Showing 14 open source projects for "spoofing ip"

View related business solutions
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1
    HWID Spoofer - Hardware ID Changer

    HWID Spoofer - Hardware ID Changer

    The best HWID Spoofer in 2025.

    TraceX is a powerful and advanced HWID Spoofer designed to bypass anti-cheat systems in games like Valorant, Apex Legends, Warzone, Fortnite, and more. It spoofs critical system identifiers such as disk serials, MAC addresses, BIOS UUIDs, motherboard and GPU IDs, and even EFI boot variables. This HWID Spoofer also includes a full system cleaner that removes traces of game activity, browser data, event logs, Xbox and Discord accounts, and network fingerprints. With deep spoofing of CPU,...
    Leader badge
    Downloads: 1,175 This Week
    Last Update:
    See Project
  • 2
    Almighty Linux

    Almighty Linux

    OSINT Focused Hybrid based Linux distro

    Almighty Linux is a hybrid Linux distribution based on Debian Testing and Kali Linux. It is specifically designed with a focus on Intelligence and information gathering workflows. The distribution comes with a comprehensive and extensive collection of OSINT tools. In addition to widely known utilities, it includes custom-built OSINT tools, OPSEC solutions, frameworks, and analysis tools developed specifically for Almighty Linux. To support operational security (OPSEC) during...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    elmocut

    elmocut

    Eye candy ARP spoofer for Windows

    elmoCut aims to make arp spoofing easy for all users with all the hard work done under the hood. One of it's main features is to use as low CPU and RAM usage as possible while offering nearly the same results as other closed source spoofers.
    Leader badge
    Downloads: 230 This Week
    Last Update:
    See Project
  • 4
    TCP/IP Manager

    TCP/IP Manager

    At home or at work, changing settings is now just one click away!

    TCP/IP Manager is designed to help computer users keep track of their network configuration in different locations. At home or at work, changing network settings is now just one click away!
    Leader badge
    Downloads: 105 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5

    must: A More Useful Syslog Test tool

    A syslog message generator that replicates real syslog messages

    Using templated message formats with customisable placeholders, run in configurable sequences that can selectively reuse data between steps, must allows more intelligent testing of syslog receivers with realistic data, as well as longer soak testing and stress testing. must was created to fill a gap found when trying to stress test Splunk as real, indexable and meaningful data was needed. must will (eventually) be provided as a standalone tool that uses XML configs (for quick use and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Jmeter Enhancements

    Jmeter Enhancements

    This project contains some useful enhancements implemented in Jmeter.

    ...For testing an application which has a form or request that takes multiple data entries from a large no of users and the data entries are required to be unique for different users, it becomes a redundant work to type .csv files with unique data entries. Bandwidth Throttling: More enhancements such as follows are also implemented. -Bandwidth throttling -Dynamic bandwidth throttling -IP Spoofing -TPC-C Sampler -Smtp config element -Filterd Results Plugin please refer description.pdf in files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    MIFS
    MIFS is now the SAFER Honeypot (Spoofing Active Fingerprints with Enhanced Replies). Please refer to the Sourceforge project for the SAFER Honeypot instead.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    SAFER Honeypot
    The SAFER Honeypot (Spoofing Active Fingerprints with Enhanced Replies) is a low-interaction virtual honeypot that is compatible with Nmap's second generation OS fingerprint database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Server/client suite which provides per-user access control/firewall/QOS. Robust and high speed implementation is secure against MAC/IP spoofing, and can scale to large networks with many clients. Options for additional monitoring and captive portal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 10
    A sniffer with ARP spoofing, you can set local MAC, gateway MAC, gateway IP, spoofing IP range and etc. in configuration file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Randomized packet generation for source mac, source ip spoofing. Any byte in a packet can be spoofed one by one packet generation. And provide a DDoS testing framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    This utility binds IP addresses of your local network according to MAC adresses stored in MySQL database. It can help to avoid IP spoofing, and increase network control.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    Multispoof exploits weak authentication method based on IP-MAC pairs checking, implemented frequently in Ethernet networks by ISPs. This program allows to multiply user's throughput and serves as a demonstration of spoofing effectiveness.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    The goals of the tool are: 1. improve usability for the less technical educated 2. 'anonymous' ( ip spoofing, others? ) 3. Better support for a distributed tracker-like target list ( multi target, multi server ). LOIC-like tool, also in C#
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB