Showing 19 open source projects for "attacks"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    Druid

    Druid

    Database connection pool written in Java

    ...Druid provides a monitoring feature that can be implemented through filter-chain. It also comes with WallFilter, that is based on the SQL semantic analysis to protect from SQL injection attacks. Monitor connection leaks and connect to other databases, like Oracle database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Cyber

    Cyber

    Semantic non-deterministic Superintelligence consensus computer

    ...There are however at least 3 problems associated with the above-mentioned implementations. (1) the subjective nature of relevance, (2) difficulty in scaling consensus computers for over-sized knowledge graphs, (3) the lack of quality amongst such knowledge graphs. They are prone to various surface attacks, such as sybil attacks, and the selfish behavior of the interacting agents. In this document, we define a protocol framework for provable consensus computing of relevance, between content-addresable objects, which can be computed on GPUs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    SimpleX

    SimpleX

    The first messaging platform operating without user identifiers

    ...It allows to deliver messages without user profile identifiers, providing better meta-data privacy than alternatives. Many communication platforms are vulnerable to MITM attacks by servers or network providers. To prevent it SimpleX apps pass one-time keys out-of-band when you share an address as a link or a QR code. Double-ratchet protocol. OTR messaging with perfect forward secrecy and break-in recovery. NaCL cryptobox in each queue to prevent traffic correlation between message queues if TLS is compromised.
    Downloads: 24 This Week
    Last Update:
    See Project
  • 4
    Arcjet

    Arcjet

    Arcjet JS SDKs. Rate limiting, bot protection, email verification

    Arcjet helps developers protect their apps in just a few lines of code. Implement rate limiting, bot protection, email verification, and defense against common attacks. Native security for Bun, Next.js, Node.js, SvelteKit, Vercel, Netlify, Fly.io, and other modern platforms. Customizable protection for signup forms, login pages, API routes, and your whole app. Test security rules locally. Protection that works in every environment. No agent is required.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Pest Control Management Software Icon
    Pest Control Management Software

    Pocomos is a cloud-based field service solution that caters to businesses

    Built for the pest control industry, but also works great for Mosquito Control, Bin Cleaning, Window Washing, Solar Panel Cleaning, and other Home Service Businesses in need of an easy-to-use software that helps you simplify routing, scheduling, communications, payment processing, truck tracking, time tracking, and reporting.
    Learn More
  • 5
    Status - a Mobile Ethereum OS

    Status - a Mobile Ethereum OS

    A free (libre) open source, mobile OS for Ethereum

    ...Safely send, store and receive cryptocurrencies including ERC20 and ERC721 tokens with the Status crypto wallet. Only you hold the keys to your funds. Status' intuitive design protects you and your funds from attacks. Status uses an open-source, peer-to-peer protocol, and end-to-end encryption to protect your messages from third parties. Keep your private messages private with Status. Browse the growing ecosystem of DApps including marketplaces, exchanges, games, and social networks. The latest security standards ensure a private browsing experience. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    status-react

    status-react

    A free (libre) open source, mobile OS for Ethereum

    ...Safely send, store and receive cryptocurrencies including ERC20 and ERC721 tokens with the Status crypto wallet. Only you hold the keys to your funds. Status' intuitive design protects you and your funds from attacks. Status uses an open-source, peer-to-peer protocol, and end-to-end encryption to protect your messages from third parties.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Encryption plugin for Pidgin, providing up to 4096 bit RSA encryption using the NSS crypto library from Mozilla. Keys are automatically transmitted and stored, making it very easy to use, but also resistant to man-in-the-middle attacks.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 8
    ufonet

    ufonet

    UFONet - Denial of Service Toolkit

    UFONet - Is a set of hacktivist tools that allow launching coordinated DDoS and DoS attacks and combine both in a single offensive. It also works as an encrypted DarkNET to publish and receive content by creating a global client/server network based on a direct-connect P2P architecture. + FAQ: https://ufonet.03c8.net/FAQ.html -------------------------------------------- -> UFONet-v1.8 [DPh] "DarK-PhAnT0m!"
    Downloads: 9 This Week
    Last Update:
    See Project
  • 9
    Pget

    Pget

    The fastest, resumable file download client

    Multi-Connection Download using parallel requests. This program comes with no warranty. You must use this program at your own risk.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • 10
    King Phisher

    King Phisher

    Phishing Campaign Toolkit

    King Phisher is an open source tool that can simulate real world phishing attacks. It has an easy-to-use, flexible architecture that allows for full control over both emails and server content. It is useful for running awareness campaigns and training, and can only be used for legal applications when the explicit permission of the targeted organization has been obtained.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 11
    FlexGuard is server software which uses a point based system to keep track of SMTP traffic and data during the SMTP session. FlexGuard is used to block SPAM attacks by preventing malicious users from sending excessive mail via the SMTP server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    The Alpha-Padding Permutation Cipher

    Read this post: http://codijuana.blogspot.com/2013/10/case-2-alpha-pad

    Remix of the permutation ciphers' design for better security. I tried to solve the issue of frequency analysis and brute force attacks by joining padding and the alphabet matching (I called it the alpha-padding) View a demo here: http://igenda.netau.net/codijuana/alphapadding_permutation/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    SourceTalk

    Sorts ip flow data from Cisco IOS routers and switches

    SourceTalk sorts the output of the 'show ip cache flow' and 'show ip accounting' commands on Cisco IOS routers and switches. It can be helpful in finding the source of highest traffic on connections overutilized by legitimate traffic or DoS attacks. To use it, paste the entire output of either command in the input textbox and hit ‘Run’. By default the program will deliver the top 10 talkers in descending order, sorted by the number of packets/bytes sent (taken from the last column of the output). The program processes up to 100 000 lines of traffic data and the results can be saved to a .txt file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    SRPP: A library to implement SRPP (Secure Real-time Padding protocol) support. It is aimed at providing application-level packet padding for VoIP traffic, so as to thwart traffic analysis attacks on VoIP calls.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    IRC Defender is a modular perl program for protecting your IRC network against virus drones, general troublemakers, ban evasion, and attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Privale is a p2p network following the form of onion routing/mixmaster networks. But, it is an anonymous publish and retrieval medium, not a proxy system. Privale attempts to defend against denial of service attacks, Sybil attacks, and traffic analysis
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    project is based on another open source product. extending original functionality of detecting harvester attacks, we focus on categorizing email contents by using an bayesian algorithm. this is improved by visualisation and analytics concerning keywords.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A proxy smtp server with 1. Use of user-selectable DNSRBL lists to reject mail with customised rejection messages 2. Spam trap addresses to identify dictionary attacks and other spam sources 3. White listing and blacklisting by IP addresses and domain
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    RaidBot is a TCL based script for an EggDrop which provides features to organise attacks on Planetarion ( http://www.planetarion.com/ ) via IRC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next