Showing 102 open source projects for "intruder attack 2"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 1
    mitmproxy

    mitmproxy

    A free and open source interactive HTTPS proxy

    mitmproxy is an open source, interactive SSL/TLS-capable intercepting HTTP proxy, with a console interface fit for HTTP/1, HTTP/2, and WebSockets. It's the ideal tool for penetration testers and software developers, able to debug, test, and make privacy measurements. It can intercept, inspect, modify and replay web traffic, and can even prettify and decode a variety of message types. Its web-based interface mitmweb gives you a similar experience as Chrome's DevTools, with the addition of...
    Downloads: 19 This Week
    Last Update:
    See Project
  • 2
    Modlishka

    Modlishka

    Powerful and flexible HTTP reverse proxy

    Modlishka is a powerful and flexible HTTP reverse proxy. It implements an entirely new and interesting approach of handling browser-based HTTP traffic flow, which allows to transparently proxy of multi-domain destination traffic, both TLS and non-TLS, over a single domain, without the requirement of installing any additional certificate on the client. What exactly does this mean? In short, it simply has a lot of potential, that can be used in many use case scenarios. Modlishka was written as...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Hoverfly

    Hoverfly

    Lightweight service virtualization/ API simulation / API mocking tool

    Hoverfly is a lightweight, open source API simulation tool. Using Hoverfly, you can create realistic simulations of the APIs your application depends on. Replace unreliable test systems and restrictive API sandboxes with high-performance simulations in seconds. Run on MacOS, Windows or Linux, or use native Java or Python language bindings to get started quickly. Simulate API latency or failure when required by writing custom scripts in the language of your choice.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    Google Authenticator PAM Library

    Google Authenticator PAM Library

    Example PAM module demonstrating two-factor authentication

    google-authenticator-libpam is a Pluggable Authentication Module (PAM) that adds one-time passcodes to Unix and Linux logins using open OATH standards. It plugs into PAM stacks for services like SSH, su, or desktop display managers, prompting users for a time-based (TOTP) or counter-based (HOTP) code after their password. A lightweight enrollment program bootstraps each account by generating a secret, printing a QR code, and writing per-user configuration with safe file permissions. Because...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    Block Attack - Rise of the Blocks
    Game based on the game "Tetris Attack". This has nothing to do with the classic tetris game. This project's main focus is on the single player experience.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Linux Air Combat

    Linux Air Combat

    Combat Flight Simulator for LINUX. WW2. Network and VOIP. Open-source.

    WW2 Combat Flight Simulator. Free. Current Version: 9.92. This is now the world's leading open-source combat flight sim for LINUX. Linux Air Combat ("LAC") runs on almost any desktop LINUX system (even Steam Deck & Raspberry Pi) and generates smooth, high-performance flight. If it runs TOO fast on your hardware (framerates beyond 100 FPS), you should activate LAC's built-in FrameRate Limiter as documented...
    Leader badge
    Downloads: 65 This Week
    Last Update:
    See Project
  • 7

    Candy's Space Mysteries II

    With the helpfull nef, you have to rescue earthlike planets!

    During their recent spacetrip, Candy & Noopy get trapped into a giant wormhole! They made a long light trip and found a passage who leads to the Milky Way. They was searching for a place to land, they have found the Earth. Knowing that great cataclysms are menacing their homeplanet, Candy & Noopy said together: - "We must save the Earth!". Since some times, the star masses, combined with the magnetic-fields of this planet gave special powers to the spaceship: The one of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Candy World II

    Help Candy and her friends to save the Candy World.

    Help Candy and her friends to save the Candy World from a evil scientist. After having drawing a circle of 10 flowers. Noopy bring Candy to life in a region of the paradize callen "The Candy World". You have now learn about Noopy's Ball: it has been stolen! Grab all of the Bones, Crescents, Hearts, Golden Bones to save this land. Go through 35 levels of challenges, good sounds effects, great music & beautiful graphics. This game is totally free and is for everyone. We...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9

    Candy's Space Adventures

    In this quest, you will have to explore galaxies with various nefs..

    Hi everyone, In the year 2014-2026, I was working on: Candy's Space Adventures: The Messages from the Lillians. In this quest, it will be possible to travel from different solar system to another, from a galaxy to another. The goal will be to save all living planet, and maybe repairing planets like venus or mars. We are now at v86.37! Friendly, Xylvan, Xilvan Design.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 10

    Candy to the Rescue IV

    Help Candy & Noopy to rescue their friends trapped into cages.

    Recently, the new project Candy to the Rescue IV: The Scepter of Thunders was born. In this game, Candy and Noopy must find pendora boxes in order to remove the new dangers appeared in the game. Animals got trapped into cage, you must find the key to freed them. New trees, new challenges. Recently, in the Candy World, thunderstorms was happening. It's the v65.95 of this game! Friendly, Xylvan, Xilvan Design Made from 2011-2026.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    WUBOT
    Kill npc in (X-1-2-3-4-5-6-7, JVS, JVO, JSO). Collect box. Collect cargo. Fly between maps. Change config attack, run, roam. Go to repair in portal. (60%,50%,30%). Auto reconnect after game restarts. Custom death limit. Custom time wait in base after revive. Custom choose single NPC to kill in map. Custom ammunition for each NPC. Sell cargo (Available only for X-1 or X-7 work map).
    Downloads: 18 This Week
    Last Update:
    See Project
  • 12
    DDoS/Dos Attack Simulator

    DDoS/Dos Attack Simulator

    Distributed Denial of Service Attack Simulator

    DDoS/DoS Attack Simulator is powerful Python-based software used for attacking servers, hosts, and websites using traffic. It disrupts the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. A server that does not have protection against it can experience extremely slow performance due to all of the traffic it sends.
    Leader badge
    Downloads: 20 This Week
    Last Update:
    See Project
  • 13
    Kubesploit

    Kubesploit

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments written in Golang and built on top of Merlin project by Russel Van Tuyl. While researching Docker and Kubernetes, we noticed that most of the tools available today are aimed at passive scanning for vulnerabilities in the cluster, and there is a lack of more complex attack vector coverage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    mypiano_chung

    mypiano_chung

    a virtual acoustic piano using bass.dll

    mypiano chung is a free open source small high quality midi virtual acoustic piano using bassdll bass.dll and gui_chung . It is written in freebasic and runs as a standalone application . It is recorded on Isabelle's real upright piano with a smartphone , 7 octaves , 2 x 2 mp3 samples per octave , 88 notes polyphony , varying dynamic reverb , chorus , attack and velocity with number of near played notes and sustain , harp0 - harp9 + piano shape selection uses mp3 samples easy to customize revAll reverb only mode for use as remote reverb for a midi piano keyboard.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    ESP8266 Deauther Version 2

    ESP8266 Deauther Version 2

    Affordable WiFi hacking platform for testing and learning

    Scan for WiFi devices, block selected connections, create dozens of networks and confuse WiFi scanners! Version 3 is in development. It is stable to use, but it is very different. It is command-line based, which allows it to offer not just more features, but make them more customizable. This software allows you to easily perform a variety of actions to test 802.11 wireless networks by using an inexpensive ESP8266 WiFi SoC (System On A Chip). The main feature, the deauthentication attack, is...
    Downloads: 33 This Week
    Last Update:
    See Project
  • 16
    Mac Crack Attack
    Mac Crack Attack is a port of Crack Attack to the Mac OS X platform. Crack Attack is based on the Super Nintendo classic Tetris Attack. Mac Crack Attack is a fast paced "Tetris-like" game for one or two players (networked)
    Downloads: 11 This Week
    Last Update:
    See Project
  • 17

    Free Data Recovery Software for Windows

    Deep scan and recover your deleted files on Windows 10

    This Windows data recovery tool is built to help users get back documents and files from a computer. The data recovery tool can also restore data from formatted and damaged hard drives. The software makes recovering deleted files easy and convenient. It is available for Windows users, and by downloading the software, one can start restoring all kinds of lost and deleted files without spending much time.  When it comes to some of the fantastic features of this hard drive data...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Novel Insight Inner Circle

    Novel Insight Inner Circle

    Graphical message and file encryption tool

    ...IMPORTANT: The software requires new OpenJDK 16 (Not Oracle's J2RE 1.8) to run. Install, for example, AdoptOpenJDK for Windows. NOTE: By using encryption twice the implementation is (in theory) vulnerable to Meet-In-The-Middle attack reducing key size to 256bit but the attack still requires 2^256 bytes of memory making it impossible in practice.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Secure File Vault

    Secure File Vault

    A very secure file vault for private files to avoid hackers

    A File vault to store all of your personal items, this file vault could not be brute forced (impossible because of the hashing algorithms). It uses a combination of veracrypt, winrar, 7zip to encrypt your files to ensure that they are secure and not be seen by someone. Once you start to create the file vault, your password gets hashed a million times (only takes 3 seconds) then base 64 3 times and hashed 1 more time, it uses a combination of SHA256, SHA512 and lot of other secret...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Terraria Rod of Discord Farm

    An AFK farm for the Rod of Discord

    Go east to the ice biome, and a little ways past the two houses that house the tinkerer and the mechanic, there will be a 2 block wide hole. Go through it, and you will find the farm. Inside the safe room there is a conveyor, switch, and timer. Turn the timer on the activate the traps. The switch toggles money burn on and off. If it's on, the money produced by the farm will be burned, making items last substantially longer before despawning.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    DDOSER

    DDOSER

    Machine that can DDOS servers

    This machine can DDOS any IP. Takes from 2 - 5 Hours to working properly. Good luck! ====SUBMIT ERRORS HERE==== https://forms.gle/9ubmBmhivBBYGgmg7 ========================== [1 April 2020 Patch] The "This program was made with an unlicensed compiler (...)" error will be repaired today! Stay tuned. Thanks to _FoZa_ for reporting me that error! Congrats! LOG 1: That won`t fixed anything so i needed to make another version LOG 2: Fixed :) That made my program which...
    Downloads: 47 This Week
    Last Update:
    See Project
  • 22
    SSL Kill Switch 2

    SSL Kill Switch 2

    Blackbox tool to disable SSL certificate validation

    Blackbox tool to disable SSL/TLS certificate validation - including certificate pinning - within iOS and macOS applications. Once loaded into an iOS or macOS application, SSL Kill Switch 2 will patch low-level functions responsible for handling SSL/TLS connections in order to override and disable the system's default certificate validation, as well as any kind of custom certificate validation (such as certificate pinning). It was successfully tested against various applications implementing...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 23
    Bat Attack

    Bat Attack

    Bat Attack is a cool classical 8bit game to save wife from the Bats

    Bat Attack is a cool classical 8bit game with bats instead and a lot of comic blood and gore and comical media with a funny story mode. The story starts when the main character 'Dave' is driving on his honeymoon with his wife Betty when an Evil bat swoops down and take his dearly beloved off. You have to get Betty back by using the guns available to your disposable. When the bats are killed they make a mess all over the ground and sometimes drop weapons they have devoured. There are three...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Injectify

    Injectify

    Perform advanced MiTM attacks on websites with ease

    Perform advanced MiTM attacks on websites with ease. Injectify is a modern web based MiTM tool, similiar to BeEF (although completely unrelated in terms of source code). It features cross-platform clients (Web, Desktop, Browser extension). Create a reverse Javascript shell between the victim and the attacker. Records keystrokes and logs them to a database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    WAV Audio Compressor

    Audio (dynamic) compression utility

    Audio Compressor (command line) - Utility to be used for audio (dynamic) compression of WAV files. The process works as a real-time 2-band feedback sidechain compressor having threshold and knee optimized to match the best as possible to the full scale range. The "feedback speed" (attack), the "recovery speed" (release) as well as the maximum gain limit can be adjusted by the user. This compressor was designed to give a "FM style" output, making it suitable to prepare music tracks for listening in noisy environments (vehicles) or to modulate a LPFM transmitter.
    Downloads: 7 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB