Showing 382 open source projects for "password sdata tool"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 1
    Domain Password Spray

    Domain Password Spray

    A tool written in PowerShell to perform password assessments

    DomainPasswordSpray is a focused security tool designed to perform enterprise-scale password spraying assessments against Active Directory environments. It automates the process of attempting common or customized passwords against many accounts while respecting timing and throttling controls to reduce obvious lockout noise. The project includes features for credential list management, target selection (users, service accounts, or collections), and configurable rate limits so testers can tune the balance between coverage and stealth. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Crypt Tool

    Crypt Tool

    A simple password manager for Windows based on OpenSSL

    A simple password manager for Windows based on OpenSSL (included). Allow encryption, decryption of messages, passwords, files and images with AES 256 CBC algorithm. Integrated FTP(S) client. Console based commands, random password generator. Stand alone application need no installer, runable from USB sticks. Working with Windows 7-11 (OpenSSL 1.1.1s 32 Bit) Read Wiki for more details.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    thc-hydra

    thc-hydra

    Shows how easy it would be to gain unauthorized access to a system

    Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. There are already several login hacker tools available, however, none does either support more than one protocol to attack or support parallelized connects.
    Downloads: 80 This Week
    Last Update:
    See Project
  • 4
    pwd.sh

    pwd.sh

    GnuPG symmetric secrets manager using Bash

    ...It supports different modes of password generation, allowing users to customize length, complexity, and character sets. The tool emphasizes privacy by avoiding reliance on external services or network calls, ensuring that password generation happens entirely locally. It is well-suited for developers and security-conscious users who prefer command-line tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    HackBrowserData

    HackBrowserData

    Decrypt passwords/cookies/history/bookmarks from the browser

    HackBrowserData is an open-source tool that could help you decrypt data ( password|bookmark|cookie|history|credit card|download|localStorage|extension ) from the browser. It supports the most popular browsers on the market and runs on Windows, macOS and Linux. This tool is limited to security research only, and the user assumes all legal and related responsibilities arising from its use!
    Downloads: 12 This Week
    Last Update:
    See Project
  • 6
    holehe

    holehe

    Check if the mail is used on different sites

    holehe is a Python-based OSINT utility designed to determine whether a specific email address is registered across a wide range of online services. The tool works by leveraging password-reset mechanisms and other public account-existence checks to infer whether an email is associated with accounts on major platforms. It supports more than a hundred websites and is commonly used during reconnaissance, digital investigations, and account exposure assessments. holehe is designed to operate quickly and quietly, emphasizing efficiency and minimal footprint during enumeration tasks. ...
    Downloads: 41 This Week
    Last Update:
    See Project
  • 7
    GoSearch

    GoSearch

    OSINT tool to find usernames and digital footprints across 300+ sites

    ...If password hashes are found in breach data, the tool can attempt to crack them using the Weakpass database.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 8
    CTFcrackTools

    CTFcrackTools

    China's first CTFTools framework

    The first CTF tool framework in China. China's first CTFTools framework designed to help CTFer quickly overcome the CTF problem. Use kotlin and java mixed development. This is probably the first tool framework applied to CTF in China. Built-in current mainstream password, includes but is not limited to Virginia password, Caesar password, fence password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Curl

    Curl

    Command line tool and library for transferring data with URLs

    Curl is a command line tool and library for transferring data specified with URL syntax. It supports HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, SSL certificates, cookies, user+password authentication, and so much more! Curl is used for many different things. It's used in command lines or scripts for transferring data. It's also used in just about every device you can think of: mobile phones and tablets, television sets, printers, routers, media players and other audio equipment. ...
    Downloads: 35 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 10
    fsociety

    fsociety

    Modular CLI framework for managing penetration testing tools

    fsociety is a modular penetration testing framework designed to provide a unified interface for running and managing a wide range of security tools. It focuses on simplifying penetration testing workflows by integrating multiple external security utilities into a single command line environment. Instead of implementing its own security scanners, the framework acts as a wrapper and orchestrator that helps users discover, install, and execute tools from various GitHub repositories. Its modular...
    Downloads: 78 This Week
    Last Update:
    See Project
  • 11
    WPScan

    WPScan

    WPScan WordPress security scanner

    WPScan is a black-box WordPress vulnerability scanner written in Ruby. It analyzes WordPress sites to identify outdated core, plugins, themes, exposed APIs, and known vulnerabilities using a large built-in vulnerability database. It is a popular security auditing tool for pentesters and site administrators.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 12
    Symfony Security Bundle

    Symfony Security Bundle

    Integration of the Security component into the Symfony framework

    Symfony Security Bundle is a powerful tool for adding authentication and authorization to Symfony applications. It provides mechanisms for managing user roles, password encryption, and access control. The bundle supports various authentication methods, including form login, HTTP basic auth, OAuth, and more. It also integrates with Symfony’s firewall and access control systems for secure application development.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    gallery-dl

    gallery-dl

    Command-line program to download image galleries and collections

    gallery-dl is a powerful command-line tool designed to download image galleries and collections from a wide range of image hosting and media websites. Built with Python, it works across multiple operating systems including Windows, Linux, and macOS. The program allows users to download images, manga chapters, or media collections by simply providing a supported website URL. It includes extensive configuration options that allow users to control download behavior, file naming, and directory...
    Downloads: 39 This Week
    Last Update:
    See Project
  • 14
    ungit

    ungit

    A tool to simplify the use of git, on any platform, anywhere

    Git is known for being a versatile distributed source control system that is a staple of many individuals, communities, and even for the City of Chattanooga to crowd source bicycle parking locations. However, it is not known for userfriendliness or easy learning curve. Ungit brings user friendliness to git without sacrificing the versatility of git. Git and github both supports PGP signing. Within Ungit these features can be enabled. Currently, Ungit DOES NOT support GPG authentication!...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 15
    PDF Password Remover

    PDF Password Remover

    Remove Password from multiple PDF files in one click

    PDF Password Remover is a convenient tool that enables you to remove passwords from multiple PDF files simultaneously. Just provide the current password, and the tool will unlock the files, allowing future access without any password. As a portable app, it doesn't require installation. You can copy it to a USB drive and use it directly on any Windows machine.
    Downloads: 36 This Week
    Last Update:
    See Project
  • 16
    Sippts

    Sippts

    Set of tools to audit SIP based VoIP Systems

    Sippts is a set of tools to audit VoIP servers and devices using SIP protocol. Sippts is programmed in Python and it allows us to check the security of a VoIP server using SIP protocol. You can freely use, modify and distribute. If modified, please put a reference to this site. Most security tools can be used for illegal purposes, but the purpose of this tool is to check the security of your own servers and not to use to do bad things. I am not responsible for the misuse of this tool. Sippts...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Aspia

    Aspia

    Remote desktop and file transfer tool

    Free open-source application for real-time desktop remote control and file transfer. With Aspia, you can create your own NAT traversal infrastructure (using Router and Relay servers) with connection by ID or use direct connections. Aspia supports many features. Among them, detailed information about the system, task manager, audio, and text chat. It is safe. All transmitted data is encrypted. Add computers for quick connection, and create computer groups. Encryption of address books with a...
    Downloads: 33 This Week
    Last Update:
    See Project
  • 18
    Username Anarchy

    Username Anarchy

    Username generator for penetration testing and user enumeration

    Username Anarchy is an open source command line tool designed to generate possible usernames for use in penetration testing and security assessments. It focuses on solving one of the common challenges in authentication attacks: identifying valid usernames before attempting password attacks. It generates large sets of potential usernames based on a person’s name and common naming conventions used in corporate or online systems.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    ffsend

    ffsend

    Easily and securely share files from the command line

    Easily and securely share files and directories from the command line through a safe, private and encrypted link using a single simple command. Files are shared using the Send service and may be up to 1GB. Others are able to download these files with this tool, or through their web browser. All files are always encrypted on the client, and secrets are never shared with the remote host. An optional password may be specified, and a default file lifetime of 1 (up to 20) download or 24 hours is enforced to ensure your stuff does not remain online forever. This provides a secure platform to share your files. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Adminer

    Adminer

    Database management in a single PHP file

    ...Connect to a database server with username and password. Select an existing database or create a new one. List fields, indexes, foreign keys and triggers of table Change name, engine, collation, auto_increment and comment of table. Alter name, type, collation, comment and default values of columns. Add and drop tables and columns. List data in tables with search, aggregate, sort and limit results.
    Downloads: 25 This Week
    Last Update:
    See Project
  • 21
    EMAGNET

    EMAGNET

    Automated hacking tool to find leaked databases with 97.1% accuracy

    Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password. Before using Emagnet, please remember that with great power comes great responsibility. Pastebin patched the vulnerability I previously used in order to get recent uploads, so at the moment it is not possible to get recently uploaded files, you are now limited to all syntaxes exempt the default one (95% get's uploaded as 'text' and this is removed from all recent upload lists). ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22
    Password-Manager

    Password-Manager

    Online keepass-like tool to manage password. client-side AES encrypt!

    v11.00 greatly enhanced security! This password manager can generate and store random strong passwords for users. Passwords are generated on users' browsers and then encrypted using AES256 (mode CBC). PBKDF2 with SHA512 is used for user identification check. In trusted computers, user can enable a PIN to login faster. PIN verification is complicated and involves both server and client. Though PIN is only 4 digits, it's still safe (server will disable PIN upon 3 errors) You can...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    sqlmap

    sqlmap

    Automatic SQL injection and database takeover tool

    sqlmap is a powerful, feature-filled, open source penetration testing tool. It makes detecting and exploiting SQL injection flaws and taking over the database servers an automated process. sqlmap comes with a great range of features that along with its powerful detection engine make it the ultimate penetration tester. It offers full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, and many other database management systems. It also...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 24
    Chat2DB

    Chat2DB

    AI-driven database tool and SQL client

    Save time by working with data. Connect to all your data sources, and instantly generate optimal SQL for fast lightning information. If you don't know SQL well, you can get instant information without writing SQL. Generate high-performance SQL for your complicated queries using natural language, as well as correcting errors and getting AI suggestions to optimize the performance of SQL queries. Developers can write complex SQL queries quickly and accurately with the help of the AI SQL editor,...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 25
    Entity relation diagrams generator

    Entity relation diagrams generator

    Entity Relation Diagrams generation tool

    ERAlchemy generates Entity Relation (ER) diagram from databases or from SQLAlchemy models. The simplest way to install eralchemy on OSX is by using Homebrew. ERAlchemy requires GraphViz to generate the graphs and Python. Both are available for Windows, Mac and Linux. Thanks to it's modular architecture, it can be connected to other ORMs/ODMs/OGMs/O*Ms. Some tests require a local postgres database with a schema named test in a database named test all owned by a user named postgres with a...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB