Showing 19 open source projects for "security holes"

View related business solutions
  • Business Continuity Solutions | ConnectWise BCDR Icon
    Business Continuity Solutions | ConnectWise BCDR

    Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

    Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
  • Tigerpaw One | Business Automation Software for SMBs Icon
    Tigerpaw One | Business Automation Software for SMBs

    Fed up with not having the time, money and resources to grow your business?

    The only software you need to increase cash flow, optimize resource utilization, and take control of your assets and inventory.
  • 1
    thc-hydra

    thc-hydra

    Shows how easy it would be to gain unauthorized access to a system

    Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. There are already several login hacker tools available, however, none does either support more than one protocol to attack or support parallelized connects. It was tested to compile cleanly on Linux, Windows/Cygwin...
    Downloads: 119 This Week
    Last Update:
    See Project
  • 2
    Pronto

    Pronto

    Quick automated code review of your changes

    Pronto runs analysis quickly by checking only the relevant changes. Created to be used on GitHub pull requests, but also works locally and integrates with GitLab and Bitbucket. Perfect if you want to find out quickly if a branch introduces changes that conform to your style guide, are DRY, don't introduce security holes, and more. Pronto runs the checks on a diff between the current HEAD and the provided commit-ish (default is master). You can run Pronto as a step of your CI builds and get...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    mongoaudit

    mongoaudit

    A powerful MongoDB auditing and pentesting tool

    mongoaudit is a CLI tool for auditing MongoDB servers, detecting poor security settings and performing automated penetration testing. It is widely known that there are quite a few holes in MongoDB's default configuration settings. This fact, combined with abundant lazy system administrators and developers, has led to what the press has called the MongoDB apocalypse. mongoaudit not only detects misconfigurations, known vulnerabilities and bugs but also gives you advice on how to fix them...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    CloseTheDoor
    CloseTheDoor indentifies all the listening ports TCP/UDP over IPv4/v6 and the associated program files. This will help you to detect security holes and close backdoors when you want to prevent remote attacks.
    Leader badge
    Downloads: 11 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • 5
    PAVS

    PAVS

    PHP Application Vulnerability Scanner

    PAVS scans the PHP based web application source code and identifies the potential security problems in that application. PAVS also identifies the loop holes in PHP configuration file settings. Attacks addressed by PAVS are Cross-site Scripting SQL Injection File Manipulation File Inclusion Command Execution Code Evaluation
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6

    ext2 info hiding mod

    Information Hiding Modification for EXT2

    ... blocknr. to represent an 1. For the remaining blocks of the cover file till the end of the code is reached, an adjacent blocknr. represents the same bit as the previous one and a non-adjacent blocknr. (a block will be skipped) a negated previous bit. It's necessary to use a partition with enough adjacent free blocks (code length + holes for fragmentation) within a blockgroup, for this algorithm to work correctly. WARNING: This is experimental software and could cause crashes or data loss!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Esgix

    Esgix

    Pentest virtual machine

    Penetration testing virtual machine ! Learn how to hack ! From a last year project of Network System and Security Master's degree at the ESGI, ESGIX virtual machine has been created to provide a test environement to people who want to learn penetration testing. The main objective is to obtain root access on the virtual machine, using However you could have fun by finding security holes and intrusions techniques, and exploit them as you think best. The machine is freely available...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    WinGuard Pro 2013

    Password Protect Programs and Encrypt Files

    With WinGuard Pro users can add password protection to Windows programs, dialog, exe files and webpages - Keep users out of areas you don't want them, such as; Control Panel, Filesystem and the Internet. In addition, WinGuard Pro has an encryption module built-in - protect your private files, like your bank details, with 128 bit AES encryption. Key Features: Password lock applications, exe files, with a password Some programs, like Chat can have security holes - block them from running...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Holynix
    Similar to the de-ice pentest CDs and pWnOS, Holynix is an Linux vmware image that was deliberately built to have security holes for the purposes of penetration testing. Visit http://pynstrom.com/forum/ for help setting up or completing the challenge.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Case Management Software for Social Services Icon
    Case Management Software for Social Services

    For human services organizations looking for case management software

    Collaborate is customizable case management software for non-profits and social services agencies with teams of 5+ staff.
  • 10
    HV STAT

    HV STAT

    Greasemonkey Tool to keep Stats of Hentaiverse.org Game

    http://hentaiverse.org/ is an RPG game like D&D. HV STAT is an Add-on/Greasemonkey Tool to Database & show the Monster Strengths/Weakness so you know what is best to attack them with. Also tracks your character's strengths/weakness, items dropped/won and other statistics. This is NOT my code, I'm only doing this in hope to get a 3 party to review the code for open loops or some other coding errors that are causing to much processor use and to seach for security holes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    JBroFuzz
    The OWASP JBroFuzz Project is a web application fuzzer for requests being made over HTTP and/or HTTPS. Its purpose is to provide a single, portable application that offers stable web protocol fuzzing capabilities.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    Steel Rats is a gui wrapper for the command line source code auditing tool RATS. It examines C, Perl, php and python code for keywords that could cause security holes and provides a report for you to further investigate the possible security holes.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Detect your web servers being scanned by brute force tools and vulnerability scanners.Helps you quickly identify probable probing by bad guys who's wanna dig possible security holes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Warning: This software has security holes in it that can allow arbitray users to run commands on your system. I reccomend not using it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    SSTT is proposed as the security test software for testing the security vulnerabilities and security holes of Session Initiation Protocol (SIP) implementations and providing suggestions for improving SIP security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    GPL PHP AntiVirus for webmasters. Scans your web server's file system for dangerous and malicious code in public HTML, PHP, CGI and text files, usually caused by defacement or security holes in shared hosting accounts.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 17
    `apt-support' renamed `security-keeper'. apt-support is a security support tool on Debian GNU/Linux. Two or more security holes were in all the versions of apt-support. Since these are corrected by security-keeper, please do not use apt-support.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    busybotnet

    Offensive & Defenseive Security For Embedded Systems

    ... that never issue updates or bother to patch any of the gaping security holes in their systems. This inevitably leads to the devices being repurpoused by hackers, visa vi botnets... The point of this project is to provide all of the security tools a system admin needs to administer embedded devices in one static binary, hence the term, "Busybotnet".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Linux distro to run under Google's NaCl

    Linux Distro to run under Google's NaCl Sandbox

    ... modules with javascript acting as a sort of "kernel". Currently the main holes that prevent a conventional distro from being ported is that there is no support for pipes, most signals, and also symbolic links and lastly traditional forks are not currently possible in an efficent way.The current implementation gets around forking and has limited vfork capability. Please join this project to help implement fixes for these issues so we can get your favorite distro to run at nearly native speed!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next