Open Source Linux Systems Administration Software - Page 2

Systems Administration Software for Linux

View 283 business solutions
  • Premier Construction Software Icon
    Premier Construction Software

    Premier is a global leader in financial construction ERP software.

    Rated #1 Construction Accounting Software by Forbes Advisor in 2022 & 2023. Our modern SAAS solution is designed to meet the needs of General Contractors, Developers/Owners, Homebuilders & Specialty Contractors.
    Learn More
  • Turn traffic into pipeline and prospects into customers Icon
    Turn traffic into pipeline and prospects into customers

    For account executives and sales engineers looking for a solution to manage their insights and sales data

    Docket is an AI-powered sales enablement platform designed to unify go-to-market (GTM) data through its proprietary Sales Knowledge Lake™ and activate it with intelligent AI agents. The platform helps marketing teams increase pipeline generation by 15% by engaging website visitors in human-like conversations and qualifying leads. For sales teams, Docket improves seller efficiency by 33% by providing instant product knowledge, retrieving collateral, and creating personalized documents. Built for GTM teams, Docket integrates with over 100 tools across the revenue tech stack and offers enterprise-grade security with SOC 2 Type II, GDPR, and ISO 27001 compliance. Customers report improved win rates, shorter sales cycles, and dramatically reduced response times. Docket’s scalable, accurate, and fast AI agents deliver reliable answers with confidence scores, empowering teams to close deals faster.
    Learn More
  • 1
    Step Certificates

    Step Certificates

    A private certificate authority (X.509 & SSH) & ACME server

    Open Source step-ca provides the infrastructure, automations, and workflows to securely create and operate a private certificate authority. step-ca makes it easy for developers, operators and security teams to manage certificates for production workloads. Get a public key infrastructure and certificate authority running in minutes. Automate enrollment using ACME, OIDC, one-time tokens, cloud APIs and more. Use systemD timers, daemon mode, cron jobs, CI/CD, and more to automate certificate management. Build and operate systems using secure open standards (e.g. X.509, mTLS, JWT, OAuth, OIDC). step-ca is an online certificate authority for secure, automated certificate management. For people, in exchange for single sign-on ID tokens. For hosts, in exchange for cloud instance identity documents. Whatever your use case, step-ca is easy to use and hard to misuse.
    Downloads: 60 This Week
    Last Update:
    See Project
  • 2
    truffleHog

    truffleHog

    Searches through git repositories for high entropy strings and secrets

    truffleHog searches through git repositories for high entropy strings and secrets, digging deep into commit history. TruffleHog runs behind the scenes to scan your environment for secrets like private keys and credentials, so you can protect your data before a breach occurs. Secrets can be found anywhere, so TruffleHog scans more than just code repositories, including SaaS and internally hosted software. With support for custom integrations and new integrations added all the time, you can secure your secrets across your entire environment. TruffleHog is developed by a team entirely comprised of career security experts. Security is our passion and primary concern, and all features are developed with best practices in mind. TruffleHog enables you to track and manage secrets within our intuitive management interface, including links to exactly where secrets have been found. TruffleHog runs quietly in the background, continuously scanning your environment for secrets.
    Downloads: 54 This Week
    Last Update:
    See Project
  • 3
    Nagios Open Source

    Nagios Open Source

    Nagios Open Source network monitoring software - The Standard In ITM

    Nagios network monitoring software is a powerful, enterprise-class host, server, application, and network monitoring tools. Designed to be fast, flexible, and rock-solid stable. Nagios runs on *NIX hosts and can monitor Windows, Linux/Unix/BSD, Netware, and network devices.
    Leader badge
    Downloads: 186 This Week
    Last Update:
    See Project
  • 4
    ORY Oathkeeper

    ORY Oathkeeper

    A cloud native Identity & Access Proxy / API (IAP)

    ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. The BeyondCorp Model is designed by Google and secures applications in Zero-Trust networks. An Identity & Access Proxy is typically deployed in front of (think API Gateway) web-facing applications and is capable of authenticating and optionally authorizing access requests. The Access Control Decision API can be deployed alongside an existing API Gateway or reverse proxy. Ory offers a support plan for Ory Network Hybrid, including Ory on private cloud deployments. If you have a self-hosted solution and would like help, consider a support plan! The team at Ory has years of experience in cloud computing. Ory's offering is the only official program for qualified support from the maintainers.
    Downloads: 42 This Week
    Last Update:
    See Project
  • Outbound sales software Icon
    Outbound sales software

    Unified cloud-based platform for dialing, emailing, appointment scheduling, lead management and much more.

    Adversus is an outbound dialing solution that helps you streamline your call strategies, automate manual processes, and provide valuable insights to improve your outbound workflows and efficiency.
    Learn More
  • 5
    Zabbix

    Zabbix

    Enterprise-class, distributed monitoring solution for networks & apps

    Zabbix is an enterprise-class open source distributed monitoring solution designed to monitor and track performance and availability of network servers, devices and other IT resources. It supports distributed and WEB monitoring, auto-discovery, and more. An enterprise-class distributed monitoring solution for networks & apps
    Leader badge
    Downloads: 213 This Week
    Last Update:
    See Project
  • 6

    collectl

    This is now also available here github.com/sharkcz/collectl.git

    Collectl is a light-weight performance monitoring tool capable of reporting interactively as well as logging to disk. It reports statistics on cpu, disk, infiniband, lustre, memory, network, nfs, process, quadrics, slabs and more in easy to read format.
    Leader badge
    Downloads: 226 This Week
    Last Update:
    See Project
  • 7
    Network Security Toolkit (NST)

    Network Security Toolkit (NST)

    A network security analysis and monitoring toolkit Linux distribution.

    Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 42 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available in the toolkit. An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, network monitoring, host geolocation, network analysis and configuration of many network and security applications found within the NST distribution. In the virtual world, NST can be used as a network security analysis, validation and monitoring tool on enterprise virtual servers hosting virtual machines.
    Leader badge
    Downloads: 170 This Week
    Last Update:
    See Project
  • 8
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located on a remote cloud storage, by only reading/fetching the necessary data to perform the operation. Dar saves *all* UNIX inode types, takes care of hard links, sparse files as well as Extended Attributes (MacOS X file forks, Linux ACL, SELinux tags, user attributes) and some Filesystem Specific Attributes (Linux ext2/3/4, Mac OS X HFS+) more details at: http://dar.linux.free.fr/doc/Features.html
    Leader badge
    Downloads: 164 This Week
    Last Update:
    See Project
  • 9
    EJBCA, JEE PKI Certificate Authority
    EJBCA is an enterprise class PKI Certificate Authority built on JEE technology. It is a robust, high performance, platform independent, flexible, and component based CA to be used standalone or integrated in other JEE applications.
    Leader badge
    Downloads: 163 This Week
    Last Update:
    See Project
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • 10
    Gobuster

    Gobuster

    Directory/File, DNS and VHost busting tool written in Go

    Gobuster is a tool used to brute-force. This project is born out of the necessity to have something that didn't have a fat Java GUI (console FTW), something that did not do recursive brute force, something that allowed me to brute force folders and multiple extensions at once, something that compiled to native on multiple platforms, something that was faster than an interpreted script (such as Python), and something that didn't require a runtime. Provides several modes, like the classic directory brute-forcing mode, DNS subdomain brute-forcing mode, the mode that enumerates open S3 buckets and looks for existence and bucket listings, and the virtual host brute-forcing mode (not the same as DNS!). Since this tool is written in Go you need to install the Go language/compiler/etc. Full details of installation and set up can be found on the Go language website. Once installed you have two options. You need at least go 1.16.0 to compile gobuster.
    Downloads: 33 This Week
    Last Update:
    See Project
  • 11
    RackTables
    Racktables is a nifty and robust solution for datacenter and server room asset management. It helps document hardware assets, network addresses, space in racks, networks configuration and much much more!
    Leader badge
    Downloads: 138 This Week
    Last Update:
    See Project
  • 12
    Keycloak

    Keycloak

    Identity and access management for modern applications and services

    Add authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box. You'll even get advanced features such as User Federation, Identity Brokering and Social Login. Keycloak is an open source Identity and Access Management solution aimed at modern applications and services. It makes it easy to secure applications and services with little to no code. Users authenticate with Keycloak rather than individual applications. This means that your applications don't have to deal with login forms, authenticating users, and storing users. Once logged-in to Keycloak, users don't have to login again to access a different application. This also applied to logout. Keycloak provides single-sign out, which means users only have to logout once to be logged-out of all applications that use Keycloak.
    Downloads: 25 This Week
    Last Update:
    See Project
  • 13
    RADIUSdesk

    RADIUSdesk

    The professional way to manage your WiFi network using FreeRADIUS

    The professional way to manage your WiFi network using FreeRADIUS RADIUSdesk offers: * A Modern dashboard that is easy to navigate * Easy to use API that makes third party integration a snap * Login pages applet for central hotspot login page management. * Support Social Login (Facebook etc) integration for CoovaChilli and Mikrotik. * A device manager which makes BYOD a pleasure for any enterprise. * Fine grained rights management. * Extensive usage graphs for fine grained trend analysis and capacity planning. * i18n. Easy translations. Also supporting rtl languages. * Advanced debug trace applet to allow real-time debug traces on FreeRADIUS by using Websocket. * MESHdesk applet that helps to set-up, manage and monitor Batman-adv mesh networks
    Leader badge
    Downloads: 108 This Week
    Last Update:
    See Project
  • 14
    mcrcon

    mcrcon

    Console based rcon client for minecraft servers.

    Mcrcon is IPv6 compliant minecraft rcon client with bukkit coloring support. It is well suited for remote administration and to be used as part of automated server maintenance scripts. - Does not trigger "IO: Broken pipe" or "IO: Connection reset" spam bug on server side. - Has workaround for server side bug (https://bugs.mojang.com/browse/MC-154617) ****************************************************************** Further development and new releases has moved to Github Github page: https://github.com/Tiiffi/mcrcon Official upstream: https://github.com/Tiiffi/mcrcon/releases https://api.github.com/repos/tiiffi/mcrcon/releases/latest ******************************************************************
    Leader badge
    Downloads: 132 This Week
    Last Update:
    See Project
  • 15
    Uptrace

    Uptrace

    Open source APM: OpenTelemetry traces, metrics, and logs

    Uptrace is an open-source APM tool that supports distributed tracing, metrics, and logs. You can use it to monitor applications and set up automatic alerts to receive notifications via email, Slack, Telegram, and more. Uptrace is an open-source APM that supports OpenTelemetry tracing, metrics, and logs. You can use it to monitor applications and set up alerts to receive notifications via email, Slack, Telegram, and more. Uptrace collects and analyzes data from a variety of sources, including servers, databases, cloud providers, monitoring tools, and custom applications. It provides a unified view of the entire technology stack, enabling you to monitor the performance, availability, and health of your systems in real-time. Uptrace allows to monitor your whole application stack on a compact and informative dashboard. You get a quick overview for all your services, hosts, and systems.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 16
    GaryOS

    GaryOS

    GaryOS is an entire GNU/Linux system in a single bootable file

    GaryOS is an entire GNU/Linux system in a single bootable file. It is also a Builder system to create and package Gentoo installations. Builder creates custom root filesystems that GaryOS can load into memory in place of its own. GaryOS can build new or updated versions of itself from within itself. Primary uses: * System rescue and recovery * Anonymous and secure workstation * GNU/Linux learning environment * Installation of Gentoo Unique advantages: * Source-based distributions are more flexible and powerful than binary ones * A single Kernel file is easier to manage and boot than an ISO image * GaryOS is stored on media as a resident of it, not the purpose of it No other GNU/Linux distribution takes the same approach or has the same features as GaryOS.
    Leader badge
    Downloads: 390 This Week
    Last Update:
    See Project
  • 17

    Xymon Systems and Network Monitor

    Xymon monitors your hosts, your network services, and everything else.

    Xymon is a system for monitoring of hosts and networks, inspired by the Big Brother system. It provides real-time monitoring, an easy web-interface, historical data, availability reports and performance graphs.
    Leader badge
    Downloads: 65 This Week
    Last Update:
    See Project
  • 18
    Authelia

    Authelia

    The Single Sign-On Multi-Factor portal for web apps

    Authelia is an open-source authentication and authorization server and portal fulfilling the identity and access management (IAM) role of information security in providing multi-factor authentication and single sign-on (SSO) for your applications via a web portal. It acts as a companion for common reverse proxies. With a compressed container size smaller than 20 megabytes and observed memory usage normally under 30 megabytes, it's one of the most lightweight solutions available. Written in Go and React, authorization policies and many other backend tasks are completed in mere milliseconds and login portal loading times of 100 milliseconds makes it one of the fastest solutions available. Processors can use a lot of electricity, but when idle usage is basically so low that you can't measure it, and active usage in a small business environment being under 1% you can rest easy (with the exclusion of password hashing).
    Downloads: 14 This Week
    Last Update:
    See Project
  • 19
    NSClient++ is a windows service that allows performance metrics to be gathered by Nagios (and possibly other monitoring tools). It is an attempt to create a NSClient and NRPE compatible but yet extendable performance service for windows.
    Leader badge
    Downloads: 68 This Week
    Last Update:
    See Project
  • 20
    Cockpit

    Cockpit

    A sysadmin login session in a web browser

    Cockpit makes GNU/Linux discoverable. It’s an interactive server admin interface that lets you see and understand the health of your server at a glance; interact directly with the operating system from a real Linux session; and perform system tasks with a mouse all in a web browser. With Cockpit, sysadmins can easily perform tasks such as starting containers, storage administration, network configuration, inspecting logs and more. They can also jump between terminal and the web interface at any time. Lightweight and very easy to use, Cockpit can be installed on many Linux operating systems, including Debian, Fedora and RHEL.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 21
    Authenticator Pro

    Authenticator Pro

    Two-Factor Authentication (2FA) client for Android + Wear OS

    Authenticator Pro is a free and open-source two-factor authentication app for Android. It features encrypted backups, icons, categories, a high level of customization, and even a Wear OS app. Unlike some alternative apps, Authenticator Pro gives you control over your data. You can import from other apps and export at any time. Authenticator Pro is a community-backed open-source project which aims to provide privacy and security to users. The source-code is auditable by anyone on GitHub and released under the GPL 3.0 license. The project has no corporate ties or interests but, rather has the purpose of providing a secure and private two-factor authentication solution to the privacy-conscious. Unlike alternative user-hostile applications, Authenticator Pro does not lock-in your data or communicate with distant servers. Everything is safely protected in the app and can be exported at any time.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 22
    Webminstats is a Webmin's module which display a graphical log of historic information. It's modular in design, as to be able to log everything from CPU usage to email box size.
    Downloads: 68 This Week
    Last Update:
    See Project
  • 23
    Fail2Ban

    Fail2Ban

    Daemon to ban hosts that cause multiple authentication errors

    Fail2Ban scans log files and bans IPs that show the malicious signs -- too many password failures, seeking for exploits, etc. Generally Fail2Ban is then used to update firewall rules to reject the IP addresses for a specified amount of time, although any arbitrary other action (e.g. sending an email) could also be configured. Out of the box Fail2Ban comes with filters for various services (apache, courier, ssh, etc). Fail2Ban is able to reduce the rate of incorrect authentications attempts however it cannot eliminate the risk that weak authentication presents. Configure services to use only two factor or public/private authentication mechanisms if you really want to protect services.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 24
    Sentry

    Sentry

    Cross-platform application monitoring and error tracking software

    Sentry is a cross-platform, self-hosted error monitoring solution that helps software teams discover, monitor and fix errors in real-time. The most users and logs will have to provide are the clues, and Sentry provides the answers. Sentry offers enhanced application performance monitoring through information-laden stack traces. It lets you build better software faster and more efficiently by showing you all issues in one place and providing the trail of events that lead to errors. It also provides real-time monitoring and data visualization through dashboards. Sentry’s server is in Python, but its API enables for sending events from any language, in any application. More than fifty-thousand companies already ship better software faster thanks to Sentry; let yours be one of them!
    Downloads: 11 This Week
    Last Update:
    See Project
  • 25

    Windows 10 Lite (Better Privacy)

    Tune, cleanup and better privacy Windows 10 Installation

    Windows 10 Setup Helper for gamers, power users and administrators. Script is no longer in active development because Windows 10 is being updated too frequently. Version 9: rmApps.cmd -> Script with Y/N interaction autoRmApps.cmd -> Script without interaction advRmApps.cmd -> Script without limitation. Can remove everything with Y/N interaction. Warning!!! Wrong usage can break your Windows! (Remove Cortana with this script after autoRmApps.cmd script finished) - clean uninstall of Apps via dism.exe (All Users) - tweaks from Windows Privacy Tweaker - nearly every app can be removed - service configuration choice: Safe or Microsoft (Black Viper's Service Configuration) - removed some more stuff for your privacy (Privacy And Shit Script) - OneDrive can be removed before it gets installed
    Downloads: 69 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB