Showing 45 open source projects for "ethical"

View related business solutions
  • Employee monitoring software with screenshots Icon
    Employee monitoring software with screenshots

    Clear visibility and insights into how employees work. Even remotely.

    Stay productive working at any distance from anywhere with Monitask.
  • Find out just how much your login box can do for your customer | Auth0 Icon
    Find out just how much your login box can do for your customer | Auth0

    With over 53 social login options, you can fast-track the signup and login experience for users.

    From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
  • 1
    Matomo

    Matomo

    Alternative to Google Analytics that gives you full control over data

    Google Analytics alternative that protects your data and your customers' privacy. Take back control with Matomo – a powerful web analytics platform that gives you 100% data ownership. You could lose your customers’ trust and risk damaging your reputation if people learn their data is used for Google’s “own purposes”. By choosing the ethical alternative, Matomo, you won’t make privacy sacrifices or compromise your site. You can even use Matomo without needing to ask for consent. With 100% data...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2

    OSCARMcMaster

    open source web-based Electronic Medical Record (EMR) system

    ... together on both code and deployment *Quality – compliance with regulatory requirements and security best practices *Ethical Data Stewardship – affirmation of clinicians as Health Information Custodians (HIC) with commitment to support HIC’s access to data, and to use data solely as authorized by a HIC. To access current code or get OSCAR from a McMaster-affiliated organization, please visit site below. You may still use this site to register/search the open-source Mailing List
    Leader badge
    Downloads: 66 This Week
    Last Update:
    See Project
  • 3
    TheMatrixVM
    An intentionally designed vulnerable machine 'boot2root' challenge for beginners. Setup You will need Virtual Box or VMWare Player to import the OVA file included in this repository. I have tested this using Windows 10 and VirtualBox version 7. 1. Set the network adapter to host-only or bridge mode, so that you can launch the virtual machine. 2. Monitor the console for messages if all goes well you should spot the VM receiving an IP address. 3. Attempt to SSH to the...
    Downloads: 49 This Week
    Last Update:
    See Project
  • 4
    Small and simple Python exploitation tool to craft custom exploits for CTFs and ethical hacking
    Downloads: 0 This Week
    Last Update:
    See Project
  • ConnectWise Cybersecurity Management for MSPs Icon
    ConnectWise Cybersecurity Management for MSPs

    Software and support solutions to protect your clients’ critical business assets

    ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
  • 5
    Command Line

    Command Line

    Your Personal Hacking Terminal.

    Command Line is an Open-Source Software for Pentesters and Ethical Hackers it contains many Functionalities which helps Ethical Hackers. It is CLI Based Application use for checking Networks and IP's it also supports functionalities like downloading Packages from Internet Including YouTube.It is also used for Port scanning, IP-Finding it is also useful for checking ping and net speed with the functionality of scanning the net speed by selecting the best server. It also has Host IP finding...
    Downloads: 24 This Week
    Last Update:
    See Project
  • 6
    Metasploitable2-gohack

    Metasploitable2-gohack

    Customized Metasploitable2 VM for Beginners

    This customized version of the open source Metasploitable2 virtual machine is specially modified to make it more user-friendly for beginners and K-12 hacking camps under the GenCyber program and similar middle- and high-school ethical hacking programs. This version was developed by Bryson Payne and is used in the book "Go H*ck Yourself" (Go Hack Yourself), by No Starch Press. Most of the changes are to DVWA, relabeled "Darn Vulnerable Web App" for the K-12 audience. Like the original...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7

    HashApp

    python software for cracking and creating SHA and MD5 hashes

    A python software that can be used for encrypting text in SHA384, SHA512, SHA224, SHA1, SHA256 and MD5; or for cracking six different types of hashes, namely SHA384, SHA512, SHA224, SHA1, SHA256 and MD5 through a dictionary attack using an online txt file. You need to have python 3 or above installed to run this progam. If you would like to change the online dictionary URL for hash decryption, use CTRL+F in your text editor and search for this line: LIST_OF_WORDS =...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Droid Pentest

    Droid Pentest

    Droid Pentest New version help you to find all android apps for penetr

    Droid Pentest New version help you to find all android apps for penetration testing and hacking so you can make complete penetration test platform for Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc with More then 60 Plus App.
    Downloads: 29 This Week
    Last Update:
    See Project
  • 9
    SID-Wizard

    SID-Wizard

    Featureful native Commodore 64 music tracker with MIDI/XM converter

    A featureful SID-music creation tool (tracker) for the Commodore 64. It includes many advanced effects and tools like keyboard-tracking, tempo-programs/funktempo, gateoff-table-pointers, filter-shift, SID-export, executable-export, MIDI/XM conversion and MIDI-input hardware, etc., etc. NOTE: I left SourceForge for reasons not ethical to mention here. You can find me and my further work at these locations: http://hermit.sidrip.com http://csdb.dk/scener/?id=18806 https://github.com...
    Leader badge
    Downloads: 13 This Week
    Last Update:
    See Project
  • ManageEngine Endpoint Central for IT Professionals Icon
    ManageEngine Endpoint Central for IT Professionals

    A one-stop Unified Endpoint Management (UEM) solution

    ManageEngine's Endpoint Central is a Unified Endpoint Management Solution, that takes care of enterprise mobility management (including all features of mobile application management and mobile device management), as well as client management for a diversified range of endpoints - mobile devices, laptops, computers, tablets, server machines etc. With ManageEngine Endpoint Central, users can automate their regular desktop management routines like distributing software, installing patches, managing IT assets, imaging and deploying OS, and more.
  • 10
    ANDRAX Hacker's Platform

    ANDRAX Hacker's Platform

    Advanced Ethical Hacking and Penetration Testing Platform

    The most complete and Advanced Penetration Testing and Ethical Hacking Platform dedicated to Advanced Professionals. Developed to bring the power of Offensive Security in the anyone's pocket 100% OPEN SOURCE - ANDRAX is a independent solution for Security professionals who loves Linux
    Leader badge
    Downloads: 93 This Week
    Last Update:
    See Project
  • 11
    D0rganizer

    D0rganizer

    Program to manage data and information

    Store collected information and data properly using D0rgnizer (The organizer). Create cases, folders, files, and insert images. Compare information between files, and export data to share with your team. Useful for data collection in investigations, ethical hacking, and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Web Security Dojo

    Web Security Dojo

    Virtual training environment to learn web app ethical hacking.

    Web Security Dojo is a virtual machine that provides the tools, targets, and documentation to learn and practice web application security testing. A preconfigured, stand-alone training environment ideal for classroom and conferences. No Internet required to use. Ideal for those interested in getting hands-on practice for ethical hacking, penetration testing, bug bounties, and capture the flag (CTF). A single OVA file will import into VirtualBox and VMware. There is also an Ansible script...
    Leader badge
    Downloads: 248 This Week
    Last Update:
    See Project
  • 13
    Modlishka

    Modlishka

    Powerful and flexible HTTP reverse proxy

    Modlishka is a powerful and flexible HTTP reverse proxy. It implements an entirely new and interesting approach of handling browser-based HTTP traffic flow, which allows to transparently proxy of multi-domain destination traffic, both TLS and non-TLS, over a single domain, without the requirement of installing any additional certificate on the client. What exactly does this mean? In short, it simply has a lot of potential, that can be used in many use case scenarios. Modlishka was written as...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14

    Ethical Hacking - Pokhara

    Educating Nepalese on about Cyber Security & Ethical Hacking.

    This project is basically based on giving free/paid workshop/training/seminar on "Cyber Security & Ethical Hacking", to the people/students of Nepal. Being Nepali, I always thought of helping people of Nepal in New and Rising Topic of World. Now, that topic is "Cyber Security & Ethical Hacking". My involvement in this Project can be found in detail in my own website here : http://www.bijayacharya.com/about-me/bj-as-hacker/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Katana : Multi-Boot Security Suite
    Katana packages security / ethical hacking distributions (like Backtrack, Ophcrack, & UBCD) together with portable Windows applications (like Metasploit, NMAP, Cain & Able, & Wireshark) to run off a single USB flash drive.
    Downloads: 23 This Week
    Last Update:
    See Project
  • 16
    Viral Tool

    Viral Tool

    A smart malware creator to create 26 types of malwares.

    Viral Tool is a smart easy-to-use software specially designed for one sole purpose "Create Malwares" . In this era of computers, threats have increased more then before & that's why software's like these come in handy. With this software we can create malwares in different formats. We can view & edit the source code of those malwares. Ethical Hackers can use this software in a secure way during pen testing.
    Downloads: 22 This Week
    Last Update:
    See Project
  • 17
    Cyborg Essentials

    Cyborg Essentials

    Cyborg Essenitals is Debian based Penetration Testing Distro

    Cyborg Essenitals is all new series Debian based Penetration Testing Distro , a product of Cyborg Linux and cousin of Cyborg Hawk Linux . It is different from cyborg hawk as it is based on DEBIAN. It contains all the essentials tools a pro ethical hacker and security expert needs which makes it lightweight and half the size of Cyborg Hawk Linux. Its real strength comes from the understanding that a tester requires a strong and efficient system,that benefits from a strong selection of tools...
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18

    jsSID

    pure JavaScript SID soundchip emulator and player for Web Audio API

    A very lightweight (14kbyte, samplecycle-based) and fast SID emulator written entirely in pure JavaScript (from scratch) for the Web Audio API, supported by most major web-browsers. No need for Flash/Java or other plugins to play SID files directly in the browser by the visitors of the webpage... See it in action with an example playlist: http://hermit.sidrip.com/player.html NOTE: I left SourceForge for reasons not ethical to mention here. You can find me and my further work...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Abdal Anti GiliSoft USB Lock

    Abdal Anti GiliSoft USB Lock

    PowerFull Tool For ByPass GiliSoft USB Lock

    This Project Create By Ebrahim Shafiei For PenTest And Ethical Hacking . So This Tool Must Be Use in a Right Way . Thank You For Your Attention
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    KeyMestro_1.0

    Its Generic Key Logger

    Its the beta version of key logger and Intentionally developed for the Ethical Hacking purpose. and definitely it will help to Initial level Ethical hackers. This project is started on the back bench in walchand college of engg sangli and now comes into the picture.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    tocan-tweezer

    tocan-tweezer

    This is a womans developement project to enshure ethical production

    Hardware We strive to develop the most useful and practical Tweezer for eyebrows, which is open for others to develop further. The basic hardware developement contains individualisation to any prefered needs and standardisation of the Tweezer under hygienic conditions. Results will finish in a leaflet under CC-BY-SA license. Developement and production have strictly follow ethical requirements and healthier procurement. Member states shall take appropriate easures to enshure...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    HerMIDI

    MIDI-interface and test-app for C64

    This is essentially a hardware-release with test-suite and building-howto. HerMIDI is a MIDI-interface for the Commodore64. It's connected to the Serial Port and as such it can be daisy-chained through disk-drives on IEC bus. Designed for SID-Wizard 1.5 in the 1st place, but can be used with another applications too being an open-source project. NOTE: I left SourceForge for reasons not ethical to mention here. You can find me and my further work at these locations: http
    Downloads: 2 This Week
    Last Update:
    See Project
  • 23

    TEDzakker

    TED-chip music editor for Commodore Plus4, Commodore16 (and C64)

    This is a tracker-style music editor tool for the Commodore-Plus/4 / Commodore-16 computers' TED-chip. It can also be used on Commodore-64 by emulating the TED-sound, and later generating the native TED music on Plus4 or in VICE/Yape Plus4 emulators... NOTE: I left SourceForge for reasons not ethical to mention here. You can find me and my further work at these locations: http://hermit.sidrip.com http://csdb.dk/scener/?id=18806 https://github.com/hermitsoft/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    PentagonCrew DDoS Tool

    PentagonCrew DDoS Tool

    ## YOU NEED PYTHON 2.7 TO RUN THE SCRIPT ##

    https://www.python.org/download/releases/2.7/ A tool designed by members of PentagonCrew to help you easily take down websites. -Ethical uses only-
    Downloads: 21 This Week
    Last Update:
    See Project
  • 25
    hidden|neddih
    hidden|neddih is an .ova file for virtual machine. (you need to have virtual box or VMWare, or any other virtual machine software, installed into your pc) hidden!neddih is... • Anonymous with a full torified system • Ethical with non-invasive softwares, but with the right ones • Hacktivist with all you need to protest in the right way • Securest with the most advanced security standards • Easy the most user-friendly anonymous OS ever • IRC(er) with a full complete IRC bot...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next