed peer-to-peer consensus network where every transaction is cryptographically secured. With Monero you are your own bank, you control your funds and can spend safely. No one else can see your balances, track your transfers or any other transactions unless you allow them to. Monero uses ring signatures, ring confidential transactions, and stealth addresses making it absolutely private and untraceable. No transactions can ever be linked to a particular user or real-world identity. ...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 11
    Syncthing for macOS

    Syncthing for macOS

    Official frugal and native macOS Syncthing application bundle

    ...None of your data is ever stored anywhere else other than on your computers. There is no central server that might be compromised, legally or illegally. All communication is secured using TLS. The encryption used includes perfect forward secrecy to prevent any eavesdropper from ever gaining access to your data. Every device is identified by a strong cryptographic certificate. Only devices you have explicitly allowed can connect to your other devices.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 12
    HSD

    HSD

    Handshake Daemon & full node

    Handshake is a decentralized, permissionless naming protocol where every peer is validating and in charge of managing the root DNS naming zone with the goal of creating an alternative to existing Certificate Authorities and naming systems. Names on the internet (top level domains, social networking handles, etc.) ultimately rely upon centralized actors with full control over a system that are relied upon to be honest, as they are vulnerable to hacking, censorship, and corruption. Handshake...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 13
    Cy

    Cy

    Hackers terminal browser of Cyber blockchains

    ...Bostrom is the name of the consensus computer that maintains a general-purpose, permissionless informational graph where nodes are CIDs of files in the IPFS network, and edges are Cyberlinks (consisting of source, destination, author, height - records) written into the blockchain. The information written into the blockchain is secured to remain in existence as long as the blockchain is operative. The blockchain is designed with economic incentives that motivate validators to sustain the network. For further information about Cyber blockchains, please refer to Bostrom Journal.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 14
    syncthing-android

    syncthing-android

    Wrapper of syncthing for Android

    ...None of your data is ever stored anywhere else other than on your computers. There is no central server that might be compromised, legally or illegally. All communication is secured using TLS. The encryption used includes perfect forward secrecy to prevent any eavesdropper from ever gaining access to your data. Every device is identified by a strong cryptographic certificate. Only devices you have explicitly allowed can connect to your other devices.
    Downloads: 19 This Week
    Last Update:
    See Project
  • 15
    Qtum

    Qtum

    Qtum Core Wallet

    Qtum is a decentralized blockchain project built on Bitcoin's UTXO model, with support for Ethereum Virtual Machine-based smart contracts, and secured by a proof of stake consensus model. It achieves this through the revolutionary Account Abstraction Layer which allows the EVM to communicate with Qtum's Bitcoin-like UTXO blockchain. Welcome to the Qtum Ignition Main Network. This is the main network where the tokens hold value and should be guarded very carefully. If you are testing the network or developing unstable software on Qtum, we highly recommend using either testnet or regtest mode. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 16
    DefraDB

    DefraDB

    DefraDB is a Peer-to-Peer Edge Database

    ...By leveraging peer-to-peer networking it can be deployed nimbly in novel topologies. Access control is determined by a relationship-based DSL, supporting document or field-level policies, secured by the SourceHub network. DefraDB is a core part of the Source technologies that enable new paradigms of decentralized data and access-control management, user-centric apps, data trustworthiness, and much more.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 17
    uAgents

    uAgents

    A fast and lightweight framework for creating decentralized agents

    uAgents is a library developed by Fetch.ai that allows for creating autonomous AI agents in Python. With simple and expressive decorators, you can have an agent that performs various tasks on a schedule or takes action on various events.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    Kanidm

    Kanidm

    Kanidm: A simple, secure, and fast identity management platform

    Kanidm is a simple and secure identity management platform, allowing other applications and services to offload the challenge of authenticating and storing identities to Kanidm. The goal of this project is to be a complete identity provider, covering the broadest possible set of requirements and integrations. You should not need any other components (like Keycloak) when you use Kanidm - we already have everything you need. To achieve this we rely heavily on strict defaults, simple...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 19
    UALinux

    UALinux

    Software and technical support. Secured operating system.

    Leader badge
    Downloads: 812 This Week
    Last Update:
    See Project
  • 20
    Wesh Network Toolkit

    Wesh Network Toolkit

    Async Mesh Network Protocol for Extreme Communication

    With Wesh's toolkit, building p2p apps has never been simpler. Wesh network is a decentralized extreme communication protocol. Wesh provides a secured, distributed and asynchronous communication protocol, both with or without internet access using IPFS and direct transports such as BLE and proximity drivers. Wesh Protocol provides end-to-end encryption and perfect forward secrecy for all the exchanged messages. Distributed p2p transmissions and hosting over IPFS powered by CRDT algorithm. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 21
    Home Assistant for Apple Platforms

    Home Assistant for Apple Platforms

    Home Assistant for Apple platforms

    ...Home Assistant is an open-source home automation platform that focuses on local control and privacy. Home Assistant Companion requires a configured Home Assistant instance. The instance must use Home Assistant Cloud or be accessible from the Internet and secured with a valid, non-self-signed, SSL certificate for location tracking. Basic notifications work without external access.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22
    Laravel Translation Manager

    Laravel Translation Manager

    Manage Laravel translation files

    ...The tool supports scanning your codebase for new translation keys, organizing them by groups, and highlighting missing or untranslated entries. It has been around for multiple Laravel versions and is widely referenced in the community, though like any admin-style package it must be kept updated and secured properly when exposed in production.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 23
    KubeEdge

    KubeEdge

    Kubernetes Native Edge Computing Framework (project under CNCF)

    ...With KubeEdge it is easy to get and deploy existing complicated machine learning, image recognition, event processing, and other high-level applications to the Edge. With business logic running at the Edge, much larger volumes of data can be secured & processed locally where the data is produced. With data processed at the Edge, the responsiveness is increased dramatically and data privacy is protected.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Magic Framework

    Magic Framework

    Generate a CRUD app wrapping your database in seconds

    ...Below is a screenshot of an app built in 5 minutes using our no-code CRUD generator. Magic works by reading meta data from your database, for then to automatically generating a complete backend no-code CRUD API for you. The resulting CRUD API is secured automatically, and Magic takes care of authentication, authorization, user management, and everything else that's difficult. Afterward, you can optionally generate a CRUD Datagrid giving you a full-stack web app as the screenshot illustrates.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Tiny Password Manager

    Password Manager in a Single Source File

    Password Manager in a Single Source File
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB