Best Free and Open Source Software – Security

Last Updated on June 30, 2024

Security Software
Anti-malwareAnti-Malware Tools - Programs used to prevent, detect, and remove malware. The most common types of malware include viruses, worms, trojans, ransomware, bots or botnets, adware, spyware, rootkits, fileless malware, and malvertising.
Data Hashing (Graphical) -- Data Hashing (CLI) - Hashing is the process of passing data through a formula to produce a condensed fixed-value representation, called a hash value.
ForensicsDigital Forensics - Digital forensics is a specialist art. It allows investigations to be undertaken without modifying the media. Being able to preserve and analyze data in a safe and non-destructive way is crucial when using digital evidence as part of an investigation, and even more so when a legal audit trail needs to be maintained.
Disk EncryptionDisk Encryption - Disk encryption is one method to help minimise data breaches by preventing unauthorized access to data storage, to ensure safe information exchanges, safeguard against data leakage, and manage compliance.
Email EncryptionEmail Encryption Tools - Sending encrypted messages is one method of ensuring electronic privacy. By encrypting messages, this will help to keep your precious information safe by making messages look like garbled text to uninvited onlookers. Encrypting email may sound a little daunting, but it’s actually simple with the right software.
FirewallFirewall Distros - These are network security systems, acting like a security guard between internal and external networks.
Firewall Tools - The firewall controls incoming and outgoing network traffic using security rules. The rules specify which connections you want to allow and the ports and zones through which the connection can be established.
Host Intrusion DetectionHost-Based Intrusion Detection Systems - An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. A system that monitors important operating system files is an example of an Host-Based Intrusion Detection System.
Network Analyzers
Network Analyzers - A network analyzer (also known as a packet analyzer, packet sniffer, or protocol analyzer) is software that intercepts and logs traffic that passes over a computer network or part of a network.
Network Authentication ServersNetwork Authentication Tools - Connection authentication, authorization, and accounting management. This article will interest educational institutions, internet service providers, and other commercial organizations.
Network IntrusionNetwork Intrusion Detection Systems - An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. A system that detects malicious traffic on a network is an example of an Network Intrusion Detection System.
Passive OS FingerprintingPassive OS Fingerprinting - used for reconnaissance during penetration tests, routine network monitoring, detection of unauthorized network interconnects in corporate environments, providing signals for abuse-prevention tools, and more.
Port Scanners Port Scanners: Graphical Port Scanners and Terminal-Based Port Scanners - A port scanner is a utility which probes a server or host to verify if the virtual ports of a system are open or closed. Ports allow different applications on the same computer to share network resources simultaneously.
Steganography - These tools conceal messages in other messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
Vulnerability detectionVulnerability Detection - These tools are critical for ensuring that any threats that may have made it past the firewall are picked up before they can infect and undermine entire networks.
FirewallWeb Application Firewalls - A web application firewall (WAF) is a type of application firewall that lets you see and analyze HTTP traffic to and from a web application.
Wireless SecurityWireless Security - We cover software that’s useful for penetration testing and security assessment. Target users include security professionals and pentesters.
Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments