Showing 57 open source projects for "attack"

View related business solutions
  • Simplify Purchasing For Your Business Icon
    Simplify Purchasing For Your Business

    Manage what you buy and how you buy it with Order.co, so you have control over your time and money spent.

    Simplify every aspect of buying for your business in Order.co. From sourcing products to scaling purchasing across locations to automating your AP and approvals workstreams, Order.co is the platform of choice for growing businesses.
    Learn More
  • Leverage AI to Automate Medical Coding Icon
    Leverage AI to Automate Medical Coding

    Medical Coding Solution

    As a healthcare provider, you should be paid promptly for the services you provide to patients. Slow, inefficient, and error-prone manual coding keeps you from the financial peace you deserve. XpertDox’s autonomous coding solution accelerates the revenue cycle so you can focus on providing great healthcare.
    Learn More
  • 1
    Monero P2Pool

    Monero P2Pool

    Decentralized pool for Monero mining

    Decentralized pool for Monero mining. No central server that can be shutdown/blocked. P2Pool uses a separate blockchain to merge mine with Monero. Pool admin can't go rogue or be pressured to do an attack on the network because there is no pool admin.
    Downloads: 31 This Week
    Last Update:
    See Project
  • 2
    gVisor

    gVisor

    Application Kernel for Containers

    ...Its key runtime, runsc, integrates seamlessly with container ecosystems such as Docker and Kubernetes, making it easy to deploy sandboxed workloads using familiar tools. By intercepting and safely handling syscalls from applications, gVisor reduces the attack surface of the host kernel, mitigating risks associated with running untrusted or potentially malicious code in containerized environments.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    AWS SDK for C++

    AWS SDK for C++

    AWS SDK for C++

    ...It supports major platforms including Windows, macOS, and Linux, and uses CMake for builds so you can include only the services your application needs, helping reduce binary size and surface attack area. Documentation, code examples and build instructions make integration straightforward, and the modular build ability allows teams to pick and choose service clients.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Block Attack - Rise of the Blocks
    Game based on the game "Tetris Attack". This has nothing to do with the classic tetris game. This project's main focus is on the single player experience.
    Downloads: 1 This Week
    Last Update:
    See Project
  • AI-based, Comprehensive Service Management for Businesses and IT Providers Icon
    AI-based, Comprehensive Service Management for Businesses and IT Providers

    Modular solutions for change management, asset management and more

    ChangeGear provides IT staff with the functions required to manage everything from ticketing to incident, change and asset management and more. ChangeGear includes a virtual agent, self-service portals and AI-based features to support analyst and end user productivity.
    Learn More
  • 5
    Linux Air Combat

    Linux Air Combat

    Combat Flight Simulator for LINUX. WW2. Network and VOIP. Open-source.

    WW2 Combat Flight Simulator. Free. Current Version: 9.83. This is now the world's leading open-source combat flight sim for LINUX. Linux Air Combat ("LAC") runs on almost any desktop LINUX system (even Steam Deck & Raspberry Pi) and generates smooth, high-performance flight. If it runs TOO fast on your hardware (framerates beyond 100 FPS), you should activate LAC's built-in FrameRate Limiter as documented...
    Leader badge
    Downloads: 61 This Week
    Last Update:
    See Project
  • 6
    Seven Kingdoms: Ambition

    Seven Kingdoms: Ambition

    An enhanced version of 7K:AA (Seven Kingdoms: Ancient Adversaries).

    Seven Kingdoms: Ambition is a real-time game of epic strategy and empire building featuring economy management, warfare, and intrigue. It is an updated and enhanced version of 7kaa (7K: Ancient Adversaries) featuring numerous fixes and improvements. https://discord.gg/xJs99xK38G Begin with a single, modest village under your command, and an entire world to be conquered by force of arms, guile, persuasion, or whatever other means you choose. Wage open warfare on your rivals, or forge...
    Leader badge
    Downloads: 20 This Week
    Last Update:
    See Project
  • 7
    Genode OS Framework

    Genode OS Framework

    Tool kit for building highly secure special-purpose operating systems

    ...The framework provides mechanisms to let programs communicate with each other and trade their resources, but only in strictly-defined manners. Thanks to this rigid regime, the attack surface of security-critical functions can be reduced by orders of magnitude compared to contemporary operating systems.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8

    Candy's Space Mysteries II

    With the helpfull nef, you have to rescue earthlike planets!

    During their recent spacetrip, Candy & Noopy get trapped into a giant wormhole! They made a long light trip and found a passage who leads to the Milky Way. They was searching for a place to land, they have found the Earth. Knowing that great cataclysms are menacing their homeplanet, Candy & Noopy said together: - "We must save the Earth!". Since some times, the star masses, combined with the magnetic-fields of this planet gave special powers to the spaceship: The one of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    dorban

    dorban

    A demo for the Svarog AI library.

    ...It contains a player (Pregor) controlled by the user and an NPC (Dorban) controlled by the Svarog interpreter. The objective is to kill the vampire. Or at least to attack him with the optimal chances. The Svarog AI library contains a new optimization algorithm based on so called hidden variables. In order to achieve the objective Dorban will try to convince Pregor to accompany him, and together they will try to find the vampire in a graph with 5 city nodes. When accompanying Dorban use menu item "follow orders" to follow his orders.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
    Learn More
  • 10
    Udp2raw-tunnel

    Udp2raw-tunnel

    Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic

    A tunnel which turns UDP traffic into encrypted fakeTCP/UDP/ICMP traffic by using Raw Socket, helps you bypass UDP FireWalls(or unstable UDP environment). When used alone, Udp2raw tunnels only UDP traffic. Nevertheless, if you used udp2raw + any UDP-based VPN together, you can tunnel any traffic(include TCP/UDP/ICMP), currently, OpenVPN/L2TP/ShadowVPN and tinyfecVPN are confirmed to be supported. Linux host (including desktop Linux,Android phone/tablet,OpenWRT router,or Raspberry PI) with...
    Downloads: 38 This Week
    Last Update:
    See Project
  • 11
    Blobwars: Blob And Conquer

    Blobwars: Blob And Conquer

    3D third person platform shooter

    Blob And Conquer is a 3D shooter with some puzzles. It is the second in the Blobwars series. The Blobs' homeworld is still littered with the alien forces and Bob once again makes it his task to lead the counter attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    DracOS GNU/Linux Remastered
    What is DracOS GNU/Linux Remastered ? DracOS GNU/Linux Remastered ( https://github.com/dracos-linux ) is the Linux operating system from Indonesia , open source is built based on Debian live project under the protection of the GNU General Public License v3.0. This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering. Use a GUI-based...
    Downloads: 17 This Week
    Last Update:
    See Project
  • 13
    WiFi Duck

    WiFi Duck

    Wireless keystroke injection attack platform

    A user-friendly open-source project to learn about keystroke injection attacks or ‘BadUSBs’. By emulating a USB keyboard, BadUSBs can gain full access to a computer in a matter of seconds! Unlike with other BadUSBs, you don’t need to install an app, log in, compile, or copy scripts onto an SD card. You simply connect via WiFi to manage all your scripts from within the web interface. This tool is intended to be used for testing, training, and educational purposes only. Never use it to do harm...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Mac Crack Attack
    Mac Crack Attack is a port of Crack Attack to the Mac OS X platform. Crack Attack is based on the Super Nintendo classic Tetris Attack. Mac Crack Attack is a fast paced "Tetris-like" game for one or two players (networked)
    Downloads: 13 This Week
    Last Update:
    See Project
  • 15
    Hyenae NG

    Hyenae NG

    Advanced Network Packet Generator

    Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pattern based address randomization and flood detection breaking mechanisms. *** Please check out the latest source from my GitHub repository and check the Build informations. https://github.com/r-richter/hyenae-ng/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Bat Attack

    Bat Attack

    Bat Attack is a cool classical 8bit game to save wife from the Bats

    Bat Attack is a cool classical 8bit game with bats instead and a lot of comic blood and gore and comical media with a funny story mode. The story starts when the main character 'Dave' is driving on his honeymoon with his wife Betty when an Evil bat swoops down and take his dearly beloved off. You have to get Betty back by using the guns available to your disposable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Perkun Wars

    A simple fantasy game

    A simple fantasy game based on the AI library perkun. The objective of the game is to kill a vampire. There are three towns where he may be hidden: Wyzima, Novigrad and Shadizar. It is best to attack the vampire when many NPCs are around. However Pregor and Thragos will avoid him. Dorban will constantly hunt him. It requires the perkun library - download it from http://sourceforge.net/projects/perkun/ This game is intended mainly for the developers willing to learn how to use perkun as a library.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Rcbot2
    RCBot2 An open source GPL bot framework for HL2 Orange Box Mods ONLY
    Downloads: 42 This Week
    Last Update:
    See Project
  • 19
    conquests

    conquests

    Turn based Civ-like strategy game

    Conquests is a turn-based 4X Civilization-like 3D strategy game for Windows and Linux. You can discover new technologies from the stone age to the space age, explore the world, and wage war on your opponents. It supports both Direct3D and OpenGL graphics, and can run in both 2D and 3D modes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Rinzler USB Cleaner

    Rinzler USB Cleaner

    V2.0-Unhides Folder/Files,removes malicious scripts from USB Drive

    V2.0 (30th Dec 2014). It is a USB Malware Cleaner. This is a small tool that removes malicious scripts created by virus or malware, unhides folder and files, deletes all shortcut from selected drive. Also disables autorun completely and provides option to enable registry, folder options and task manager. Visit the project website for more information.
    Leader badge
    Downloads: 43 This Week
    Last Update:
    See Project
  • 21
    PhishBlock

    PhishBlock

    A program that detects and blocks phishing, pharming, Hacker's C&C.

    ...Recently, most malware codes are delivered covertly to users’ personal computers through Google ads, SNS, Blogs, BBS and so on, which users visit often. And After the malware codes connect the C&C server(or Botnet), they attack, and steal information, repeatedly and persistently. Currently, there is a lack of affordable software to protect individuals personal computer’s from detecting and blocking these malware features. Generally, virus vaccine programs only detect and block files already existing inside a users’ personal computer. But PhishBlock detects and blocks harmful files at the network entrance of personal computers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    SSL Diagnos

    SSL Diagnos

    SSL Strength Evaluation and Test Utility

    SSL Diagnos is used to test SSL strength; get information about SSL protocols (pct, ssl2, ssl3, tls, dtls) and cipher suites. It can also be used for testing and rating ciphers on SSL clients. It has also specific support for pop3s, sip, smtp and explicit ftps. Tests for heartbleed (including dtls). Furthermore a separate tool, SSLPressure, not using openssl can be used to check the whole spectrum of possible SSL protocols on a server. Can also be used for testing ssl for...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    Penguin Attack is a puzzle game in the style of Tetris Attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Pulsar Game

    Pulsar Game

    Pulsar is a card video game using Stars as gameplay key elements.

    Pulsar is a card video game. A card represents a star constellation, and thus contains stars that can be used in two ways : * Attack Stars (also called AMAS Stars) will generate an attack to flip opponents cards (and take them) ; * Defense Stars will protect the card from opponents. It is also the interface with other cards to begin a battle. The inner gameplay is much more complex as Cards and Stars can evolve, be damaged. AMAS Stars are "AutoMated Attack System" Stars. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Skraken

    Break A5/1 cipher used in GSM

    Skraken is a tool to break the A5/1 ciphering used in GSM. It is a partial rewrite of Kraken that solves its stability issues. The attack is based on a CPU/storage tradeoff that attempts to find the internal state of the A5/1 registers given an observed keystream. The storage component requires a set of 40 rainbow tables that totals ~1.7 TB, although any subset of the tables can be used with a reduced success rate. Using all the tables, the success rate of finding the internal state that generates a GSM burst is around 20%. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next