Showing 20 open source projects for "attacks"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    Cyber

    Cyber

    Semantic non-deterministic Superintelligence consensus computer

    ...There are however at least 3 problems associated with the above-mentioned implementations. (1) the subjective nature of relevance, (2) difficulty in scaling consensus computers for over-sized knowledge graphs, (3) the lack of quality amongst such knowledge graphs. They are prone to various surface attacks, such as sybil attacks, and the selfish behavior of the interacting agents. In this document, we define a protocol framework for provable consensus computing of relevance, between content-addresable objects, which can be computed on GPUs.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    Druid

    Druid

    Database connection pool written in Java

    ...Druid provides a monitoring feature that can be implemented through filter-chain. It also comes with WallFilter, that is based on the SQL semantic analysis to protect from SQL injection attacks. Monitor connection leaks and connect to other databases, like Oracle database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Session Desktop

    Session Desktop

    A Decentralized, Onion Routed, Private Messenger

    ...Built on the Session protocol and the Loki network, it routes messages through a distributed onion-routing network that hides metadata like sender, timing, and location so that conversations are resistant to surveillance and correlation attacks. The desktop client pairs seamlessly with Session mobile apps but can also be used independently to communicate with Session contacts in a familiar desktop interface that supports a full keyboard, global notifications, drag-and-drop media sharing, and local file access. Session emphasizes zero-knowledge privacy, meaning that only the participants in a conversation can read the messages.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 4
    Arcjet

    Arcjet

    Arcjet JS SDKs. Rate limiting, bot protection, email verification

    Arcjet helps developers protect their apps in just a few lines of code. Implement rate limiting, bot protection, email verification, and defense against common attacks. Native security for Bun, Next.js, Node.js, SvelteKit, Vercel, Netlify, Fly.io, and other modern platforms. Customizable protection for signup forms, login pages, API routes, and your whole app. Test security rules locally. Protection that works in every environment. No agent is required.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 5
    SimpleX

    SimpleX

    The first messaging platform operating without user identifiers

    ...It allows to deliver messages without user profile identifiers, providing better meta-data privacy than alternatives. Many communication platforms are vulnerable to MITM attacks by servers or network providers. To prevent it SimpleX apps pass one-time keys out-of-band when you share an address as a link or a QR code. Double-ratchet protocol. OTR messaging with perfect forward secrecy and break-in recovery. NaCL cryptobox in each queue to prevent traffic correlation between message queues if TLS is compromised.
    Downloads: 33 This Week
    Last Update:
    See Project
  • 6
    Status - a Mobile Ethereum OS

    Status - a Mobile Ethereum OS

    A free (libre) open source, mobile OS for Ethereum

    ...Safely send, store and receive cryptocurrencies including ERC20 and ERC721 tokens with the Status crypto wallet. Only you hold the keys to your funds. Status' intuitive design protects you and your funds from attacks. Status uses an open-source, peer-to-peer protocol, and end-to-end encryption to protect your messages from third parties. Keep your private messages private with Status. Browse the growing ecosystem of DApps including marketplaces, exchanges, games, and social networks. The latest security standards ensure a private browsing experience. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    status-react

    status-react

    A free (libre) open source, mobile OS for Ethereum

    ...Safely send, store and receive cryptocurrencies including ERC20 and ERC721 tokens with the Status crypto wallet. Only you hold the keys to your funds. Status' intuitive design protects you and your funds from attacks. Status uses an open-source, peer-to-peer protocol, and end-to-end encryption to protect your messages from third parties.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Encryption plugin for Pidgin, providing up to 4096 bit RSA encryption using the NSS crypto library from Mozilla. Keys are automatically transmitted and stored, making it very easy to use, but also resistant to man-in-the-middle attacks.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9
    ufonet

    ufonet

    UFONet - Denial of Service Toolkit

    UFONet - Is a set of hacktivist tools that allow launching coordinated DDoS and DoS attacks and combine both in a single offensive. It also works as an encrypted DarkNET to publish and receive content by creating a global client/server network based on a direct-connect P2P architecture. + FAQ: https://ufonet.03c8.net/FAQ.html -------------------------------------------- -> UFONet-v1.8 [DPh] "DarK-PhAnT0m!"
    Downloads: 17 This Week
    Last Update:
    See Project
  • Reach Your Audience with Rise Vision, the #1 Cloud Digital Signage Software Solution Icon
    Reach Your Audience with Rise Vision, the #1 Cloud Digital Signage Software Solution

    K-12 Schools, Higher Education, Businesses, Restaurants

    Rise Vision is the #1 digital signage company, offering easy-to-use cloud digital signage software compatible with any player across multiple screens. Forget about static displays. Save time and boost sales with 500+ customizable content templates for your screens. If you ever need help, get free training and exceptionally fast support.
    Learn More
  • 10
    Pget

    Pget

    The fastest, resumable file download client

    Multi-Connection Download using parallel requests. This program comes with no warranty. You must use this program at your own risk.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    King Phisher

    King Phisher

    Phishing Campaign Toolkit

    King Phisher is an open source tool that can simulate real world phishing attacks. It has an easy-to-use, flexible architecture that allows for full control over both emails and server content. It is useful for running awareness campaigns and training, and can only be used for legal applications when the explicit permission of the targeted organization has been obtained.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 12
    FlexGuard is server software which uses a point based system to keep track of SMTP traffic and data during the SMTP session. FlexGuard is used to block SPAM attacks by preventing malicious users from sending excessive mail via the SMTP server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    The Alpha-Padding Permutation Cipher

    Read this post: http://codijuana.blogspot.com/2013/10/case-2-alpha-pad

    Remix of the permutation ciphers' design for better security. I tried to solve the issue of frequency analysis and brute force attacks by joining padding and the alphabet matching (I called it the alpha-padding) View a demo here: http://igenda.netau.net/codijuana/alphapadding_permutation/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    SourceTalk

    Sorts ip flow data from Cisco IOS routers and switches

    SourceTalk sorts the output of the 'show ip cache flow' and 'show ip accounting' commands on Cisco IOS routers and switches. It can be helpful in finding the source of highest traffic on connections overutilized by legitimate traffic or DoS attacks. To use it, paste the entire output of either command in the input textbox and hit ‘Run’. By default the program will deliver the top 10 talkers in descending order, sorted by the number of packets/bytes sent (taken from the last column of the output). The program processes up to 100 000 lines of traffic data and the results can be saved to a .txt file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    SRPP: A library to implement SRPP (Secure Real-time Padding protocol) support. It is aimed at providing application-level packet padding for VoIP traffic, so as to thwart traffic analysis attacks on VoIP calls.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    IRC Defender is a modular perl program for protecting your IRC network against virus drones, general troublemakers, ban evasion, and attacks.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    Privale is a p2p network following the form of onion routing/mixmaster networks. But, it is an anonymous publish and retrieval medium, not a proxy system. Privale attempts to defend against denial of service attacks, Sybil attacks, and traffic analysis
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    project is based on another open source product. extending original functionality of detecting harvester attacks, we focus on categorizing email contents by using an bayesian algorithm. this is improved by visualisation and analytics concerning keywords.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A proxy smtp server with 1. Use of user-selectable DNSRBL lists to reject mail with customised rejection messages 2. Spam trap addresses to identify dictionary attacks and other spam sources 3. White listing and blacklisting by IP addresses and domain
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    RaidBot is a TCL based script for an EggDrop which provides features to organise attacks on Planetarion ( http://www.planetarion.com/ ) via IRC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next