Showing 20 open source projects for "attack"

View related business solutions
  • D&B Hoovers is Your Sales Accelerator Icon
    D&B Hoovers is Your Sales Accelerator

    For sales teams that want to accelerate B2B sales with better data

    Speed up sales prospecting with the rich audience targeting capabilities of D&B Hoovers so you can spend more sales time closing.
    Learn More
  • Collect! is a highly configurable debt collection software Icon
    Collect! is a highly configurable debt collection software

    Everything that matters to debt collection, all in one solution.

    The flexible & scalable debt collection software built to automate your workflow. From startup to enterprise, we have the solution for you.
    Learn More
  • 1
    SimpleX

    SimpleX

    The first messaging platform operating without user identifiers

    Other apps have user IDs: Signal, Matrix, Session, Briar, Jami, Cwtch, etc. SimpleX does not, not even random numbers. This radically improves your privacy. The video shows how you connect to your friend via their 1-time QR-code, in person or via a video link. You can also connect by sharing an invitation link. Temporary anonymous pairwise identifiers SimpleX uses temporary anonymous pairwise addresses and credentials for each user contact or group member. It allows to deliver messages...
    Downloads: 40 This Week
    Last Update:
    See Project
  • 2
    Arcjet

    Arcjet

    Arcjet JS SDKs. Rate limiting, bot protection, email verification

    Arcjet helps developers protect their apps in just a few lines of code. Implement rate limiting, bot protection, email verification, and defense against common attacks. Native security for Bun, Next.js, Node.js, SvelteKit, Vercel, Netlify, Fly.io, and other modern platforms. Customizable protection for signup forms, login pages, API routes, and your whole app. Test security rules locally. Protection that works in every environment. No agent is required.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    ufonet

    ufonet

    UFONet - Denial of Service Toolkit

    UFONet - Is a set of hacktivist tools that allow launching coordinated DDoS and DoS attacks and combine both in a single offensive. It also works as an encrypted DarkNET to publish and receive content by creating a global client/server network based on a direct-connect P2P architecture. + FAQ: https://ufonet.03c8.net/FAQ.html -------------------------------------------- -> UFONet-v1.8 [DPh] "DarK-PhAnT0m!" (.zip) -> md5 = [ c8ab016f6370c8391e2e6f9a7cbe990a ] -> UFONet-v1.8...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 4
    A module for eggdrop bot used for attack organization in Planetarion (http://www.planetarion.com/)
    Downloads: 0 This Week
    Last Update:
    See Project
  • DAT Freight and Analytics - DAT Icon
    DAT Freight and Analytics - DAT

    DAT Freight and Analytics operates DAT One truckload freight marketplace

    DAT Freight & Analytics operates DAT One, North America’s largest truckload freight marketplace; DAT iQ, the industry’s leading freight data analytics service; and Trucker Tools, the leader in load visibility. Shippers, transportation brokers, carriers, news organizations, and industry analysts rely on DAT for market trends and data insights, informed by nearly 700,000 daily load posts and a database exceeding $1 trillion in freight market transactions. Founded in 1978, DAT is a business unit of Roper Technologies (Nasdaq: ROP), a constituent of the Nasdaq 100, S&P 500, and Fortune 1000. Headquartered in Beaverton, Ore., DAT continues to set the standard for innovation in the trucking and logistics industry.
    Learn More
  • 5
    Novel Insight Inner Circle

    Novel Insight Inner Circle

    Graphical message and file encryption tool

    ...IMPORTANT: The software requires new OpenJDK 16 (Not Oracle's J2RE 1.8) to run. Install, for example, AdoptOpenJDK for Windows. NOTE: By using encryption twice the implementation is (in theory) vulnerable to Meet-In-The-Middle attack reducing key size to 256bit but the attack still requires 2^256 bytes of memory making it impossible in practice.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    UDPStressTest

    UDPStressTest

    A Desktop app for network stress testing, TCP-Ping and icmp ping.

    ... * It gets the available range of IP's in your local network. * When you start the test you see testing throughput as a graph against time also total size of packet sent in (MB). *You can use it as DOS attack tool. *Every action done on the app is logged in XML file as data source (only stress test + ping). *TCP-Ping is a perfect way to discover network devices which active firewall to ignore ping packets or you can use it as TCP port scanner to check your network security. *Stress test speed graph can be exported as image easily. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    OpenSE(Open Secure Encoder)

    OpenSE(Open Secure Encoder)

    OpenSE - Secure your online transactions today!!

    ...For instance, you can log to your email account by filling the username and password. But, is it safety? Your email account can be stolen by the hackers. Your computer's may suffer from the virus, trojan, key logger, rootkit or phishing attack, and all of your email contents are exposed. For which applications support the Secure Encoder, you are required to input the pin number which generates from your own Secure Encoder. Thus, you can avoid the lost. It's because your account is still protected even your username and password are stolen by the hacker. Enhancing the security level and protecting your account today!!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Serangga Warcraft

    Serangga Warcraft

    Mini Warcraft game using Greenfoot

    This game using any Artificial Intelligence. Use same Player Object but can know this is hero or enemies. The player will attack if it has different type. Every character in this game has different strength and skill. This game is created by Ahmad Sidrap <ahmadsidrap@gmail.com>;.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    BO cracker

    Live System pour attaque réseau.

    BO-cracker est un système LIve CD comportant LOIC, W3af et Framework 4.0.0
    Downloads: 0 This Week
    Last Update:
    See Project
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • 10
    localwebfaker tests whether a LAN is vulnerable to a potential arp poisoning attack. . It redirects to a local website all the requests sent from an arbitrary host when the original destination matches the one specified in its GUI.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Class based approach to sending email from php script. Features: 1. Automated email validation 2. Multiple Attachment 3. Protection from header injection attack. and much more....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Sipflanker helps you find IP phones and IP PBXs in your network that may have Web GUIs available for browsing. It also shows their default usernames and passwords so you can test them and make sure they are not vulnerable to attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    This is a strategy planner aimed mainly at the hardcore first person shooter fans. Similar to a white board application it allows many users to connect to a central server and the users are able to draw and place actions on the board for everyone to see
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    enumIAX is an Inter Asterisk Exchange version 2 (IAX2) protocol username brute-force enumerator. enumIAX may operate in two distinct modes; Sequential Username Guessing or Dictionary Attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    ...Knock sequences are defined through XML files; users specify: number of packets of each knock sequence, payload and header of each packet. Logging capability. Generation of smoke packets.No replay-attack
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    DGoS aims to design and implement methods to ensure that bloggers under DoS attack can be provided alternate, distributed hosting platforms to allow a blogger to continue posting and remain engaged and connected with the blogosphere during an attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Cisco Torch mass scanning, application layer fingerprinting, and exploitation tool to discover and attack remote Cisco hosts running Telnet, SSH, Web, TFTP, NTP and SNMP services. Useful in auditing large networks for misconfigured/un-updated Ciscos.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    IIM is an Instant Messaging Solution for corporate environments where IM programs like AIM and MSN have been banned. It is not firewall aware and only works within a switched network so it is not vulnerable to external attack. Uses .Net Framework 1.1
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    EtherMan: Ethernet Man In The Middle Attack Tool. It is capable of forcing traffic between two hosts to pass by a third party (MITM) and then redirected to its original destination again. This program is written for educational reasons, and I am not res
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Thank to NetStrikeNow, you can do a DOS attack ( Denial of Service ) in contemporary with other people that share the dissent against a institution web site. NetStrikeNow is a client that get the information and configuration from server of protest ( lik
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next