Showing 71 open source projects for "illegal"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 1
    Flipper Zero Unleashed Firmware

    Flipper Zero Unleashed Firmware

    Flipper Zero Unleashed Firmware

    Flipper Zero Unleashed Firmware. This software is for experimental purposes only and is not meant for any illegal activity/purposes. We do not condone illegal activity and strongly encourage keeping transmissions to legal/valid uses allowed by law. Also, this software is made without any support from Flipper Devices and is in no way related to the official devs.
    Downloads: 67 This Week
    Last Update:
    See Project
  • 2
    Download Youtube Video in Golang

    Download Youtube Video in Golang

    Download Youtube Video in Golang

    This tool is meant to be used to download CC0 licensed content, we do not support nor recommend using it for illegal activities. It's really simple to use, just get the video id from the youtube URL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Pholcus

    Pholcus

    Distributed high-concurrency crawler software written in pure golang

    ....); In addition, it also supports horizontal and vertical grabbing modes, and a series of advanced functions such as simulated login and task suspension and cancellation. This software is only used for academic research, users need to abide by the relevant laws and regulations of their location, please do not use it for illegal purposes! Provide users with a certain Go or JS programming foundation with a heavyweight crawler tool that only needs to pay attention to rule customization and complete functions.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    LiquidHaskell

    LiquidHaskell

    Liquid Types For Haskell

    This is the development site of the LiquidHaskell formal verification tool. If you're a LiquidHaskell user (or just curious), you probably want to go to the documentation website instead. LiquidHaskell (LH) refines Haskell's types with logical predicates that let you enforce important properties at compile time. LH warns you that head is not total as it is missing the case for [] and checks that it is total on NonEmpty lists. The input contract propagates to uses of head which are verified...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    Sippts

    Sippts

    Set of tools to audit SIP based VoIP Systems

    ...Sippts is programmed in Python and it allows us to check the security of a VoIP server using SIP protocol. You can freely use, modify and distribute. If modified, please put a reference to this site. Most security tools can be used for illegal purposes, but the purpose of this tool is to check the security of your own servers and not to use to do bad things. I am not responsible for the misuse of this tool. Sippts is a set of tools to audit VoIP servers and devices using SIP protocol. Sipscan is a fast scanner for SIP services that uses multithread. Sipscan can check several IPs and port ranges and it can work over UDP or TCP. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    spyware

    A complete SpyWare.

    ...This spyware is a python package compiled for Windows. This spyware is not a virus, it does not export any data to a server. Data is stored locally only. Do not use it for illegal purposes. - Save keyboard events - Record from microphone - Save files metadata in CSV file - Screenshots - Pictures from Webcam - Domains and IP addresses from metadata - Save clipboard
    Downloads: 10 This Week
    Last Update:
    See Project
  • 7
    EmLogs (NoCheating)

    EmLogs (NoCheating)

    A maneira mais prática de verificar se alguém está usando cheats.

    por: Desenvolvido para auxiliar na detecção de programas ilegais utilizados em jogos. eng: Developed to assist in the detection of illegal programs used in games.
    Leader badge
    Downloads: 14 This Week
    Last Update:
    See Project
  • 8

    ErrFlags

    Fidonet nodelist checker

    This program checks incoming fidonet technology nodelist segments for illegal and redundant nodelist flags, and makes sure submitted segments are up to standard. Fully configurable to suit <othernets> as well as fidonet.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    silverbullet config AdsVictory

    silverbullet config AdsVictory

    A modular SilverBullet configuration for authorized password‑audit

    ...Important: This tool is intended only for ethical security testing on systems you own or have explicit written permission to test. Unauthorised use against AdsVictory or any other website is illegal. The config works by: Leveraging SilverBullet’s JavaScript execution and HTTP request capabilities. Loading custom wordlists (rockyou, SecLists, etc.) from your local machine.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    More flexibility. More control.

    Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 10

    ACME Cross-Assembler

    multi-platform cross assembler for 6502/6510/65816 cpu

    ACME is a free cross assembler released under the GNU GPL. It can produce code for the following processors: 6502, 6510 (including illegal opcodes), 65c02 and 65816. ACME supports the standard assembler stuff like global/local/anonymous labels, offset assembly, conditional assembly and looping assembly. It can include other source files as well as binaries while assembling. Calculations can be done in integer or float mode. Oh, and it is fast.
    Leader badge
    Downloads: 57 This Week
    Last Update:
    See Project
  • 11
    aBLhackPsw

    aBLhackPsw

    aBLhackPsw v7.0 - Password recovery tool

    ...aBLhackPsw is a password recovery tool - utility for recovering forgotten or lost password. With this program you can see asterisks ***** password from ***** fields (Outlook Express, Total Commander (FTP) and other programs). There is no illegal password hacking technique involved, it only reads or uncovers hidden password character that are covered by asterisks. This program don't need to install. You can to write into flash device or the others devices and work with program with the others computers. Multilingual User Interface (English, Lithuanian, Russian) Work on Windows (x32/x64) 98/ME/NT/2000/2003/XP/VISTA/2008/Windows 7/8/10/11
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    mirai

    mirai

    Efficient QQ Robot support library

    ...If citing a package published by mirai without modifying mirai, derived projects should mention the use of mirai anywhere in the description. Synchronize messages from other clients. Send messages to other clients. All development is for learning, do not use for illegal purposes.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    Social Surge

    Social Surge

    Automate youtube views locally with Social Surge

    ...Users are solely responsible for understanding and complying with the terms of service and legal obligations of any platform or service they interact with while using this software. The developers and providers of this software bear no responsibility for any unauthorized, illegal, or unethical use of this software.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14
    ToolGood.Words

    ToolGood.Words

    A high-performance sensitive word

    A high-performance sensitive word (illegal word/dirty word) detection and filtering component, with a traditional and simplified exchange, supports full-width half-width exchange, Chinese characters to pinyin, fuzzy search, and other functions. C#Language, using StringSearchEx2.Replacefiltering, on a 48k sensitive thesaurus at over 300 million characters per second. (cpu i7 8750h).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Huorong Security

    Huorong Security

    antivirus software

    Operation mode: EDR operation system, network-wide threat awareness With the Huorong terminal as the cornerstone, while protecting users, it detects various threats, aggregates and analyzes threat information to form a solution, and responds on the terminal Professional Release: Tracing and Analyzing Viruses, Exposing Hooligans and Black Products Trace the source and analyze various viruses, follow the clues to expose rogues, illegal activities and black industry chains, and protect users from being affected Enterprise products: manage enterprise terminals and provide exclusive services While managing terminals and maintaining enterprise security, it provides a fast problem-solving channel, allowing enterprises to enjoy exclusive and professional services Personal product: quiet, simple and easy to operate, focusing on defense It seamlessly integrates functions such as virus killing, system defense, firewall, device control, etc., and the default configuration can protect nearly
    Downloads: 24 This Week
    Last Update:
    See Project
  • 16
    ZY Player

    ZY Player

    ZY Player repository

    ...Full platform support. Windows, Mac, Linux. All resources are from the Internet, the software does not participate in any production, uploading, storage, etc., and the dissemination of illegal resources is prohibited. This software is for learning reference only, please delete it within 24 hours after installation. Play history, and automatically jumps to history progress. Favorites support import, export, support for synchronous drama. Support simplified mode, fish, and paddle. Search all resources with one click, and support historical search records. ...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 17
    vim-fugitive

    vim-fugitive

    A Git wrapper so awesome, it should be illegal

    vim-fugitive is a feature-rich Git wrapper for Vim that turns the editor into a powerful Git UI. It provides commands that mirror common Git operations—status, blame, commit, stash, rebase—while threading results into split windows and buffers you can navigate. One hallmark is :Gblame, which overlays line-level authorship directly in your file, allowing fast debugging of changes and context. Another is the tight integration with diffs and staging: you can stage or reset hunks interactively...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    HC6800EM3

    HC6800EM3

    English Examples Projects for HC6800EM3 MCU devkit

    This project translates and rewrites C-code examples for the Prechin's MCU devkit, since original docs & examples were released in Chinese. Besides, some illegal stuff from original CD will be removed.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    udemy-dl

    udemy-dl

    A cross-platform python based utility to download courses from udemy

    A cross-platform python-based utility to download courses from Udemy for personal offline use. Udemy has started to encrypt many of the course videos, so downloading them may be impossible/illegal because it involves decrypting DRM'd videos which opens up the author to DMCA takedowns/lawsuits. If you use udemy-dl and some/all videos are skipped, please don't open a new issue or comment that the issue still exists. All requests to bypass DRM/encryption will be ignored.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 20
    webshell

    webshell

    This is a webshell open source project

    ...All shells themselves do not guarantee whether there is a backdoor, but I will never add a backdoor deliberately when uploading by myself. Please don’t add a backdoor if you submit it. If you find backdoor code, please issue. The tools provided by this project are forbidden to engage in illegal activities. This project is for testing purposes only. All the consequences caused by it have nothing to do with me.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    openddos-deluxe

    A free Python DDoS script I made for EDUCATIONAL PURPOSES.

    It's probably the best DoS python script out there that is for free (to my knowledge). I made this for educational purposes, It is not under my responsibility if an individual uses my application for illegal purposes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Nethunter&Andrax-android-10

    Nethunter & Andrax Kernel

    **This is only for Z2 PLUS running on Android 10** ***This is for educational purpose only, I AM NOT RESPONSIBLE FOR ANY MISUSE OR ILLEGAL USAGE**** This is the kernel required by Nethunter & Andrax Pentesting platforms to make use of the WiFi Adapter via OTG for WiFi Pentesting.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 23
    TheFatRat

    TheFatRat

    Thefatrat a massive exploiting tool

    ...TheFatRat provides an easy way to create backdoors and payload which can bypass most anti-virus. This tool is for educational purposes only, usage of TheFatRat for attacking targets without prior mutual consent is illegal. Developers assume no liability and are not responsible for any misuse or damage caused by this program. This tool compiles a malware with popular payload and then the compiled malware can be executed on Windows, Android, and Mac.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 24

    MP3 File Organizer

    Efficient MP3 File Organizer

    First release of my Mp3 File Organizer 3 Pass MP3 File Organizer. Program can run in the background. It does not take any memory nor resources. Select Root Directory of MP3 Music and this program will reorganize it recursively according to: 1) Artist Name 2) Album Name 3) Will rename each MP3 to: Artist Name - Song Name.mp3 and will move file it to proper folder. The program also deletes empty folders. If you ever get any errors, this program will temporarily stop so you can...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    CodeNames

    CodeNames

    CodeNames is a simple C# library for random identifier generation.

    CodeNames is a simple C# library for random identifier generation. It is intended to be used for renaming variables for source code manipulation. We are using evolutionary approach in developing our open-source software and this is an early version, so it is not very advanced, but is usable, tested and well documented.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next
MongoDB Logo MongoDB