Search Results for "network attack" - Page 6

Showing 144 open source projects for "network attack"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    This project presents an online real-time network intrusion detection system (Real-Time NIDS),which can determine within a very short time unit if the LAN is suffering from a flooding attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Detect your web servers being scanned by brute force tools and vulnerability scanners.Helps you quickly identify probable probing by bad guys who's wanna dig possible security holes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    TSeep is a local network proxy used to MITM SSL and other standard/non-standard TCP based protocols.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A threaded java MUD server with persistence in MySQL using sprocs. Uses command pattern and reflection for command parsing. NIO for networking. Excellent code comments. Map command uses visited rooms. Plans for configurable attack profiles per enemy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 5
    Mock in the Middle is a Java Proxy designed for testing network applications. It serves as a mock proxy between a client and a server. By recording and replaying network conversations, the client can later be tested without a live server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    DNAOnline is a web front-end to the DNA® (Distributed Network Attack®) decryption software from AccessData Corporation. It was developed by the E-Crime Investigative Technologies Lab at FSU and supported in part by NIJ grant 2005-DE-BX-K034.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    vSentinel is a customizable 3D mapping of your network monitoring or security data for real-time or trend-based attack and anomaly detection and analysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    ddaddos stands for ``detect DAD (Duplicate Address Detection) Denial of Service'', it's a deamon that sends periodically special IPv6 packets in order to spot a network under a DAD based attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    winKnocks is an encrypted(DES) port knocking tool. Knock sequences are defined through XML files; users specify: number of packets of each knock sequence, payload and header of each packet. Logging capability. Generation of smoke packets.No replay-attack
    Downloads: 1 This Week
    Last Update:
    See Project
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 10
    Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it's based on wepattack and GPL licensed
    Downloads: 7 This Week
    Last Update:
    See Project
  • 11
    syndetector is a software which can detect and drop packet when a synflood attack is detected ! Based on a simple detection system (by the use of iptables and libipq) and on a simple use It is realy easy to setup this software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Track Attack is a system for analysing data contained in log files. Track Attack can process different types of log files in parallel so as to get a time-ordered view of how events unfolded.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    EtherMan: Ethernet Man In The Middle Attack Tool. It is capable of forcing traffic between two hosts to pass by a third party (MITM) and then redirected to its original destination again. This program is written for educational reasons, and I am not res
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    IIM is an Instant Messaging Solution for corporate environments where IM programs like AIM and MSN have been banned. It is not firewall aware and only works within a switched network so it is not vulnerable to external attack. Uses .Net Framework 1.1
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Active dictionary attack on WEP keys in WLAN networks.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16
    The Port Scan Attack Detector (psad) make use of ipchains/iptables logs in the Linux 2.2 and 2.4 series kernels to detect port scans and other suspicious network traffic, including many of the tcp/udp/icmp signatures in Snort.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    NetBox is a software programmed in C for testing vulnerabilities in the network. Using this software you can attack your network using a combination of differents known attacks (ARP or DNS Spoofing, MITM, ...) and detect bugs of security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    TraceTree

    TraceTree

    TraceTree - Runtime behavioral analysis tool that maps the process cas

    ...TraceTree also includes a dedicated MCP server security module, because as AI agents proliferate, MCP servers have become a live attack surface that nobody was watching. The core insight is simple: malware can lie about what it is, but it can't hide what it does.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    PHPExtJS

    Built free and powerfull web application with ExtJS and PHP

    What is PHPExtJS ? We build one of great web application framework that full integrated between both of Server and Client Side framework together. To support this particular Web application, the frameworks are built using Yii PHP Framework to provide service for the client requests. Additionally, this web application also contain of latest ExtJS framework to provide high performance application interfaces such as native apps. Features: - Ext JS CRUD (Create, Read, Update, Delete) Code...
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB