Showing 103 open source projects for "resistance"

View related business solutions
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 1
    Some information and a bundle of patched, well-known applications for bypassing RU DPI.
    Downloads: 38 This Week
    Last Update:
    See Project
  • 2
    RoboSats

    RoboSats

    A simple and private bitcoin exchange

    RoboSats is a privacy-preserving, peer-to-peer Bitcoin exchange that allows users to buy and sell Bitcoin using Lightning Network payments without requiring identity verification. It uses Tor by default and leverages a simple robot-based user interface to facilitate one-time trades between anonymous users. Each trade session is isolated, and no long-term accounts or KYC are needed, making RoboSats one of the most private Bitcoin P2P tools available. Designed with a strong focus on usability...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 3
    Sideband

    Sideband

    LXMF client for Android, Linux and macOS to communicate with people

    Sideband is a privacy-focused, peer-to-peer mesh messaging protocol and platform that allows users to communicate directly over local networks or the internet without servers. It emphasizes metadata resistance and secure message delivery, working effectively in offline, low-bandwidth, or disaster recovery scenarios. Built-in Rust, Sideband supports encrypted group messaging, file transfers, and network self-discovery. It is ideal for use in community networks, crisis response, and decentralized communications infrastructure.
    Downloads: 17 This Week
    Last Update:
    See Project
  • 4
    Hysteria

    Hysteria

    Hysteria is a powerful, lightning fast and censorship resistant proxy

    Hysteria is a high-performance, censorship-resistant proxy and VPN-like networking tool designed to deliver fast, reliable connectivity over unstable or lossy networks by leveraging a custom UDP/QUIC-based transport layer that can masquerade as standard HTTP/3 traffic to evade detection. It supports a wide range of use cases including SOCKS5 and HTTP proxying, TCP/UDP forwarding, Linux TProxy for network redirection, and even tunneling via TUN interfaces, making it a flexible choice for...
    Downloads: 20 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    gost

    gost

    GO Simple Tunnel, a simple tunnel written in golang

    A simple security tunnel written in Golang. Listening on multiple ports, multi-level forward proxies - proxy chain, standard HTTP/HTTPS/HTTP2/SOCKS4(A)/SOCKS5 proxy protocols support. Probing resistance support for web proxy, TLS encryption via negotiation support for SOCKS5 proxy. Support multiple tunnel types, tunnel UDP over TCP. Local/remote TCP/UDP port forwarding, TCP/UDP Transparent proxy, Shadowsocks Protocol (TCP/UDP), and SNI Proxy. Permission control, load balancing, route control, DNS resolver and proxy, and TUN/TAP Device. ...
    Downloads: 45 This Week
    Last Update:
    See Project
  • 6
    Freenet Core

    Freenet Core

    Declare your digital independence

    Freenet Core is the backbone of the Freenet Project, a peer-to-peer platform for censorship-resistant, anonymous publishing and communication. It is designed to provide strong privacy by routing requests through multiple nodes using a "darknet" architecture where users connect only to trusted peers. Data is stored in a distributed manner and automatically replicated based on demand. Freenet is optimized for users who want to securely share files, host anonymous websites (known as...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    SerenityOS

    SerenityOS

    The Serenity Operating System

    SerenityOS is an open source Unix-like operating system project with its own custom kernel, graphical user interface, system libraries, and userland tools. It combines a nostalgic “90s UI aesthetic” with modern system capabilities: a preemptive, multi-threaded kernel, own browsers, network stack, file systems, IPC, security features, and a suite of graphical / developer applications. The project is both a hobbyist OS and a polished engineering sandbox.
    Downloads: 19 This Week
    Last Update:
    See Project
  • 8
    I2P

    I2P

    I2P is an anonymizing network to securely communicate

    ...It uses encrypted unidirectional tunnels between you and your peers. No one can see where traffic is coming from, where it is going, or what the contents are. Additionally, I2P offers resistance to pattern recognition and blocking by censors.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 9
    SoftEther VPN

    SoftEther VPN

    Cross-platform multi-protocol VPN software

    An open-source free cross-platform multi-protocol VPN program, as an academic project from University of Tsukuba, under the Apache License 2.0. The API Suite allows you to easily develop your original SoftEther VPN Server management application to control the VPN Server (e.g. creating users, adding Virtual Hubs, disconnecting a specified VPN sessions) from JavaScript, TypeScript, C# or other languages. SoftEther VPN ("SoftEther" means "Software Ethernet") is one of the world's most powerful...
    Downloads: 73 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    firo

    firo

    The privacy-focused cryptocurrency

    Firo is a privacy-focused cryptocurrency implementing zero-knowledge proofs to enable anonymous transactions while maintaining decentralization and auditability. Formerly known as Zcoin, Firo pioneered several innovations in privacy tech including the Lelantus protocol, which enables unlinkable and untraceable transactions without the need for trusted setup. It combines cutting-edge cryptographic research with user-friendly features, making it accessible to both everyday users and privacy...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Project X

    Project X

    Originates from XTLS protocol, providing a set of network tools

    ...It is written primarily in Go and is optimized for high performance, making it suitable for both personal and large-scale deployments. Project X also integrates advanced features like REALITY and XTLS, which enhance encryption and disguise traffic to improve privacy and resistance to detection. The platform is highly modular, allowing developers to customize routing rules, transport layers, and proxy behaviors through configuration files or integrations.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 12
    anti-distill

    anti-distill

    Anti-distillation for employee Skills

    anti-distill is a research-oriented project focused on protecting machine learning models from knowledge distillation attacks, where smaller models attempt to replicate the behavior of larger proprietary systems. The project explores techniques that make it harder for external models to learn from outputs, thereby preserving intellectual property and model uniqueness. It likely introduces methods such as output perturbation, watermarking, or response shaping to prevent accurate imitation....
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    Outline Server

    Outline Server

    Outline Manager, developed by Jigsaw

    ...Creating your own VPN server used to be a complicated process…until now. Outline allows anyone to create their own VPN, run it, and share access to it. Outline is designed to offer block resistance. It allows you to control your server settings, including its location. Furthermore, Outline is a 100% open-source project that uses transparent technology and has undergone audits by two security companies.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14

    resistor_selector

    Standard Resistor Value Selector

    Tool for finding closest 1% standard resistor value to a given resistance value. Resistance values can be entered with metric multipliers like 'k', 'M', etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    HighwayHash

    HighwayHash

    Fast strong hash functions: SipHash/HighwayHash

    ...Typical uses include protecting hash tables that store untrusted keys and authenticating short-lived messages or records in storage systems. Although not a replacement for collision-resistant digests like SHA-2/3, it strikes a pragmatic balance of speed, simplicity, and resistance to common abuse patterns seen in production backends.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Dual Monitor Tools

    Dual Monitor Tools

    Tools for Windows users with dual or multiple monitors.

    Tools for Windows users with dual or multiple monitors. Has hotkeys for moving windows around, restrict mouse/cursor movement between screens, application launcher, wallpaper creator and changer and a screen capture tool.
    Leader badge
    Downloads: 4,106 This Week
    Last Update:
    See Project
  • 17
    Rolemaster Office
    PC and NPC character generator for Rolemaster RMFRP roleplaying system (from Iron Crown Enterprises). The program calculates all bonus and generates a nice PDF character sheet that contains additionally pages. The programm does not provide during-game support.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 18

    Arctic Shield Mobile Protection Suite

    Technical research project for mobile display protection technologies.

    # Arctic Shield Mobile Protection Suite Arctic Shield Mobile Protection Suite on tekninen tutkimus- ja kehityshanke, joka keskittyy mobiilinäyttöjen suojausteknologioihin, hydrogeelikalvojen kestävyyteen, laajempiin materiaalitesteihin ja asennusmenetelmien optimointiin. Projektin tavoitteena on tuottaa riippumatonta, teknistä tutkimusdataa eri näytönsuojaratkaisujen ominaisuuksista, kuten naarmunkestävyydestä, itsekorjaavuudesta, kosketusviiveestä, pintaenergian käyttäytymisestä sekä...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    PTBC

    PTBC

    irreversible encryption with time self-destruction

    Petoron Time Burn Cipher (PTBC) A promising cipher based on self-destruction of time, complete absence of traces and impossibility of key selection. Key features: AES-CFB encryption with per-file IV Argon2id key derivation with 256MB RAM resistance TTL (time to live) built directly into the encrypted file HMAC-SHA512 integrity verification Self-deleting mode (--autowipe) and one-time access marking (--onetime) No file metadata, no recovery, no password resets Philosophy: If you lose the password - it’s over. If time expires - it’s gone. PTBC doesn’t forgive, doesn’t forget, and doesn’t leak. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Petoron-P2P-Messenger

    Petoron-P2P-Messenger

    minimalistic, secure and autonomous P2P messenger

    Petoron P2P Messenger (P-P2P-M) Architecture: Pure P2P - no servers, no databases Key storage: Keys generated in memory, never stored, erased after use Metadata: Only IP and port exist during the session - everything else is encrypted & obfuscated Encryption: PQS v1.2 - PBKDF2-HMAC-SHA256 (200k), BLAKE2s-MAC, custom stream cipher + fake padding Authentication: BLAKE2s-MAC (16 bytes) - instant failure on any data change Packet obfuscation: --stealth mode - padding, hidden structures Connection: Direct peer-to-peer only Anonymity: No accounts, logins, or phone numbers Third-party access: Impossible without physical access to both peers during session History: No storage — all in RAM, wiped on close Message size: Limited only by RAM & MTU — no artificial limits External dependencies: None DPI/blocking resistance: Harder to detect, can be masked Autonomy: Fully offline until peers connect 26.01.26 Add pqs_chat_tor.py github.com/01alekseev/Petoron-P2P-Messenger
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    Generation Password

    Generation Password

    Create strong passwords quickly — your data security is guaranteed!

    ...It generates three unique passwords that include digits, words, and special symbols, providing maximum protection for your accounts. Each password features a rich combination of characters and words, significantly increasing resistance to hacking. The app allows you to quickly regenerate any password or copy it to the clipboard for easy use. This is especially useful when you need multiple strong passwords for different services. GenerationPassword is suitable for both personal and professional data protection. Its simple, intuitive interface, fast results, and high security are its main advantages. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    resistor-codes

    The SMD resistor nomenclature

    The small python package to get the resistance of resistors based on three, four or EIA-96 system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    SpiceDB

    SpiceDB

    SpiceDB is the open source, Zanzibar-inspired authorization system

    Open Source, Google Zanzibar-inspired permissions database to enable fine-grained access control for customer applications. Get started with the SpiceDB playground: https://play.authzed.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    ARES

    ARES

    Antibiotic Resistance Evolution Simulator

    ARES (Antibiotic Resistance Evolution Simulator) is a membrane computing-based model, able to simulate complex biological landscapes. It uses a nested membrane-surroundings entitites scheme formatted in a XML file. The created scenarios emulate entities as: i) Resistance genes, able to detoxify antibiotics. These genes can be located in the plasmid, in conjugative elements or in the chromosome; ii) plasmids and conjugative elements transferring genes between bacterial cells; iii) bacterial cells; iv) individual microbiotas where bacterial species coexist; v) hosts containing the microbiotic ensembles; vi) environment(s) where the hosts are contained. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Turns-n-Layers is a command line transformer and induction coil design aid that calculates the amount of wire needed, both length (feet) and weight (lbs). Also, the finished dimensions of the coil and the resistance are also returned.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB