Showing 93 open source projects for "attack"

View related business solutions
  • Payments you can rely on to run smarter. Icon
    Payments you can rely on to run smarter.

    Never miss a sale. Square payment processing serves customers better with tools and integrations that make work more efficient.

    Accept payments at your counter or on the go. It’s easy to get started. Try the Square POS app on your phone or pick from a range of hardworking hardware.
    Learn More
  • Yeastar: Business Phone System and Unified Communications Icon
    Yeastar: Business Phone System and Unified Communications

    Go beyond just a PBX with all communications integrated as one.

    User-friendly, optimized, and scalable, the Yeastar P-Series Phone System redefines business connectivity by bringing together calling, meetings, omnichannel messaging, and integrations in one simple platform—removing the limitations of distance, platforms, and systems.
    Learn More
  • 1
    A module for eggdrop bot used for attack organization in Planetarion (http://www.planetarion.com/)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    DracOS GNU/Linux Remastered
    What is DracOS GNU/Linux Remastered ? DracOS GNU/Linux Remastered ( https://github.com/dracos-linux ) is the Linux operating system from Indonesia , open source is built based on Debian live project under the protection of the GNU General Public License v3.0. This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering. Use a GUI-based...
    Downloads: 17 This Week
    Last Update:
    See Project
  • 3
    Novel Insight Inner Circle

    Novel Insight Inner Circle

    Graphical message and file encryption tool

    ...IMPORTANT: The software requires new OpenJDK 16 (Not Oracle's J2RE 1.8) to run. Install, for example, AdoptOpenJDK for Windows. NOTE: By using encryption twice the implementation is (in theory) vulnerable to Meet-In-The-Middle attack reducing key size to 256bit but the attack still requires 2^256 bytes of memory making it impossible in practice.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    ZeroDdos
    Welcome. Thank you for downloading this program. Thank's For Using App Zero Thanks To : Mr.SL3ND3RM4N - For Support Me DDOS-Zero-ddos
    Downloads: 7 This Week
    Last Update:
    See Project
  • Leverage AI to Automate Medical Coding Icon
    Leverage AI to Automate Medical Coding

    Medical Coding Solution

    As a healthcare provider, you should be paid promptly for the services you provide to patients. Slow, inefficient, and error-prone manual coding keeps you from the financial peace you deserve. XpertDox’s autonomous coding solution accelerates the revenue cycle so you can focus on providing great healthcare.
    Learn More
  • 5
    Hyenae NG

    Hyenae NG

    Advanced Network Packet Generator

    Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pattern based address randomization and flood detection breaking mechanisms. *** Please check out the latest source from my GitHub repository and check the Build informations. https://github.com/r-richter/hyenae-ng/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    PGIIXUA

    PGIIXUA

    PGIIXUA allows to generate network traffic right of your Android

    ...This tool is based on the 'Low Orbit Ion Canon', but more powerful as for the advanced changes that were made on the software. What is Low Orbit Ion Canon? Low Orbit Ion Cannon (LOIC) is an open-source network stress testing and denial-of-service attack application, written in C#. LOIC was initially developed by Praetox Technologies, but was later released into the public domain and now is hosted on several open source platforms. https://en.wikipedia.org/wiki/Low_Orbit_Ion_Cannon //Disclaimer// !!Please use this app for educational purposes only, USE IT AT YOUR OWN RISK!! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Perkun Wars

    A simple fantasy game

    A simple fantasy game based on the AI library perkun. The objective of the game is to kill a vampire. There are three towns where he may be hidden: Wyzima, Novigrad and Shadizar. It is best to attack the vampire when many NPCs are around. However Pregor and Thragos will avoid him. Dorban will constantly hunt him. It requires the perkun library - download it from http://sourceforge.net/projects/perkun/ This game is intended mainly for the developers willing to learn how to use perkun as a library.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Rcbot2
    RCBot2 An open source GPL bot framework for HL2 Orange Box Mods ONLY
    Downloads: 42 This Week
    Last Update:
    See Project
  • 9

    InTheDark

    The best/new dos/ddos software NOW!

    InTheDark is the best for slowing down a website/IP address. If you're looking for FREE software with regular updates INSTALL NOW!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Say goodbye to broken revenue funnels and poor customer experiences Icon
    Say goodbye to broken revenue funnels and poor customer experiences

    Connect and coordinate your data, signals, tools, and people at every step of the customer journey.

    LeanData is a Demand Management solution that supports all go-to-market strategies such as account-based sales development, geo-based territories, and more. LeanData features a visual, intuitive workflow native to Salesforce that enables users to view their entire lead flow in one interface. LeanData allows users to access the drag-and-drop feature to route their leads. LeanData also features an algorithms match that uses multiple fields in Salesforce.
    Learn More
  • 10
    Cracx

    Cracx

    simple and light-weight archive password cracker

    Cracx allows you to crack archive passwords of any encryption using 7-zip, WinRAR or a custom command, via Brute Force or Dictionary attack. Note: You must NOT use this program with files you don't have the rights to extract/open/use them! Currently, the program requires a current version of either 7-zip or WinRAR to be installed, but you can also use it to bruteforce basically anything that is executably via command-line with custom parameters. On an i7 CPU, it runs approximately 30 combination tests per second. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 11
    Fallout PnP Calculator

    Fallout PnP Calculator

    A Fallout PnP To Hit Calculator with bold ambitions

    This is a simple Fallout PnP to Hit Calculator that will allow you to add Character, Weapons, Beasts, and Attack for ease in the calculation. Added in the file is a Guide that will inform you on how the application works
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    Owasp Zap Live CD

    Owasp Zap Live CD

    A live CD, live DVD, or live disc is a complete bootable computer installation including operating system which runs in a computer's memory.This live CD contains the Owasp Zap vulnerability test solution, the OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Online Zombie Game

    Online Zombie Game

    Online Zombie Game is a medieval-zombie apocalypse rpg game.

    Online Zombie Game. Control your character through medieval zombie apocalypse! * You have 4 attributes (Health,Attack,Defence,Critical Rate) * Train your character to get stronger. * Hunt in 11 different areas to get experience,golds,diamonds. * 50+ zombie types with different attributes. * Flexible choice of hunting time. (From 1 minute to 8 hours!) * Challange other players in the Arena , get weekly rewards. * Buy weapons/armors to prepare for fight
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    MVProc FastCGI

    MVProc FastCGI

    MVProc implemented as a FastCGI

    ...Supports application/x-www-form-urlencoded and multipart/form-data! Highly configurable! Very fast templating! Designed to be secure, with SQL injection protection, XSS attack protection, and more! Responsive project admin!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    LOIC

    LOIC

    LOIC TCP/IP Stresser v1.1.0.1 By LifeOwner

    LOIC TCP/IP Stresser Tool History I was downloaded the original LOIC within version 1.0.8.0 and changed it to be better without changing the other functions which were worked nice. The grey skin i hope you like it! Reworked by LifeOwner. New Features Work • The UDPV2 work like charm with low builded connections you might get timeout in your internet connection might cause you're too slow. (I tested it with 25MB's Downstream/ 2MB's Upstream). • The status checker function will be...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    ODS3 Virtual Machine Challenge

    ODS3 Virtual Machine Challenge

    Virtual Machine Image To Test Penetration Skills

    ...These images are great for cyber security students, penetration testers and hobbyist. Care should be taken if installed on an Internet access host as the application are purposely vulnerable to attack and exploitation.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 17
    PhishBlock

    PhishBlock

    A program that detects and blocks phishing, pharming, Hacker's C&C.

    ...Recently, most malware codes are delivered covertly to users’ personal computers through Google ads, SNS, Blogs, BBS and so on, which users visit often. And After the malware codes connect the C&C server(or Botnet), they attack, and steal information, repeatedly and persistently. Currently, there is a lack of affordable software to protect individuals personal computer’s from detecting and blocking these malware features. Generally, virus vaccine programs only detect and block files already existing inside a users’ personal computer. But PhishBlock detects and blocks harmful files at the network entrance of personal computers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Wireless Attack Toolkit (WAT)

    Wireless Attack Toolkit (WAT)

    A push-button wireless hacking and Man-in-the-Middle attack toolkit

    This project is designed to run on Embedded ARM platforms (specifically v6 and RaspberryPi but I'm working on more). It provides users with automated wireless attack tools that air paired with man-in-the-middle tools to effectively and silently attack wireless clients. Some of the tools included in the kit are: Custom regex-based DNS Server DHCP Aircrack-ng suite Browser Exploitation Framework (Preconfigured for metasploit) Metasploit Python-based Transparent Injection Proxy Pushbutton configuration "Limpet Mine" mode for attacking existing networks You basically answer three questions in the start script, wait a bit, then log into the BEEF console to start attacking clients
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Kana Attack III

    Kana Attack III

    A time attack game for learning hiragana and katakana.

    ...You can compete against yourself, classmates, or friends using a local leaderboard that shows how fast you've completed each level. You can also unlock achievement trophies that record various milestones from your Kana Attack III experiences.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Old School Tool

    Old School gaming tool for GMs of AD&D/OSRIC.

    A java based tool that takes load off the AD&D or OSRIC GM by being able to quickly load creatures encountered and manage the combat quickly without having to reference attack matrix, hd calculations or other charts and tables. With the press of a few buttons a GM can create an encounter and then cycle through the rounds of combat easily finding the AC the creature hit, damage done and other basic information. Does NOT require a network connection to work and should run on just about any operating system or hardware. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    SSL Diagnos

    SSL Diagnos

    SSL Strength Evaluation and Test Utility

    SSL Diagnos is used to test SSL strength; get information about SSL protocols (pct, ssl2, ssl3, tls, dtls) and cipher suites. It can also be used for testing and rating ciphers on SSL clients. It has also specific support for pop3s, sip, smtp and explicit ftps. Tests for heartbleed (including dtls). Furthermore a separate tool, SSLPressure, not using openssl can be used to check the whole spectrum of possible SSL protocols on a server. Can also be used for testing ssl for...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    Super Kanji Time II

    Super Kanji Time II

    A time attack game for learning various kanji.

    This is a game developed in Python and compiled for Windows XP, Vista, 7, and 8 that is built to teach various kanji to students of the Japanese language. The kanji lists are taken from the textbook Nakama 2. In this game, you must click on the appropriate kanji according to the pronunciation given to you. When a correct click is made, a sound plays and the kanji disappears. The goal is to make all the kanji disappear as fast as you can. You can compete against yourself, classmates, or...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Super Kanji Time I

    Super Kanji Time I

    A time attack game for learning various kanji.

    This is a game developed in Python and compiled for Windows XP, Vista, 7, and 8 that is built to teach various kanji to students of the Japanese language. The kanji lists are taken from the textbook Nakama 2. In this game, you must click on the appropriate kanji according to the pronunciation given to you. When a correct click is made, a sound plays and the kanji disappears. The goal is to make all the kanji disappear as fast as you can. You can compete against yourself, classmates, or...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Penguin Attack is a puzzle game in the style of Tetris Attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    ettercap
    Ettercap is a multipurpose sniffer/interceptor/logger for switched LAN. It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis. Development has been moved to GitHub, https://github.com/Ettercap/ettercap
    Leader badge
    Downloads: 58 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next