Showing 10 open source projects for "intruder"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    Payloads All The Things

    Payloads All The Things

    A list of useful payloads and bypass for Web Application Security

    A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques. The API key is a unique identifier that is used to authenticate requests associated with your project. Some developers might hardcode them or leave it on public shares.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    cintruder

    cintruder

    CIntruder - OCR Bruteforcing Toolkit

    Captcha Intruder is an automatic pentesting tool to bypass captchas. -> CIntruder-v0.4 (.zip) -> md5 = 6326ab514e329e4ccd5e1533d5d53967 -> CIntruder-v0.4 (.tar.gz) ->md5 = 2256fccac505064f3b84ee2c43921a68 --------------------------------------------
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    VenSafe

    VenSafe

    Free, secure, customizable and the best folder locker software!

    [UPDATE! - VenSafe 2.0.1.2) VenSafe, the best of its kind; A Folder/USB locker software by Rahul M. The all-new VenSafe is ready with its simple, smooth and friendly GUI. This version is far more secure comes with all kinds of bugs, bypasses and cheats fixed. The password can no longer be edited by others from outside. Everything's in the Settings. It's impossible to crack through your folder once it's locked. In case you forget you VenSafe password, you can request for a recovery...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    SNET (Several Network Explore Tool) allows you to safely browse, discover and exploit vulnerabilities in your network, replicating the kinds of access an intruder can achieve, and proving actual paths of attacks that must be eliminated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    SpyCam free android security

    SpyCam free android security

    free android spy camera security

    Now with SpyCam Security application ,you don't have to worry about who handles your device in your absence.This app will give you photographic proof of intruders trying to enter into your device. When any intruders enters wrong unlock pattern,this app will take a snapshot of intruder with front camera . When intruder enters wrong unlock pattern 3 times,unlock pattern will reset to secure code provided during installation. ******If you forget to provide SECURE CODE,then default secure...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    9Locker

    9Locker

    Lock your computer like smartphone

    What is 9Locker ? A practical security application that provides you with the means to lock and unlock your computer using a simple pattern tracing action. Features : * Quicker way to lock your computer. * Use the mouse/finger to unlock your computer. * Support Touch Screen. * Send email notification * Use webcam to send a video attachment of the intruder to your email. * Support Multiple Monitors. * Change pattern-lock background : Image / Color. * Prevent RDP(Remote Desktop...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Python sniffer that identifies interactive SSH sessions. It detects when an intruder uses SSH with: a wrong password, a good one or with a password cracking program. It uses two techniques: SSH client's banner identification and SSH session total by
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    RIDSystem

    capturing packet and detecting intruders with their signature

    Introduction: This project has been developed to detecting intruder activity in your network according to the existing signature of intrusion attacks,Anomalous behaviour etc... Scope: Government authorities has lot of information about defence,revenue,income tax and many informations. Intrusion Detection System will certainly minimize the unauthorized access and take immediate response to stop such illegal works. MNCs manages their whole information system using application...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    JHoney is a honeypot tool for Linux written in Java. It simulates vulnerable net services to trick an attacker or trojan to attack them. The attacker IP is blocked once a service is attacked, and then the intruder cannot attack for example webservers.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Let your volunteer coordinators do their best work. Icon
    Let your volunteer coordinators do their best work.

    For non-profit organizations requiring a software solution to keep track of volunteers

    Stop messing with tools that aren’t designed to amplify volunteer programs. With VolunteerMatters, it’s a delight to manage everything in one place.
    Learn More
  • 10
    The Master-Slave project is directly related to the Snort IDS to dynamically create rules into iptables firewall. It could send the attacker IP address to others machines into the circuit that will block the IP address before any attack from the intruder
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next