NTPsec

A secure, hardened, and improved implementation of Network Time Protocol derived from NTP Classic. ([Source Code](https://gitlab.com/NTPsec/ntpsec)) `BSD-2-Clause/Custom` `C`

🔗 Visiter NTPsec
🗣️ English📅 17 avril 2026

Description

A secure, hardened, and improved implementation of Network Time Protocol derived from NTP Classic. ([Source Code](https://gitlab.com/NTPsec/ntpsec)) `BSD-2-Clause/Custom` `C`

💬 Notre avis

NTPsec est un projet qui se concentre sur la sécurisation du protocole NTP, un élément crucial pour synchroniser les horloges sur Internet. En se basant sur NTP Classic, ils ont réussi à créer une version améliorée et renforcée, ce qui est essentiel pour éviter des attaques potentielles sur les serveurs de temps. Cependant, ce n'est pas un service grand public et il pourrait être difficile à utiliser si tu n'as pas de connaissances techniques en informatique. Le site lui-même n’est pas très connu, donc il pourrait manquer de soutien communautaire par rapport à d'autres alternatives comme Chrony ou OpenNTPd. En plus, les informations sur le pricing sont totalement absentes, ce qui peut laisser penser que c'est gratuit, mais sans garantie. C'est un projet open-source, donc tu peux l'utiliser sans frais, mais il est important de rester vigilant quant à la mise en œuvre et à la configuration. En résumé, si tu es un développeur ou un administrateur système à la recherche d'une solution pour sécuriser ton temps réseau, NTPsec peut valoir le coup d'œil, mais pour les utilisateurs moins techniques, il vaut mieux se tourner vers des solutions plus accessibles. <!-- ai-reviewed -->

🤖 Fiche enrichie

💰 Modèle tarifaire🆓 Gratuit
👥 Public cibleDéveloppeurs | Administrateurs système
🗣️ Languesen
🌍 Pays ciblesMonde
👍

Points positifs

Sécurisation du protocole NTP

Amélioration par rapport à NTP Classic

Open-source

👎

Points négatifs

Difficile d'accès pour les non-techniciens

Manque de soutien communautaire

💬 Commentaires

Pas de compte ? Vous pouvez quand même laisser un message.
Il sera visible après modération.

0/1500

Aucun commentaire pour le moment. Soyez le premier ! 🎯

🔗 Sites similaires

Chrony

Chrony

A versatile implementation of the Network Time Protocol (NTP). ([Source Code](https://gitlab.com/chrony/chrony)) `GPL-2.0` `C`

OpenNTPD

OpenNTPD

A FREE, easy to use implementation of the Network Time Protocol. ([Source Code](https://github.com/openntpd-portable/openntpd-openbsd/)) `ISC` `C`

AutoShun

AutoShun

AutoShun is a Snort plugin that allows you to send your Snort IDS logs to a centralized server that will correlate attacks from your sensor logs with other snort sensors, honeypots, and mail filters from around the world.

DNS-BH

DNS-BH

The DNS-BH project creates and maintains a listing of domains that are known to be used to propagate malware and spyware. This project creates the Bind and Windows zone files required to serve fake replies to localhost for any requests to these, thus preventing many spyware installs and reporting.

Tor Bulk Exit List

Tor Bulk Exit List

CollecTor, your friendly data-collecting service in the Tor network. CollecTor fetches data from various nodes and services in the public Tor network and makes it available to the world. If you're doing research on the Tor network, or if you're developing an application that uses Tor network data, this is your place to start. [TOR Node List](https://www.dan.me.uk/tornodes) / [DNS Blacklists](https://www.dan.me.uk/dnsbl) / [Tor Node List](http://torstatus.blutmagie.de/)

TOR Node List

TOR Node List

TOR Node List

Project Honey Pot

Project Honey Pot

Project Honey Pot is the first and only distributed system for identifying spammers and the spambots they use to scrape addresses from your website. Using the Project Honey Pot system you can install addresses that are custom-tagged to the time and IP address of a visitor to your site. If one of these addresses begins receiving email we not only can tell that the messages are spam, but also the exact moment when the address was harvested and the IP address that gathered it.

MISP - Open Source Threat Intelligence Platform

MISP - Open Source Threat Intelligence Platform

MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators. A threat intelligence platform for gathering, sharing, storing and correlating Indicators of Compromise of targeted attacks, threat intelligence, financial fraud information, vulnerability information or even counter-terrorism information. The MISP project includes software, common libraries ([taxonomies](https://www.misp-project.org/t

Gophish

Gophish

An Open-Source Phishing Framework.

Portswigger

Portswigger

PortSwigger offers tools for web application security, testing & scanning. Choose from a wide range of security tools & identify the very latest vulnerabilities.

ModSecurity

ModSecurity

ModSecurity is a toolkit for real-time web application monitoring, logging, and access control.

sqlmap

sqlmap

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.