Showing 186 open source projects for "defense"

View related business solutions
  • Achieve perfect load balancing with a flexible Open Source Load Balancer Icon
    Achieve perfect load balancing with a flexible Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    Boost application security and continuity with SKUDONET ADC, our Open Source Load Balancer, that maximizes IT infrastructure flexibility. Additionally, save up to $470 K per incident with AI and SKUDONET solutions, further enhancing your organization’s risk management and cost-efficiency strategies.
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
  • 1
    Mindustry

    Mindustry

    An open-source sandbox tower defense game

    Mindustry is a tower-defense sandbox factory game. Build supply chains of conveyor belts to fuel your turrets, produce materials for building, and defend your structures from waves of enemies.
    Downloads: 117 This Week
    Last Update:
    See Project
  • 2
    Udp2raw-tunnel

    Udp2raw-tunnel

    Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic

    A tunnel which turns UDP traffic into encrypted fakeTCP/UDP/ICMP traffic by using Raw Socket, helps you bypass UDP FireWalls(or unstable UDP environment). When used alone, Udp2raw tunnels only UDP traffic. Nevertheless, if you used udp2raw + any UDP-based VPN together, you can tunnel any traffic(include TCP/UDP/ICMP), currently, OpenVPN/L2TP/ShadowVPN and tinyfecVPN are confirmed to be supported. Linux host (including desktop Linux,Android phone/tablet,OpenWRT router,or Raspberry PI) with...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 3
    Kata Containers

    Kata Containers

    Build a standard implementation of lightweight Virtual Machines (VMs)

    Kata Containers is an open source container runtime, building lightweight virtual machines that seamlessly plug into the container ecosystem. Kata Containers is an open source community working to build a secure container runtime with lightweight virtual machines that feel and perform like containers, but provide stronger workload isolation using hardware virtualization technology as a second layer of defense. Since launching in December 2017, the community successfully merged the best parts...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Apache APISIX

    Apache APISIX

    The cloud-native API gateway

    ... is especially suitable for API management under micro-service system. You can use Apache APISIX as a traffic entrance to process all business data, including dynamic routing, dynamic upstream, dynamic certificates, A/B testing, canary release, blue-green deployment, limit rate, defense against malicious attacks, metrics, monitoring alarms, service observability, service governance, etc.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Securden Privileged Account Manager Icon
    Securden Privileged Account Manager

    Unified Privileged Access Management

    Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.
  • 5
    Rebuff

    Rebuff

    LLM Prompt Injection Detector

    A self-hardening prompt injection detector. Rebuff is designed to protect AI applications from prompt injection (PI) attacks through a multi-layered defense. Rebuff is still a prototype and cannot provide 100% protection against prompt injection attacks. Add canary tokens to prompts to detect leakages, allowing the framework to store embeddings about the incoming prompt in the vector database and prevent future attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Santa

    Santa

    A binary authorization system for macOS

    ... and server. Santa is built to help protect users by stopping the spread of malware and analyzing what's running on a computer, but is by no means a total security system. Ideally Santa works as a part of a defense-in-depth strategy, and other measures should be in place to protect hosts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Latte

    Latte

    The safest & truly intuitive templates for PHP

    The first truly secure and intuitive templates for PHP. The most common critical vulnerability in websites is Cross-Site Scripting (XSS). It allows an attacker to insert a malicious script into a page that executes in the browser of an unsuspecting user. It can modify the page, obtain sensitive information or even steal the user's identity. Templating systems fail to defend against XSS. Latte is the only system with an effective defense, thanks to context-sensitive escaping. Latte is based...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Blooket

    Blooket

    Collection of utilities that interact with the Blooket API / website

    A collection of scripts and programs designed to interact with the Blooket API and website to give users advanced control over stuff. Utilities that interact with the Blooket API / website. For IOS please view the IOS/Apple section of this file, for Android/Samsung/Google OS please view the bookmarklet section. Before running the script on the Blooks page, make sure you click on a non-common blook. Check for any mistakes you may have made. If you are certain it is a problem with the code, go...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    Huorong Security

    Huorong Security

    antivirus software

    ... being affected Enterprise products: manage enterprise terminals and provide exclusive services While managing terminals and maintaining enterprise security, it provides a fast problem-solving channel, allowing enterprises to enjoy exclusive and professional services Personal product: quiet, simple and easy to operate, focusing on defense It seamlessly integrates functions such as virus killing, system defense, firewall, device control, etc., and the default configuration can protect nearly
    Leader badge
    Downloads: 33 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • 10
    GpgFrontend

    GpgFrontend

    A Free, Easy-to-Use, Cross-Platform OpenPGP Crypto Tool.

    GpgFrontend is a Free, Open Source, Powerful, Easy-to-Use, Compact, Cross-Platform OpenPGP Crypt Tool. Also, it's one of the excellent GUI Frontends for Modern GnuPG (gpg). By using GpgFrontend, you can quickly encrypt and decrypt text or files. You can also digitally sign your text or files.GpgFrontend does not need to depend on any server, therefore it may be one of the last lines of defense in protecting your privacy. Please use this tool to transmit or store information that you regard...
    Downloads: 30 This Week
    Last Update:
    See Project
  • 11
    Open source Algol 68 implementations

    Open source Algol 68 implementations

    Implementations for the Revised Report language

    ... of the vintage Algol68RS (UK Defense Research Agency) compiler. The implementation emits C code.
    Leader badge
    Downloads: 16 This Week
    Last Update:
    See Project
  • 12
    WP Email Registration Blacklist Plugin

    WP Email Registration Blacklist Plugin

    WordPress plugin to block or allow user registrations

    The WordPress Email Registration Blacklist plugin empowers site administrators with the ability to regulate user interactions. It enables the blocking or approval of user registrations, comments, and form submissions, contingent on specified email addresses or domains. The plugin’s flexibility lies in its whitelist feature, which allows administrators to selectively permit engagement from approved entities. Functioning as a robust defense against spam and unauthorized activities, the plugin...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    OpenDDS

    OpenDDS

    OpenDDS is open source publish/subscribe middleware

    ... by organizations in the Aerospace/Defense, Manufacturing/Fabrication, Home Automation, Finance, and other domains.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Fast Wipe

    Fast Wipe

    Fast Wipe

    - Fast Wipe: wipe files and/or free hd space FAST! - Fast wipe has also secure deletion! wipe&fswipe now supports up to 12 different wipe standards. - It works from command line: windows and linux os available. - Works on any mounted partition. - Added windows installer - Completely Rewritten and Improved - Fixed windows execution usn
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    BlooketHack

    BlooketHack

    One of the First Blooket hacks online

    First you must download python 3.7. On install you do need to check the "Add to path" option when you can do so. Second you must download the code here on GitHub. Third you need to extract the files from the .zip file you downloaded. Finally, just double click the main.py file. Original code by: kgsensei. Works on most game modes, Gold Quest (Tested - Working) Tower Defense (Tested - Working) Café (Tested - Working) Factory (Tested - Working) Racing (Tested - Working) Classic (Tested - Working...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    Gestão de Clientes Defense
    Software para gerenciamento de clientes, serviços e parceiros para a empresa Defense Antimultas
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Betabot

    Betabot

    BDEF, WIE, MInfantry AI opponent

    A basic Bot for old half life 1 mod Support: -Base Defense version 1605: Betabot0001 -War In Europe beta 3: Betabot0101 -Mobile Infantry Beta 1- Training camp: betabot0200
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18

    NexusVX

    Open source OWASP SelfBot For Defense And Offensive Use

    What is a selfbot? ++++++++++++++++++++++++++++++++++++++++++++++++++++++++ A selfbot is basically a bot inside your own account. It uses your token to post messages as you. It reacts to you and you only. A token is a small piece of encrypted text. Its basically a key to run Discord applications, it will need to connect to the account the app should run on. That’s why both bot accounts and user accounts have tokens. Since selfbots have access to the Discord API (Application Programming...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Parrot Project

    Parrot Project

    Security, Development and Privacy Defense, all in one place.

    Parrot is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on Debian and developed by Frozenbox network.
    Leader badge
    Downloads: 288 This Week
    Last Update:
    See Project
  • 20
    PyBluesky

    PyBluesky

    PyBluesky is a simple 2D python game developed using the pygame framew

    Your objective should you choose to accept is to navigate your jet without getting hit by the incoming missiles. For self-defense you can shoot down the enemy missiles. You are armed with 100 special missiles. Level-up awards you another 50 special missiles and a power-up star which will instantly deactivate all the enemy missiles.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    dwarf defense
    This roguelike game looks like tower defense games but also allows craft and dig.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    JonDoFox Advanced Privacy Browser

    JonDoFox Advanced Privacy Browser

    Browser with fingerprinting- and psychological profiling protection

    ... at the EFF fingerprinting test page. This can't be reached with common addons, but our Browser provides it. In the last line of defense, we do provide fluctuating IPs with proxies Update v2.0: -Based on Firefox 70.0 Beta (15.09.2019) -Added proxy scraper/checker/configurator Note: currently, facebook chat is broken. To increase security, use a hosts file black list in adition to your adblocker, like this one: https://github.com/StevenBlack/hosts
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Laravel Larabbs

    Laravel Larabbs

    A forum project base on Laravel

    Laravel is a web application framework with expressive, elegant syntax. We believe development must be an enjoyable and creative experience to be truly fulfilling. Laravel takes the pain out of development by easing common tasks used in many web projects. Laravel has the most extensive and thorough documentation and video tutorial library of all modern web application frameworks, making it a breeze to get started with the framework.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 24

    Earth Defender

    Isometric 2d Tower defence game for Android

    Tower defense game in 2d isometric view for Android devices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    BIGBANG Tower Defense

    BIGBANG Tower Defense

    Tower Defense

    BIGBANG Tower Defense is an endless tower defense game centered around upgrades and chaotic, strategic fun. https://github.com/IanRD/CSAS-Game-Project
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next