• More...
  • More...
    • More...
    • More...
    • More...

Category Category

    • More...
    • More...
      • More...
    • More...
    • More...

License License

    • More...

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

    • More...
    • More...

User Interface User Interface

    • More...
    • More...
  • More...

Database Environment Database Environment

    • More...

Freshness Freshness

Top Apps

  • Monitor Your Most Critical Cloud & SaaS Applications Monitor Your Most Critical Cloud & SaaS Applications Icon
    Monitor Your Most Critical Cloud & SaaS Applications Icon

    Get insights into the performance of applications and services such as AWS, Salesforce, Office 365 and WebEx.

    With a view into both web and network health, you'll be able to pinpoint the cause of an outage instantly, whether it's within your network, a provider's network or the SaaS application. Save time, track SLAs and clear tickets faster.
    Are you involved with your company's network performance/operations team?
    Try It FREE!
  • Want to improve your MSP’s revenue? Price your services right. Want to improve your MSP’s revenue? Price your services right. Icon
    Want to improve your MSP’s revenue? Price your services right. Icon

    Get the ebook, The Managed Services Pricing Guide 2.0 to get industry best practices on pricing managed services.

    You choose software for your IT business so it makes you money. The margins must be good enough to justify the cost. SolarWinds® RMM was priced to give you the margins you need to earn a healthy amount of monthly recurring revenue. Download our all-new Managed Services Pricing Guide 2.0 to find what revenue to expect for your services, including light monitoring, web protection, patching management, backup and more.
  • venom - shellcode generator Icon

    venom - shellcode generator

    msfvenom shellcode generator/compiler/listenner

    The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( c | python | ruby | dll | msi | hta-psh ), injects the shellcode generated into one funtion (example: python) "the python funtion will execute the shellcode in ram" and uses compilers like: gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file, also starts a multi-handler to recibe the remote connection (reverse shell or meterpreter session). -- 'shellcode generator' tool reproduces some of the technics used by Veil-Evasion framework,, powersploit, etc,etc,etc.."P.S. some payloads are undetectable by AV soluctions yes!!!" one of the reazons for that its the use of a funtion to execute the 2º stage of shell/meterpreter directly into targets ram.

  • Apache HTTPD Server Portable Icon

    Apache HTTPD Server Portable

    Apache HTTPD Server is an open source web server packaged as a portable app, so you can run a full web server on your iPod, USB flash drive, portable hard drive, etc. It has all the same features as Apache HTTPD, plus, it leaves no personal information behind on the machine you run it on, so you can take it with you wherever you go.

    Downloads: 113 This Week Last Update: See Project
  • ArpON Icon


    ARP handler inspection

    ArpON (ARP handler inspection) is a Host-based solution that make the ARP standardized protocol secure in order to avoid the Man In The Middle (MITM) attack through the ARP spoofing, ARP cache poisoning or ARP poison routing attack.

  • CleanDNS Appliance Icon

    CleanDNS Appliance

    A DNS based malware protection

    This is a Proof of Concept Technology for protecting End Users from malware, advanced threat and other malicious content by preventing DNS malicious Request/Responses. Considerations: Virtual Hardware Recommended (ALL Back-level Compatibility): - CPU Type: x86_64 (AMD64) - 4vCPUs - 8GB RAM - 40GB On demand Virtual Disk - Intel e1000 Virtual Network Interfaces (Mandatory) Components Used: PFSense 2.3.4-Patch1 - Suricata Module - Bind Module - Cron Module - Service Watchdog Module - SNORT Community Signature + Emerging Threats for constant update. - - Bring Your Own SNORT OINKCODE to get advanced rules. #CleanDNS Project: Because Detection is Cool but Proactivity is Better!

    Downloads: 83 This Week Last Update: See Project
  • FakeNet

    Windows Network Simulation tool for Malware Analysis

    FakeNet is Windows network simulation tool designed for malware analysis. It redirects all traffic leaving a machine to the localhost (including hard-coded IP traffic and DNS traffic) and implements several protocols to ensure that malicious code continues to execute and can be observed by an analyst. The tool supports DNS, HTTP, and SSL protocols and provides a python extension interface for implementing new or custom protocols. It also the capability to listen for traffic to any port as well as create packet capture on the localhost. Right now the tool only supports WinXP Service Pack 3. The tool runs fine on Windows Vista/7 although certain features will be automatically disabled.

  • Multi-vendor storage monitoring simplified Multi-vendor storage monitoring simplified Icon
    Multi-vendor storage monitoring simplified Icon

    Monitor your multi-vendor storage to help ensure your applications get the performance & capacity they need with SolarWinds® Storage Resource Monitor.

    SolarWinds Storage Resource Monitor (SRM) gives you multi-vendor storage performance monitoring and alerting to help ensure peak storage performance. Automated capacity planning helps you predict storage shortages, reclaim space, and prevent application outages. SRM integrates with other Orion® Platform products to provide end-to-end visibility into the application stack, and lets you easily troubleshoot performance issues from application to storage.
  • Moihack Port-Flooder

    A simple TCP/UDP Port Flooder written in Python.

    This is a simple Port Flooder written in Python 3.2 Use this tool to quickly stress test your network devices and measure your router's or server's load. Features are available in features section below. Moihack DoS Attack Tool was the name of the 1st version of the program. Moihack Port-Flooder is the Reloaded Version of the program with major code rewrite and changes. Code is much smaller in size now - from about 130 pure lines of codes to 35 lines only. To run it you must have Python 3.2 or newer installed.Tested this on Windows,but guess it will work in Linux also,since there are not any OS specific lines in the code. This tool was only written for personal tests and usage! It was NOT written to DDoS other people and/or cause harm to hardware.I am NOT responsible for any kind of damage you make by using this software. If you want to reach me, contact me at

  • Airfox Icon


    Airfox is a free and fast web browser. It uses the Gecko Engine.

    Airfox is a fast, consistent, reliable, secure, private and independent web browser. Developed in the Microsoft .NET Runtime Environment, Airfox uses the Gecko Engine also seen in some well-known browsers such as Firefox, Waterfox, Pale Moon. Some advanced features such as Reliable Download Manager are not available due to restrictions from the GeckoFX runtime, but as seen from the results of the futuremark, acid 3 & acid 2 tests, Airfox’s scores/rankings are merit. We are just asking to support us by downloading Airfox and giving it a try. We promise that V2 will be just as good as the other famous browsers. We just want you to follow us on this journey. We want you to follow us on this quest. The quest for true browsing speed. The quest for an uncluttered web. The quest of YOUR ideal web . Download it at

  • PHP Portable Icon

    PHP Portable

    Fast, flexible and pragmatic, PHP powers everything from your blog to the most popular websites in the world. PHP Portable is packaged as a portable app, so you can run a full instance of PHP on your iPod, USB flash drive, portable hard drive, etc. It has all the same features as PHP, plus, it leaves no personal information behind on the machine you run it on, so you can take it with you wherever you go.

    Downloads: 72 This Week Last Update: See Project
  • phpMussel Icon


    PHP-based anti-virus anti-trojan anti-malware solution.

    A PHP script designed to detect trojans, viruses, malware and other threats within files uploaded to your system wherever the script is hooked, based on the signatures of ClamAV and others. Un PHP script pour la détection de virus, logiciels malveillants et autres menaces dans les fichiers téléchargés sur votre système partout où le script est accroché, basé sur les signatures de ClamAV et autres. Einem PHP-Script, um Trojaner, Viren, Malware und andere Bedrohungen in Dateien zu entdecken, die auf Ihr System hochgeladen werden könnten, welches die Signaturen von ClamAV und weitere nutzt. Uno PHP script progettato per la rilevazione di trojan, virus, malware e altre minacce all'interno di file caricati nel sistema ovunque lo script è collegato, basato su firme di ClamAV e altri.

    Downloads: 69 This Week Last Update: See Project
  • MEHARI Icon


    Méthode d'analyse de risques

    MEHARI est une méthode d'appréciation et de management des risques SI développée par le CLUSIF (Club de la Sécurité de l'Information Français). MEHARI est conforme aux exigences de la norme ISO/IEC 27005 pour la gestion des risques, et peut ainsi s'insérer dans une démarche ISO/IEC 27001.

    Downloads: 68 This Week Last Update: See Project
  • ManageEngine now lets you patch computers from cloud ManageEngine now lets you patch computers from cloud Icon
    ManageEngine now lets you patch computers from cloud Icon

    ManageEngine Patch Manager Plus offers patching capabilities on cloud - Patch all OS updates and 550 third party apps on-demand and stay secure!

    Last year saw the hackers unleash their expertise in skills for a ransom - targeting those unpatched computers in data-critical institutions. Only if the computers were patched on time, billions of dollars could have been saved. ManageEngine’s Patch Manager Plus comes to your rescue, offering you an automated patching solution, now on cloud, for latest hotfixes of Windows updates and a wide range of third-party applications (over 550 of them).
    Automate patching with Patch Manager Plus, sit back & relax!
    Patch on cloud now
  • Web Spider, Web Crawler, Email Extractor Icon

    Web Spider, Web Crawler, Email Extractor

    Free Extracts Emails, Phones and custom text from Web using JAVA Regex

    In Files there is WebCrawlerMySQL.jar which supports MySql Connection Please follow this link to get latest version Free Web Spider & Crawler. Extracts Information from Web by parsing millions of pages. Store data into Derby OR MySQL Database and data are not being lost after force closing the spider. - Free Web Spider , Parser, Extractor, Crawler - Extraction of Emails , Phones and Custom Text from Web - Export to Excel File - Data Saved into Derby Database - Written in Java Cross Platform See also Free Email Sender in this link:

  • SHODAN Icon


    Shodan - Automatic search for sites vulnerable to SQL injection, XSS injection LFI and RFI! Developed by Theone Lucas.

    Downloads: 64 This Week Last Update: See Project
  • CrococryptFile Icon


    An encryption tool for creating file archives

    CrococryptFile is a file encryption tool which creates encrypted archives of arbitrary files and folders. The encryption features of CrococryptFile can be compared to a ZIP utility that uses ZIP's AES encryption. However, there are significant differences. CrococryptFile... - encrypts all file and folder information including filenames, time/date and filesize information, - disguises any information of the archive's content, because all data and meta-data is simply integrated into a giant file dump. =Crypto Suites= For a full list of and details about supported crypto suites, please visit the CrococryptFile Homepage. Examples: - Password-based encryption (following PBKDF2) with AES-256, Twofish, Serpent, ... - Public key encryption using GPG/OpenPGP, Windows Keystore/CAPI with RSA/X.509 certificates - Cloaked (headerless) Password-based Encryption (AES-Twofish-256 cascaded) - ...

  • Chromensics - Google Chrome Forensics Icon

    Chromensics - Google Chrome Forensics

    A Google chrome forensics tool

    The Chromensics tool is developed to read all information from chrome browser directory and present it to user, in easy readable tabular format which can be explored in descent interface without running the chrome browser. The tool will also allow you retrieve information from other chrome installation brought from different machine for analyzing. The acquired artifacts can be exported in PDF report to present it in court of law or to superiors. -Update 04/02/2017- Standardized all date formats to YYYY-MM-DD HH:MM:SS Introduced Export to Excel Feature Added several search engines results under "Searches" Several Small bug fixes -Update- Now include debug capacity to generate debug logs. If users face any issue with tool, kindly attach cdb.log generated and send it to us. Fixed Cookie and Password Decryption Bug

    Downloads: 60 This Week Last Update: See Project
  • Fake Name Generator Icon

    Fake Name Generator

    Generates random fake names

    Program generates as many fake names as you want in lots of different languages. Works in Linux, *BSD & Windows. Version 2.0x saves the names to a file called filenames.txt , which you can load into a text editor. Currently v2.0x is the Latest Version.

  • Tech Support Scammer Fake Command Prompt Icon

    Tech Support Scammer Fake Command Prompt

    Fake command prompt to fool tech support scammers

    For instructions on how to use, see this file: This fake command prompt can be used instead of the real windows command prompt in order to waste the tech support scammers time. It is based upon the windows 7 command prompt, but is not noticeably different from the command prompt in most other windows versions. Many commands commonly used by scammers, such as tree, netstat and powercfg are emulated in this, but they provide results that the scammer would not be expecting, for example, the tree command draws an ASCII tree, while the powercfg command comes back with no errors, no warnings and no informational - every time, without fail. Commands not included all come back with the usual error as displayed for invalid commands in the real command prompt, however other commands can be added.

    Downloads: 59 This Week Last Update: See Project
  • KeeSAPLogon Icon


    Plugin for KeePass Password Safe to logon on SAP systems

    The KeePass Password Safe extension (plugin) enables you to logon at SAP systems (SAP GUI) by simply clicking on the password entry. See How it works: Simply add custom strings at each KeePass entry you want to use for SAP Logon. These custom strings will be recognized by the plugin: - SAP ID - SAP Client - SAP Language - SAP Transaction Filled properties "SAP ID" and "SAP Client" have to be present. Language and Transaction can be defined as default for all logons using the plugin configuration dialog. Make sure the "SAP Logon" column will be displayed, see KeePass settings. Note: SAP GUI must be installed and the path to sapshcut.exe (part of SAP GUI for Windows) must be configured by using the plugin config dialog. Prerequisites: - Windows 32/64bit - KeePass 2.29 or newer - SAP GUI 7.30 or newer

    Downloads: 58 This Week Last Update: See Project
  • OpenVoucher Icon


    Open source voucher management / hotspot system

    OpenVoucher is an open source voucher management / hotspot system for authenticating guests in your wifi or cable network. It is designed to be easy to use for anyone who wants to issue vouchers. For further information and installation how to's, see the project's homepage. The source code is maintained on Github.

    Downloads: 56 This Week Last Update: See Project
  • pcapfix

    repair corrupted pcap and pcapng files

    this tool tries to repair your broken pcap and pcapng files by fixing the global header respectively packet blocks and recovering the packets by searching und guessing the packet headers or blocks

  • BTS Pentesting Lab Icon

    BTS Pentesting Lab

    BTS Pentesting Lab - a deliberately vulnerable Web application

    BTS PenTesting Lab is an open source vulnerable web application, created by Cyber Security & Privacy Foundation ( It can be used to learn about many different types of web application vulnerabilities. Currently, the app contains the following types of vulnerabilities: *SQL Injection *XSS(includes Flash Based xss) *CSRF *Clickjacking *SSRF *File Inclusion * Code Execution *Insecure Direct Object Reference *Unrestricted File Upload vulnerability *Open URL Redirection *Server Side Includes(SSI) Injection and more... Java version of this application can be found here:

    Downloads: 54 This Week Last Update: See Project
  • Netdeep Secure Firewall Icon

    Netdeep Secure Firewall

    Next Generation Open Source Firewall

    Netdeep Secure is a Linux distribution with focus on network security. Is a Next Generation Open Source Firewall, which provides virtually all perimeter security features that your company may need. It offers Web content filters, ensuring better performance of the network, allowing users to use the service efficiently and securely, providing a deep control of the use of the Web access service, blocking access to unwanted websites, Virus, Spam, Applications and intrusion attempts. Its configuration is made entirely by the web interface.

    Downloads: 54 This Week Last Update: See Project
  • CommonThief MSR

    Simple decoded Credit Card data parser

    decoded data dumped from a magnetic stripe on the back of a credit card may be a little confusing to the average user. To make more sense of the data being displayed this simple parser can make any USB credit card reader user friendly.

    Downloads: 53 This Week Last Update: See Project
  • SALMON cipher

    Cryptographic PRNG

    Cryptographically-secure Random Number Generator.It is seeded with a 480-bit key and a 480-bit nonce. The target technology is a stream cipher. Each call to ::Invoke() returns a 32bit word. ( insert notes here about SALMON's operating speed ) SALMON uses a block cipher called SERPENT at the very end portion of its output. SERPENT was a finalist from the NIST selection tournaments. There is also mild use of a portion of Salsa20/12 called a "quarter round function". The key schedule relies on SHA-2 (the standard hash function of the NSA.)

    Downloads: 52 This Week Last Update: See Project
  • mts-ericsson Icon


    MTS is a OpenSource Multi-protocol tester for IP-based protocol

    MTS (Multi-protocol Test Suite) is a multi-protocol testing tool specially designed for telecom IP-based architectures (see above "Features" section for more details). MTS meets needs like : * Functional, non-regression or protocol tests => ‘Sequential’ mode * Load, performance endurance stress tests => ‘Parallel’ mode (master/slave) * Simulates equipment => client, server or both sides * System supervision => capture mode (like wireshark) Product characteristics : * Definition of tests case in XML files : test and scenarios input files * Graphical (very convivial) or command line (for test automation) user interfaces * Easy to use : logging management and rich statistics presentation. * Pure software solution => support only IP based protocol * Written in java => supports many famous platforms : Windows and Linux supported * Open Source product since begin 2012 with GPLV3 license => free to use


    A header-only C++ library for accessing files in ELF binary format

    ELFIO is a header-only C++ library intended for reading and generating files in the ELF binary format

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you