Showing 105 open source projects for "attacks on player ip"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1
    SafeLine

    SafeLine

    Serve as a reverse proxy to protect your web services from attacks

    SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits. A web application firewall helps protect web apps by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web apps from attacks such as SQL injection, XSS, code injection, os command injection, CRLF injection, LDAP injection, XPath injection, RCE, XXE, SSRF, path traversal, backdoor, brute force, HTTP-flood, bot abuse, among others. By...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    bettercap

    bettercap

    The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks

    bettercap is a powerful, easily extensible and portable framework written in Go which aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking WiFi networks, Bluetooth Low Energy devices, wireless HID devices and Ethernet networks.
    Downloads: 56 This Week
    Last Update:
    See Project
  • 3
    CrowdSec

    CrowdSec

    Firewall able to analyze visitor behavior & provide adapted response

    CrowdSec - an open-source massively multiplayer firewall able to analyze visitor behavior & provide an adapted response to all kinds of attacks. It also leverages the crowd power to generate a global IP reputation database to protect the user network. Crowdsec shouldn't, and didn't crash any production so far we know, but some features might be missing or undergo evolutions. IP Blocklists are limited to very-safe-to-ban IPs only (~5% of the global database so far, will grow soon). ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    WAF package for Laravel

    WAF package for Laravel

    Web Application Firewall (WAF) package for Laravel

    This package intends to protect your Laravel app from different type of attacks such as XSS, SQLi, RFI, LFI, User Agent, and a lot more. It will also block repeated attacks and send notifications via email and/or slack when an attack is detected. Furthermore, it will log failed logins and block the IP after a number of attempts. Some middleware classes (i.e. Xss) are empty as the Middleware abstract class that they extend does all of the job, dynamically.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    Proton VPN for Android

    Proton VPN for Android

    ProtonVPN Android app

    The Proton VPN app for Android is intuitive to use, offers lots of useful features, and keeps you secure and private when surfing the internet. Once the app is installed, open it and log in with your Proton VPN username and password. If you are a Proton Mail user, you can access the Proton VPN Free plan by logging in with your Proton Mail username and password. Touch the Quick Connect button to automatically connect to the fastest VPN server for your location. You can also choose to connect...
    Downloads: 749 This Week
    Last Update:
    See Project
  • 6
    endlessh-go

    endlessh-go

    A golang implementation of endlessh exporting Prometheus metrics

    Endlessh is a great idea that not only blocks the brute force SSH attacks, but also wastes attackers time as a kind of counter-attack. Besides trapping the attackers, I also want to visualize the Geolocations and other statistics of the sources of attacks. Unfortunately the wonderful original C implementation of endlessh only provides text based log, but I do not like the solution that writes extra scripts to parse the log outputs, then exports the results to a dashboard, because it would...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Impacket

    A collection of Python classes for working with network protocols

    Impacket is a collection of Python classes designed for working with network protocols. It was primarily created in the hopes of alleviating some of the hindrances associated with the implementation of networking protocols and stacks, and aims to speed up research and educational activities. It provides low-level programmatic access to packets, and the protocol implementation itself for some of the protocols, like SMB1-3 and MSRPC. It features several protocols, including Ethernet, IP, TCP,...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Pokete

    Pokete

    A terminal based Pokemon like game

    Pokete is a small terminal-based game in the style of a very popular and old game by Gamefreak. Imagine that you’re a Pokete Trainer and you travel around the world to catch/train as many Poketes as possible with the ultimate goal of becoming the best trainer. First of all you get a starter Pokete (Steini), that you can use to fight battles with other Poketes. Use W, A, S and D to move around. When entering the high grass (;), you may be attacked by a wild Pokete. By pressing 1 you can...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Tempesta FW

    Tempesta FW

    All-in-one solution for high performance web content delivery

    Tempesta FW is an all-in-one open-source solution for high performance web content delivery and advanced protection against DDoS and web attacks. This is a drop-in-replacement for the whole web server frontend infrastructure: an HTTPS load balancer, a web accelerator, a DDoS mitigation system, and a web application firewall (WAF). Tempesta FW is the first and only hybrid of a Web accelerator and a multi-layer firewall. This unique architecture provides seamless integration with the Linux...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 10

