Showing 11 open source projects for "network attack"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • 1
    Monero P2Pool

    Monero P2Pool

    Decentralized pool for Monero mining

    Decentralized pool for Monero mining. No central server that can be shutdown/blocked. P2Pool uses a separate blockchain to merge mine with Monero. Pool admin can't go rogue or be pressured to do an attack on the network because there is no pool admin.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 2
    Linux Air Combat

    Linux Air Combat

    Combat Flight Simulator for LINUX. WW2. Network and VOIP. Open-source.

    WW2 Combat Flight Simulator. Free. Current Version: 9.93. This is now the world's leading open-source combat flight sim for LINUX. Linux Air Combat ("LAC") runs on almost any desktop LINUX system (even Steam Deck & Raspberry Pi) and generates smooth, high-performance flight. If it runs TOO fast on your hardware (framerates beyond 100 FPS), you should activate LAC's built-in FrameRate Limiter as documented...
    Leader badge
    Downloads: 100 This Week
    Last Update:
    See Project
  • 3
    Mac Crack Attack
    Mac Crack Attack is a port of Crack Attack to the Mac OS X platform. Crack Attack is based on the Super Nintendo classic Tetris Attack. Mac Crack Attack is a fast paced "Tetris-like" game for one or two players (networked)
    Downloads: 9 This Week
    Last Update:
    See Project
  • 4
    Hyenae NG

    Hyenae NG

    Advanced Network Packet Generator

    Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pattern based address randomization and flood detection breaking mechanisms. *** Please check out the latest source from my GitHub repository and check the Build informations. https://github.com/r-richter/hyenae-ng/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5
    PhishBlock

    PhishBlock

    A program that detects and blocks phishing, pharming, Hacker's C&C.

    ...Recently, most malware codes are delivered covertly to users’ personal computers through Google ads, SNS, Blogs, BBS and so on, which users visit often. And After the malware codes connect the C&C server(or Botnet), they attack, and steal information, repeatedly and persistently. Currently, there is a lack of affordable software to protect individuals personal computer’s from detecting and blocking these malware features. Generally, virus vaccine programs only detect and block files already existing inside a users’ personal computer. But PhishBlock detects and blocks harmful files at the network entrance of personal computers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Pulsar Game

    Pulsar Game

    Pulsar is a card video game using Stars as gameplay key elements.

    ...Stars are linked each together, in other words it is a network of Stars, as a constellation is. Linked AMAS Stars combine their power to generate the attack. They cannot die but they need to reload themselves to generate a new attack. Defense Stars have Defense Points (DP). When a Star does not have enough DP to survive, it can either simply die, transform to powerful (yet weak) Stars or explode becoming a Black Hole!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    mikrotik-ips-ids

    mikrotik-ips-ids

    IDS + IPS for RouterOS (mikrotik)

    This project reads logs from your mikrotik firewall and creates an address list with detected attackers
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    jacknsee
    Jacknsee is an educational network security tool. Its purpose is to teach students in computer science how basic hijacking techniques are used to corrupt a network. Two scenarios have been implemented: Man in the Middle and Denial of Service.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Binary Cyber Cannon is an open source network attack tool for Windows written in C++ with the interface written in C#.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 10
    This project presents an online real-time network intrusion detection system (Real-Time NIDS),which can determine within a very short time unit if the LAN is suffering from a flooding attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    vSentinel is a customizable 3D mapping of your network monitoring or security data for real-time or trend-based attack and anomaly detection and analysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB