Tracked OSS projects

As part of the Be-Secure project, the community will be tracking the following projects –


Hyperledger Fabric

no image
Blockchain solutions | DA

Hyperledger Fabric delivers a uniquely elastic and extensible architecture, distinguishing it from alternative blockchain solutions. Planning for the future of enterprise blockchain requires building on top of a fully-vetted, open source architecture; Hyperledger Fabric is your starting point. This project is an Active Hyperledger project. Hyperledger Fabric is a platform for distributed ledger solutions, underpinned by a modular architecture delivering high degrees of confidentiality, resiliency, flexibility and scalability. It is designed to support pluggable implementations of different components, and accommodate the complexity and intricacies that exist across the economic ecosystem.

LEARN MORE >>

Hyperledger Indy

no image
Blockchain solutions | DA

This is the official SDK for Hyperledger Indy, which provides a distributed-ledger-based foundation for self-sovereign identity. Indy provides a software ecosystem for private, secure, and powerful identity, and the Indy SDK enables clients for it. The major artifact of the SDK is a C-callable library; there are also convenience wrappers for various programming languages and Indy CLI tool. All bugs, stories, and backlog for this project are managed through Hyperledger's Jira in project IS (note that regular Indy tickets are in the INDY project instead.)

LEARN MORE >>

Hyperledger BESU

no image
Blockchain solutions | DA

Besu is an Apache 2.0 licensed, MainNet compatible, Ethereum client written in Java.

LEARN MORE >>

Hyperledger Sawtooth

no image
Blockchain solutions | DA

Hyperledger Sawtooth is an enterprise solution for building, deploying, and running distributed ledgers (also called blockchains). It provides an extremely modular and flexible platform for implementing transaction-based updates to shared state between untrusted parties coordinated by consensus algorithms.

LEARN MORE >>

Hyperledger BURROW

no image
Blockchain solutions | DA

Hyperledger Burrow is a permissioned Ethereum smart-contract blockchain node. It executes Ethereum EVM and WASM smart contract code (usually written in Solidity) on a permissioned virtual machine. Burrow provides transaction finality and high transaction throughput on a proof-of-stake Tendermint consensus engine.

LEARN MORE >>

Hyperledger IROHA

no image
Blockchain solutions | DA

Iroha is a straightforward distributed ledger technology (DLT), inspired by Japanese Kaizen principle — eliminate excessiveness (muri). Iroha has essential functionality for your asset, information and identity management needs, at the same time being an efficient and trustworthy crash fault-tolerant tool for your enterprise needs.

LEARN MORE >>

Hyperledger ARIES

no image
Blockchain solutions | DA

Hyperledger Aries allows trusted online peer-to-peer interactions based on decentralized identities and verifiable credentials. Aries includes a protocol definition, tools, and reference implementations. The Aries protocol supports identities rooted in a variety of distributed ledgers or blockchains. This approach to identity is often called Self Soverign Identity (SSI).

LEARN MORE >>

Hyperledger CACTUS

no image
Blockchain solutions | DA

Hyperledger Cactus aims to provide Decentralized, Secure and Adaptable Integration between Blockchain Networks. Hyperledger Cactus is currently undergoing a major refactoring effort to enable the desired to-be architecture which will enable plug-in based collaborative development to increase the breadth of use cases & Ledgers supported.

LEARN MORE >>

Hyperledger CELLO

no image
Blockchain solutions | DA

Hyperledger Cello is a blockchain provision and operation system, which helps manage blockchain networks in an efficient way.

LEARN MORE >>

Hyperledger CALIPER

no image
Blockchain solutions | DA

Caliper is a blockchain performance benchmark framework, which allows users to test different blockchain solutions with predefined use cases, and get a set of performance test results.

LEARN MORE >>

DefectDojo

no image
Vulnerability management tool | S

DefectDojo is a security program and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, triage vulnerabilities and push findings into defect trackers.

LEARN MORE >>

OWASP Zed Attack Proxy

no image
security tool | S

The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by a dedicated international team of volunteers. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. It's also a great tool for experienced pentesters to use for manual security testing

LEARN MORE >>

BeEF

no image
Browser Exploitation Framework | S

BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.

LEARN MORE >>

OpenDXL Ontology

no image
Interoperable cybersecurity messaging | S

The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the OpenDXL messaging bus.

LEARN MORE >>

CS-Suite

no image
AWS infrastructure auditing tool | S

CS Suite is a one stop tool for auditing the security posture of the AWS infrastructure and does system audits as well. CS Suite leverages current open source tools capabilities and has other missing checks added into one tool to rule them all.

LEARN MORE >>

STIX-shifter

Python library | S

STIX-shifter is an open source python library allowing software to connect to products that house data repositories by using STIX Patterning, and return results as STIX Observations

LEARN MORE >>

openscap

no image
SCAP document scanner | S

The oscap program is a command line tool that allows users to load, scan, validate, edit, and export SCAP documents.

LEARN MORE >>

fuzzbench

Fuzzing research evaluator | S

FuzzBench is a free service that evaluates fuzzers on a wide variety of real-world benchmarks, at Google scale. The goal of FuzzBench is to make it painless to rigorously evaluate fuzzing research and make fuzzing research easier for the community to adopt.

LEARN MORE >>

ghidra

no image
Software reverse engineering (SRE) framework | S

Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, macOS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features.

LEARN MORE >>

differential-privacy

Repository tool | S

This repository contains libraries to generate ε- and (ε, δ)-differentially private statistics over datasets

LEARN MORE >>

Syncope

no image
Digital identity manager | S

Apache Syncope is an Open Source system for managing digital identities in enterprise environments, implemented in Java EE technology and released under Apache 2.0 license.

LEARN MORE >>

pritunl-zero

no image
Authentication system | S

Pritunl-Zero is a zero trust system that provides secure authenticated access to internal services from untrusted networks without the use of a VPN.

LEARN MORE >>

Pacu

no image
AWS exploitation framework | S

Pacu is an open-source AWS exploitation framework, designed for offensive security testing against cloud environments. Created and maintained by Rhino Security Labs, Pacu allows penetration testers to exploit configuration flaws within an AWS account, using modules to easily expand its functionality.

LEARN MORE >>

Nmap

no image
Network scanner | S

Nmap is released under a custom license, which is based on (but not compatible with) GPLv2. The Nmap license allows free usage by end users, and we also offer a commercial license for companies that wish to redistribute Nmap technology with their products.

LEARN MORE >>

TRASA

Access control | S

TRASA is a unified access control platform with identity-aware access proxy, privileged access management, two-factor authentication, device trust, and access policy features that enable secure remote access to Web, SSH, RDP, and Database services

LEARN MORE >>

Kestrel

Web server | A

Kestrel threat hunting language provides an abstraction for threat hunters to focus on what to hunt instead of how to hunt. The abstraction makes it possible to codify resuable hunting knowledge in a composable and sharable manner.

LEARN MORE >>

Snort

Intrusion Prevention System | S

Snort 3 is the next generation Snort IPS (Intrusion Prevention System). This file will show you what Snort++ has to offer and guide you through the steps from download to demo

LEARN MORE >>

CSET

no image
Security Evaluation Tool | S

The Cyber Security Evaluation Tool (CSET®) is a Department of Homeland Security (DHS) product that assists organizations in protecting their key national cyber assets. It was developed by cybersecurity experts under the direction of CISA. The tool provides users with a systematic and repeatable approach to assessing the security posture of their cyber systems and networks

LEARN MORE >>

Malcolm

no image
Network analyzer | S

Malcolm is a powerful network traffic analysis tool suite

LEARN MORE >>

CTI

Repository tool | S

This repository contains the MITRE ATT&CK® and CAPEC™ datasets expressed in STIX 2.0. See USAGE or USAGE-CAPEC for information on using this content with python-stix2.

LEARN MORE >>

OSSEC

Platform for monitor | S

OSSEC is a full platform to monitor and control your systems. It mixes together all the aspects of HIDS (host-based intrusion detection), log monitoring and SIM/SIEM together in a simple, powerful and open source solution

LEARN MORE >>

Zeek

no image
Network tool | S

A powerful framework for network traffic analysis and security monitoring.

LEARN MORE >>

Security Onion Solutions

no image
Security Onion maintainer | S

Security Onion Solutions, LLC is the creator and maintainer of Security Onion, a free and open platform for threat hunting, network security monitoring, and log management. Security Onion includes best-of-breed free and open tools including Suricata, Zeek, Wazuh, the Elastic Stack and many others

LEARN MORE >>

OpenCTI

Security threat manager | S

OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. It has been created in order to structure, store, organize and visualize technical and non-technical information about cyber threats.

LEARN MORE >>

Croc

no image
File transfer | S

croc is a tool that allows any two computers to simply and securely transfer files and folders.

LEARN MORE >>

Security Monkey

no image
AWS monitor | S

Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. Support is available for OpenStack public and private clouds. Security Monkey can also watch and monitor your GitHub organizations, teams, and repositories.

LEARN MORE >>

Scorecard

no image
Automated analyzer | S

Automate analysis and trust decisions on the security posture of open source projects.

LEARN MORE >>

Syft

SBOM Generator | S

A CLI tool and go library for generating a Software Bill of Materials (SBOM) from container images and filesystems. Exceptional for vulnerability detection when used with a scanner tool like Grype.

LEARN MORE >>

Grype

Vulnerability scanner | S

A vulnerability scanner for container images and filesystems. Easily install the binary to try it out. Works with Syft, the powerful SBOM (software bill of materials) tool for container images and filesystems.

LEARN MORE >>

Emmy

no image
Protocols Library | S

Emmy is a library for building protocols/applications based on zero-knowledge proofs, for example anonymous credentials. Zero-knowledge proofs are client-server protocols (in crypto terms also prover-verifier, where the prover takes on the role of the client, and the verifier takes on the role of the server) where the client proves a knowledge of a secret without actually revealing the secret

LEARN MORE >>

Threat Dragon

no image
Threat modelling | S

Threat Dragon is a free, open-source, cross-platform threat modelling application including system diagramming and a threat rule engine to auto-generate threats/mitigations. It is an OWASP Incubator Project and follows the values and principles of the threat modeling manifesto. The roadmap for the project is a simple UX, a powerful rule engine and integration with other development lifecycle tools.

LEARN MORE >>

Trivy

no image
Vulnerability scan | S

Trivy (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues. Trivy detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and language-specific packages (Bundler, Composer, npm, yarn, etc.). In addition, Trivy scans Infrastructure as Code (IaC) files such as Terraform, Dockerfile and Kubernetes, to detect potential configuration issues that expose your deployments to the risk of attack.

LEARN MORE >>

OWASP Glue

no image
Framework for Security tools | S

Glue is a framework for running a series of tools. Generally, it is intended as a backbone for automating a security analysis pipeline of tools.

LEARN MORE >>

ModSecurity

no image
Interface for ModSecurity Connectors | S

Libmodsecurity is one component of the ModSecurity v3 project. The library codebase serves as an interface to ModSecurity Connectors taking in web traffic and applying traditional ModSecurity processing. In general, it provides the capability to load/interpret rules written in the ModSecurity SecRules format and apply them to HTTP content provided by your application via Connectors.

LEARN MORE >>

Archery

no image
Vulnerability assessment/management | S

Archery is an opensource vulnerability assessment and management tool which helps developers and pentesters to perform scans and manage vulnerabilities. Archery uses popular opensource tools to perform comprehensive scanning for web application and network. It also performs web application dynamic authenticated scanning and covers the whole applications by using selenium. The developers can also utilize the tool for implementation of their DevOps CI/CD environment.

LEARN MORE >>

Back to top