    LAC Gun Camera Player

    Linux Air Combat utility to launch "Replay Bloke" missions

    Linux Air Combat users can ask the LAC Server to record their online activities as "GunCamera Films". All of the recorded online activity can then be "replayed" by this utility as if it were coming from one or more humans connected to the LAC Server. This utility will look for a folder named "Playlist", containing one or more GunCamera Film files with names like "LacFilm230502aa.lgc". Every *.lgc" file is transmitted, one at a time, into the LacServer, duplicating all of the same...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Chat of Death
    Chat of Death is an anonymous, peer-to-peer encrypted communication application designed for maximum privacy and security. Maybe you guys will have better luck with it then I do. There's a bit of latency do to the Tor network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Wurst Client

    Wurst Client

    Wurst Client - versatile Minecraft hacked client

    Wurst Client is a versatile Minecraft hacked client designed to enhance your gameplay experience with an array of powerful features. Known for its intuitive user interface, Wurst provides players with tools to customize their game, from combat enhancements to movement modifications. Wurst is regularly updated to remain compatible with the latest Minecraft versions, backed by a supportive community that shares tips and custom scripts. While it offers exciting possibilities, players should...
    Leader badge
    Downloads: 356 This Week
    Last Update:
    See Project
  • 13
    Morse Code Tools

    Morse Code Tools

    Translate RSS/Atom feeds & Files into Morse, send Morse from Key/Mouse

    Two programs: (1) MorseNews sends news from one or more RSS and Atom feeds as Morse code, and (2) MorseKeyer, an iambic/bug keyer with mouse & serial key/paddle. Both play CW or sounder audio with optional Rayleigh fading and static crashes, and drive external sounder, loop, or ham rig. See http://morse-rss-news.sourceforge.net/
    Leader badge
    Downloads: 20 This Week
    Last Update:
    See Project
  • 14
    Slim Camera

    Slim Camera

    Slim Camera - Lightweight RTSP Video Player

    Slim Camera is a lightweight RTSP viewer for IP cameras. On first launch, it prompts for the stream URL (saved for future sessions) and runs in the system tray to avoid taskbar clutter. It remembers window position, size, and camera URL via an INI file for seamless reuse. The interface keeps distractions minimal - just the video stream in an auto-sizing window. Right-click the tray icon to change the camera URL, restart the stream, reset window position, or exit. Press F1 to quickly...
    Downloads: 77 This Week
    Last Update:
    See Project
  • 15
    User Registration and Custom Login

    User Registration and Custom Login

    WP plugin for user sign-up/login, social login, invites, and payments

    The WordPress user registration and login plugin offers a customizable sign-in and user registration form, featuring social sign-in options through Google and Facebook. This plugin supports invitation codes for user registration, includes email verification for new registrations, integrates payment options, and allows for management of user roles upon registration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This is one of the most popular Doom source ports. It is available for DOS, Windows, Linux and Mac OS X, and should build on any POSIX platform which supports SDL. It enhances Doom with things like TCP/IP networking, OpenGL renderer, Heretic support and much more.
    Leader badge
    Downloads: 109 This Week
    Last Update:
    See Project
  • 17
    pH7 Social Dating CMS (pH7Builder)❤️

    pH7 Social Dating CMS (pH7Builder)❤️

    🚀 Professional Social Dating Web App Builder (formerly pH7CMS)

    pH7Builder is a Professional, Free & Open Source PHP Social Dating Builder Software (primarily designed for developers ...). This Social Dating Web App is fully coded in object-oriented PHP (OOP) with the MVC pattern (Model-View-Controller). It is low resource-intensive, extremely powerful and highly secure. pH7Builder is included with over 42 native modules and is based on its homemade pH7 Framework which includes more than 52 packages To summarize, pH7Builder Social Dating Script...
    Downloads: 29 This Week
    Last Update:
    See Project
  • 18

    Candy to the Rescue IV

    Help Candy & Noopy to rescue their friends trapped into cages.

    Recently, the new project Candy to the Rescue IV: The Scepter of Thunders was born. In this game, Candy and Noopy must find pendora boxes in order to remove the new dangers appeared in the game. Animals got trapped into cage, you must find the key to freed them. New trees, new challenges. Recently, in the Candy World, thunderstorms was happening. It's the v65.95 of this game! Friendly, Xylvan, Xilvan Design Made from 2011-2026.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19

    Candy's Space Mysteries II

    With the helpfull nef, you have to rescue earthlike planets!

    During their recent spacetrip, Candy & Noopy get trapped into a giant wormhole! They made a long light trip and found a passage who leads to the Milky Way. They was searching for a place to land, they have found the Earth. Knowing that great cataclysms are menacing their homeplanet, Candy & Noopy said together: - "We must save the Earth!". Since some times, the star masses, combined with the magnetic-fields of this planet gave special powers to the spaceship: The one of...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20

    Candy's Space Adventures

    In this quest, you will have to explore galaxies with various nefs..

    Hi everyone, In the year 2014-2026, I was working on: Candy's Space Adventures: The Messages from the Lillians. In this quest, it will be possible to travel from different solar system to another, from a galaxy to another. The goal will be to save all living planet, and maybe repairing planets like venus or mars. We are now at v86.37! Friendly, Xylvan, Xilvan Design.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    Capacity Planning & Management Software

    Capacity Planning & Management Software

    Free & Open Capacity Planning Software in a Complete Virtual Machine

    Every Profession has some sort of Resource to manage, be it materials, money, physical or logical resources & with it some vital queries to be answered: At what Rate is my Resource getting consumed? How Long will current stock last? What will be near future requirement? In Just Two Simple steps of Defining Your Resource & Actively Tracking its Consumption, you will be in total control of your Resource, with this Software. After starting this VM, from any PC on your Local Network,...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    TheMatrixVM
    An intentionally designed vulnerable machine 'boot2root' challenge for beginners. Setup You will need Virtual Box or VMWare Player to import the OVA file included in this repository. I have tested this using Windows 10 and VirtualBox version 7. 1. Set the network adapter to host-only or bridge mode, so that you can launch the virtual machine. 2. Monitor the console for messages if all goes well you should spot the VM receiving an IP address. 3. Attempt to SSH to the machine ssh test@<ip.seen.from.console> 4. ...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 23
    DDoS/Dos Attack Simulator

    DDoS/Dos Attack Simulator

    Distributed Denial of Service Attack Simulator

    DDoS/DoS Attack Simulator is powerful Python-based software used for attacking servers, hosts, and websites using traffic. It disrupts the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. A server that does not have protection against it can experience extremely slow performance due to all of the traffic it sends. Extensive features will be added! Mega Feature - > DoS Tool. [ 1 ]...
    Leader badge
    Downloads: 12 This Week
    Last Update:
    See Project
  • 24
    Zero Site Protector

    Zero Site Protector

    Human verification & attack prevention for website security

    The zero-site-protector plugin is a powerful security tool for your website that provides multiple layers of protection to safeguard against unauthorized access and potential attacks. The plugin includes features such as human verification, which ensures that only legitimate users are able to access your site. It also includes protection against various types of attacks such as cross-site scripting (XSS) and SQL injection. Additionally, the plugin allows you to block access to your site from certain geographical regions, IP addresses, and browsers, providing an extra layer of security. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    NetRummy is a basic rummy game in card games. Using this software, Rummy game can be played over LAN, intranet using TCP/IP between two players. The deck consists of 52 cards with 4 suites, Diamond, Flower, Heart and Spade. Each suit consists from low to high Ace 2 3 4 5 6 7 8 9 10 Jack Queen King. The first dealer is chosen by server or by toss. Each player play with 13 cards and one card will be placed open in the screen and other cards are kept aside.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB