Showing 27 open source projects for "undetectable"

View related business solutions
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 1
    Zendriver

    Zendriver

    A blazing fast, async-first, undetectable webscraping

    Zendriver is a modern Python web automation and scraping framework that leverages the Chrome DevTools Protocol to provide fast, asynchronous control over real browser instances. Unlike traditional tools that rely on Selenium or WebDriver, Zendriver communicates directly with the browser through CDP, enabling higher performance and more precise control over browser behavior. The framework is designed to be difficult to detect by anti-bot systems, making it suitable for advanced scraping and...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Universal Triggerbot Download

    Universal Triggerbot Download

    Universal Triggerbot All Games Download

    ...Built with advanced C++ code, it automatically fires when your crosshair locks on a target, giving you lightning-fast reactions. With customizable delay, smooth performance, and undetectable operation, this triggerbot ensures maximum precision without FPS drops. Easy to install and optimized for all major shooters in 2025. Create your own Triggerbot (R6S, PUBG, Fortnite, Apex Legends, CS2, COD-MW and etc)
    Leader badge
    Downloads: 241 This Week
    Last Update:
    See Project
  • 3
    Universal ESP Overlay Download

    Universal ESP Overlay Download

    Universal ESP All Games Download

    ...It displays enemies, loot, and objects through walls with real-time ESP features, including boxes, health bars, and distance indicators. Fully customizable and optimized for smooth performance, this overlay works on all major shooters. Easy to install and undetectable, it’s the ultimate ESP solution for 2025. Create your own ESP Overlay (R6S, PUBG, Fortnite, Apex Legends, CS2, COD-MW and etc)
    Leader badge
    Downloads: 93 This Week
    Last Update:
    See Project
  • 4
    High Orbit Ion Cannon V2
    ANTI-VIRUS MUST BE TURNED OFF TO WORK!
    Downloads: 61 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    villager vip auto clicker

    villager vip auto clicker

    High-performance, lightweight auto clicker. The best, for Windows.

    Ultra-high CPS and features NO OTHER auto clicker has! Fully customizable, lightweight, optimized auto clicker for Windows. Created in VS, to bring you a better alternative to other popular options. Optimization is our #1 priority. Almost 0% CPU Usage on MAX CAPPED SPEED! (5000+ CPS!) and macro recording! Built-in macro recording, works with camera rotations in-game, e.g. ROBLOX, and you can export and import your macros! Trusted and reviewed by users on itch.io! 📦 Weighs ONLY...
    Downloads: 22 This Week
    Last Update:
    See Project
  • 6
    Dodge gpt

    Dodge gpt

    Bypass Ai content for GPTZero and others making text Undetectable

    *New Update* ╔════════════════════════════════════════════════════════════════╗ ║ DODGE V10 - STEALTH EDITION ║ The Only AI Text Humanizer That Defeats GPTZero ╚════════════════════════════════════════════════════════════════╝ █████████████████████████████████████████████████████████████████ █ █ █ 🛡️ CURRENT STATUS: GPTZERO RESISTANT - VERIFIED 2026 █ █ 📊...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 7
    PCSecrets

    PCSecrets

    Encrypt and manage secret text data

    PCSecrets is a PC application that holds secret text data - protected by a master password and strong encryption. Use it as a password manager or just somewhere to hold any text data securely in one place. It can hold a second, hidden set of secrets that is undetectable and plausibly deniable. The program is also a PC counterpart of the Secrets for Android app. It uses the same data structure and provides synchronization that allows easy transfer of secrets between the two. For those who find the personal computer environment more comfortable for data entry and editing (i.e. a real keyboard), PCSecrets provides an alternative way to manage your secrets. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    bitcrypt

    bitcrypt

    BitCrypt is a free ultra-strong encryption that hides text in bitmaps.

    BitCrypt is an elegant encryption that allows for the storage and transmission of information in an undetectable manner. The program processes a user-supplied text encrypting it with the Rijndael cipher and storing it in a user-selected bitmap image. This later step is called steganography, which means "to hide invisibly". If you intend to store sensitive information invisibly, you may encrypt it with BitCrypt and keep it in a picture image.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9

    Autorun-rs

    Undetectable scripthook with lua execution and filesteal

    Garrysmod Lua Dumper & Runner, written in Rust. 🤔 Usage 🧩 Menu Plugin Autorun can also be used as a menu plugin / required from lua automatically from the menu state. Put the dll gmsv_autorun_win<arch>.dll file into your garrysmod/lua/bin folder. Add require("autorun") at the bottom of garrysmod/lua/menu/menu.lua It will now run automatically when garrysmod loads at the menu. 💉 Injecting The traditional (but more inconvenient) method to use this is to just inject it. Get an...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    BlooketHack

    BlooketHack

    One of the First Blooket hacks online

    First you must download python 3.7. On install you do need to check the "Add to path" option when you can do so. Second you must download the code here on GitHub. Third you need to extract the files from the .zip file you downloaded. Finally, just double click the main.py file. Original code by: kgsensei. Works on most game modes, Gold Quest (Tested - Working) Tower Defense (Tested - Working) Café (Tested - Working) Factory (Tested - Working) Racing (Tested - Working) Classic (Tested -...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    Chromepass

    Chromepass

    Hacking Chrome Saved Passwords

    ...Decrypt Google Chrome, Chromium, Edge, Brave, Opera and Vivaldi saved paswords and cookies. Send a file with the login/password combinations and cookies remotely (http server or email) Undetectable by AV if done correctly. Custom icon, custom error message, customize port. The new client build methodology practically ensures a 0% detection rate, even without AV-evasion tactics. If this becomes false in the future, some methods will be implemented to improve AV evasion. The dependencies are checked and installed automatically, so you can just skip to Usage. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    TrojanCockroach

    TrojanCockroach

    A Stealthy Trojan Spyware

    This program is a Trojan Virus that steals data (ID, password; every key stroke) from PC (Windows XP or later) and emails it back to the host. It spreads among PCs through USB drives. It is almost undetectable to any antivirus software.
    Downloads: 93 This Week
    Last Update:
    See Project
  • 13
    AsmodatGameAssistant
    ...Additional features include rapid fire that can be enabled for middle mouse button and control of mouse with back and forward mouse buttons. Remember to run this program as administrator. The best solution for Battlefield 1,2,3,4 BC2, and ARMA games.That is undetectable and legal to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Asmodat Files & Folders Master
    ...Asmodat Files & Folders Master is free program for hiding your private foler and files. Program is crushing and repairing over 500 per second (don't depend on file size) and makes your files & folders unoppenable and undetectable by search engines and other progam in windows etc. Demo vid (older version): http://www.youtube.com/watch?v=nFH2FB7OOHc v1.3 - Fixed problem with files attributes v1.4 - App Speed improvement v1.5 - Parallel task processing - can't get much better then this one (THIS VERSION IS ONLY ONLY AN EXPERIMENT, AND MIGHT NOT WORK CORRECTLY, TO BE SAVE DOWNLOAD ONLY v1.4) You nead .NET 2.0 or .NET 4.0 liblaries to run this program.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    venom - shellcode generator

    venom - shellcode generator

    msfvenom shellcode generator/compiler/listenner

    The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( c | python | ruby | dll | msi | hta-psh ), injects the shellcode generated into one funtion (example: python) "the python funtion will execute the shellcode in ram" and uses compilers like: gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file, also starts a multi-handler to recibe the remote connection (reverse shell or meterpreter session). -- 'shellcode generator' tool reproduces some of the technics used by Veil-Evasion framework, unicorn.py, powersploit, etc,etc,etc.."P.S. some payloads are undetectable by AV soluctions yes!!!" one of the reazons for that its the use of a funtion to execute the 2º stage of shell/meterpreter directly into targets ram.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    axSpyAndroidSpy

    Android Spy Software, Android Monitoring Apps

    ...AxSpy is a powerful mobile phone application that gives you almost complete control over your child's devices Features: • SMS Tracking (outgoing, received and deleted) • GPS Location Tracking • Record Call Details (even deleted) • View Photos of the Phone • View Contacts • View browser history • Undetectable / Hidden Icon Download and install at: http://axspy.com
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    mFileBinder

    mFileBinder

    An advanced file binder which binds multiple file of any type

    mFileBinder is an advanced file binder which binds multiple file of any type and merges into a single executable file. mFileBinder uses rijndael encryption algorithm to encrypt the file which can make Virus / Trojans Fully Undetectable. Set the drop location of all files and set the execution mode(Background,Foreground) of each file. Predefined set of ICON Package is included set your desired icon. Silently extracts and sequentially execute files.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 19
    iNetmon Portable
    iNet Portable boasts a confluence of innovative technologies coupled with many years of research undertaken in the area of network monitoring. It is aimed to take the burden of network administrators.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    DK (ICF OFFICIAL ) SHELL

    DK OFFICIAL ICF SHELL ... CURRENT SELL PASSWORD : DK

    ...This shell is build from the core of WSO shell & COntains superb features like ♦FULLY AUTOMATIC SYMLINKER ♦FULLY AUTOMATIC SAFEMOD BYPASS (2012) ♦CPANEL CRACKER ♦FULLY UNDETECTABLE ♦FULLY ENCRYPTED ♦PASSWORD PROTECTION ♦PERL BASED BACKCONNECTION ♦CGI BYPASS MODE ♦NOW CAN BACKCONNECT FROM ANY SERVER CREATED BY D& K ///////........ GREETZ:TO ALL ICF & OPENFIRE MEMBERS sent your feedbacks ,troubles , bugs ,& enquiries to : arcxnetwork@hotmail.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Fleuron

    Silent flash drive copier

    ...Fleuron also randomly stops for random amounts of seconds to allow the drive to be safely removed and to avoid detection. Fleuron can be used for data backup, flash synchronization and undetectable data copying. Note: Currently Fleuron only works on Linux systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    edx33v2 is a Silkroad Online proxy application that uses a man-in-the-middle attack vector to provide the end user full access to the underlying communication channel between the client and server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    n00bRAT
    An undetectable Remote Administration Tool -OR- trojan, an all new approach. Easily usable, Client just requires any Web Browser to control remote machine via WebPage. Fooling firewalls/ids/ips security solutions, as it operates like any web-site.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Shade is a versatile LSB (least significant bit) manipulation and analysis tool used to hide/retrieve files from within other files, such as images. The goal is to make the existence of the hidden file completely undetectable, and optionally encrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    LogD (Log Daemon) is an Open Source Meta Mod (www.metamod.org) plugin for Half-Life Servers. It decodes log messages through the use of the Half-Life API to notify other plugins of events otherwise undetectable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB