Showing 126 open source projects for "web attacks"

View related business solutions
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
  • Omnichannel contact center platform for enterprises. Icon
    Omnichannel contact center platform for enterprises.

    For Call centers or BPOs with a very high volume of calls

    Deliver a personalized customer experience with every interaction, across every channel, with uContact, net2phone’s cloud contact center solution.
  • 1
    etherwall
    Etherwall is a free and open source network security tool that prevents Man in The Middle (MITM) through ARP Spoofing/Poisoning attacks. It Also prevent it from various attacks such as Sniffing, Hijacking, Netcut, DHCP Spoofing, DNS Spoofing, WEB Spoofing, and others. Note: For personal computer use only (client security) if you like this program, please give us your vote at http://sourceforge.net/projects/etherwall/reviews/
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Sutil! CMS is a "distro" of the consecrated CMS Joomla! 1.5, In respect to the Policy of using "brand name and logo" Joomla®, because it is trademarked. All extensions J1.5 can be installed in Sutil! CMS. Sutil! is Open Source / GPL - FREE !
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Xenophobe

    Block countries via iptables and gui menu with country flags.

    The purpose of this project is to geographically restrict access from countries to your server and simply iptables restrictions via a country code and not a large ip list. It is intended as a means of reducing unwanted attacks, brute force, spam, etc. not as a means to segregate access worldwide nor discriminate against any country. I have waned to package an rpm, and deb file that quickly allows most users to block ip addresses from ip blocks that have been geographically assigned...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    AntiDef

    Anti defacement command line tool

    AntiDef is written in order to handle with defacement attacks. This tool written in Java in a fast-and-dirty manner; However is works. This tool is working straight forward. Server administrator should run the application with the following specific parameters: path to the copy of the web site (source), path to the application directory, path to log directory and few more optional parameters. This tool compares the source and the destination files, then copies the "defaced" files if any...
    Downloads: 0 This Week
    Last Update:
    See Project
  • All-in-One Payroll and HR Platform Icon
    All-in-One Payroll and HR Platform

    For small and mid-sized businesses that need a comprehensive payroll and HR solution with personalized support

    We design our technology to make workforce management easier. APS offers core HR, payroll, benefits administration, attendance, recruiting, employee onboarding, and more.
  • 5

    GameOver

    Training and educating about the web security

    About GameOver: Project GameOver was started with the objective of training and educating newbies about the basics of web security and educate them about the common web attacks and help them understand how they work. GameOver has been broken down into two sections. Section 1 consists of special web applications that are designed especially to teach the basics of Web Security. This seciton will cover XSS CSRF RFI & LFI BruteForce Authentication Directory/Path traversal Command...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 6

    NoMoreXSS_JavaTool

    A java based tool that can block cross site scripting attacks

    A JAVA based tool developed by Vikas N P and Sharath Rao.. It can detect and block malicious users from inseting dangerous links into web pages and thereby prevent xss attacks
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    ... attacks by the privilege user or system administrator.A simple attack scenario could be that a customer pays a virtual machine at Amazon EC2 (Provider) and the systemadmin (Privilidged User) who is, for instance, threatened to be fired, has access to the same virtual machine state, this priviledged user can easily leak customer’s data. There is a need to secure the computation state during communication and storage and we achieve this through the implementation of a trusted platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Abstract—The security challenge coming with the popularity of web-based applications is a serious matter. The privacy of the data sent back and for has become a crucial issue. As a matter of fact, in one of their most recent publications, Chen et al analyzed this problem and showed that, although the existence of powerful communication security systems such as HTTPS, WPA/WPA2 Wi-Fi encryption, several high-scaled Webapps are exposed to side-channel attacks using timing and a subset...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    BanglaDos

    A Denial of Service Attacking Desktop App

    An open source network stress testing and denial-of-service attack application, initially developed by Samin Yasar. The idea behind BanglaDos is that it can allow you to participate in attacks even if you've no clue how to hack. It send thousand of garbage request to web servers like visa.com , paypal.com to shut them down. If many computers using BanglaDos pointed at a single site to make a real impact, letting a central administrator press the big button of website destruction makes...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
  • 10
    IT security resources

    IT security resources

    IT security resources for ethical hacking & penetration testing

    this collection of most used resources that will help you in ethical hacking and penetration testing. Collection of hacking tools and materials and all major type of attacks and tutorials.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    distributedPHP client

    distributedPHP client

    A simple script for distributed computing through PHP:

    distributedPHP client is a simple PHP script that can simultaneously activate/send data to as many web scripts as you want. You must open and configure the distributedPHP .php file prior to running it. ditributedPHP client supports activating scripts without data, sending the same data to all scripts, sending unique data to each script or sending user input to each script. Examples of use include: distributed math computation, encryption breaking, SETI@home/folding@home (well, if they made...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    SuStorID is an advanced Intrusion Detection System (IDS) for web services, based on machine learning. Its name comes from the term “Su Stori”, which in Sardinian language means “The Falcon”. It’s version is experimental, but demonstrates a number of interesting features, that can be readily exploited to detect and act against web attacks. SuStorID can be coupled with modsecurity, the well known web application firewall, to gather training data and provide for real-time counteractions. So...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Chess Queens
    Calculate the number of solutions to place n queens on an n*n chess board, without any queen attacking each other. Options allow using rooks instead of queens, disabling knight attacks and setting the minimum distance between queens.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Igino Corona and Davide Ariu and Giorgio Giacinto, "HMM-Web: a framework for the detection of attacks against Web applications", IEEE ICC 2009. Anomaly detection of server-side web attacks based on Hidden Markov Models (unsupervised learning).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    HoneyBadger is a highly interactive mutating honeypot designed to catch attacks ranging from simple worms to complex 0days in LAN or production web environments. It is based in a portable VM designed for low stress deployment and easy maintenance.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Ninja Phishing Framework
    it’s a free and open source phishing framework that helps the social-engineers in phishing attacks. and it’s includes alot of phishing pages and more stuff that helps you in phishing. the application is coded in PHP,XHTML,CSS,and Javascript.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    AgeOfEvolution
    browser game strategy divided in age. grow, attacks, wins. the game and being tested
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This product is no longer maintained: The author created alternative tools: https://databunker.org/ and https://privacybunker.io/ GreenSQL is a database firewall engine used to protect Open Source Databases from SQL injection attacks. It works in proxy mode. Application logic is based on evaluating of SQL commands using risk score factors, as well as blocking of sensitive commands
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    WSFuzzer
    WSFuzzer is a fuzzing penetration testing tool used against HTTP SOAP based web services. It tests numerous aspects (input validation, XML Parser, etc) of the SOAP target. It is only to be used against targets that have granted permission to be teste
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    sqlxsswaf
    C Based Open Source Web application firewall (WAF) for detecting SQL and xss attacks Simply works on the Access logs of Apache once an attack is detected it Grabs the Attackers IP and shoves it in an IPTables rule to drop once and for all.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    The CSRF Protector is a Firefox extension which attempts to detect and prevent CSRF attacks by looking for patterns in the possible ways of performing CSRF and blocking behaviors common to multiple types of CSRF attack
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Peruggia is designed as a safe, legal environment to learn about and try common attacks on web applications. Peruggia looks similar to an image gallery, but contains several controlled vulnerabilities to practice on.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23
    PHPCentaur
    PHPCentaur is a PHP5 driven exploit scanner for webservers. Scope of the project: -SQL exploits, Cros site scripting vulnerabilities, Remote code injection, Encoding vulnerabilities, Session based attacks. And more...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Java based webapp that utilizes TCP Wrappers to grant an IP access to a ssh server. Brute force attacks can be avoided while still allowing password based ssh access from multiple, changing IP values.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    mod_dnsblacklist is a Lighttpd module that use DNSBL in order to block spam relay via web forms, preventing URL injection, block http DDoS attacks from bots and generally protecting your web service denying access to a known bad IP address.
    Downloads: 0 This Week
    Last Update:
    See Project