Showing 19 open source projects for "odin-tool"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 1
    Maigret

    Maigret

    Collect a dossier on a person by username from thousands of sites

    Maigret is an open-source OSINT tool designed to collect a dossier on a person by username from thousands of sites. It automates the process of checking for a user's presence across various platforms, aiding in digital investigations.​
    Downloads: 79 This Week
    Last Update:
    See Project
  • 2
    Watcher

    Watcher

    Open Source Cybersecurity Threat Hunting Platform

    Watcher is a file integrity monitoring tool that detects unauthorized changes to files, helping organizations maintain compliance and security.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3

    Network Enumeration Tool

    Network Enumeration Tool for Host Exploration and Recon

    N-ETHER (Network Enumeration Tool for Host Exploration and Reconnaissance) is a robust and highly automated Python script designed to streamline the critical initial phases of network security auditing and penetration testing. It’s core purpose is to perform fast, comprehensive, and consistent host and port discovery across single targets or large lists of IP addresses.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    Discord Token & Message Spammer

    Discord Token & Message Spammer

    best open source discord spammer (token-webhook&more)

    ...DSM version 0.4 the installer file is safe but if u dont trust it just go to the github page and download the source files from there https://github.com/SStorm21/Discord-Message-Spammer-DSM ill keep updating this tool for sure tags: discord token spammer, discord raid tool, discord , discord tool discord tokens, chat spammer license By downloading this, you agree to the Commons Clause license and that you're not allowed to sell this repository or any code from this repository. For more info see https://commonsclause.com/.
    Downloads: 46 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5

    Incident Response Automation

    Incident Response Automation Tool

    This tool simulates automated defensive actions, such as blocking an IP address on a firewall, in response to detected threats. Quick Start To use this tool, run the responder: # Block an IP address python lab_runner.py incident-response --ip 10.10.10.xxx --reason "Malicious Activity Detected"
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    BypassHash

    BypassHash

    This tool downloads an executable and bypasses hash-based virus checks

    This tool downloads an executable, ELF (Linux) and PE (Windows), modify metadata to bypasses hash-based virus checks and protect against identification with metadata (like rich headers, timestamps, ...).
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7

    ICS Sensor Sim Lab

    ICS Sensor Traffic Simulator

    This tool simulates network traffic typical of an Industrial Control System (ICS) environment. It generates synthetic Modbus/TCP packets to help test monitoring and intrusion detection systems. Quick Start To use this tool, run the simulator: bash # Run for 30 seconds and save to traffic.log python lab_runner.py ics-sim --duration 30 --output traffic.log
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    Full Stack Computer Scanner

    Full Stack Computer Scanner

    Scans the entire computer device "stack" (hardware, software, comms)

    The Full Stack Computer Scanner is a proprietary FREEWARE Windows system diagnostics tool designed to help assess a computer’s security posture. The application performs read-only analysis across 50 key system sectors, including hardware, firmware, boot components, operating system configuration, installed software, browser extensions, and network-related indicators. This is the initial 2026 public release of a transparency-first scanner focused on visibility and education rather than automated remediation. ...
    Downloads: 54 This Week
    Last Update:
    See Project
  • 9

    Secure VPC Network Generator

    Secure VPC Network Generator

    Deploys a secure VPC on AWS with public/private subnets using Terraform. This tool provides a calculator and generator for AWS VPC Terraform configurations. It allows you to quickly scaffold a secure VPC with multiple subnets. Quick Start To use this tool, run the generator: bash # Generate a VPC with 3 subnets python lab_runner.py vpc-gen --cidr 10.10.0.0/16 --subnets 3 --output my_vpc.tf
    Downloads: 3 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 10
    X-Ray of Death
    A professional PE (Portable Executable) analysis and modification tool for Windows executables and DLLs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    System Hardening Benchmark

    System Hardening Compliance Auditor

    This tool simulates a security compliance audit, checking system configurations against a defined benchmark (e.g., DISA STIG or CIS).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12

    Passive-Network-Scan-L2/3

    Passive network discovery tool focused on Layer 2 and Layer 3 packets

    Passive-Network-Scan-L2/3 is a lightweight, passive network discovery tool that listens on a network interface in promiscuous mode and collects Layer 2 and Layer 3 signalling (ARP, STP, DHCP, mDNS, SSDP). It aggregates discovered hosts by MAC address, attempts to measure passive RTTs for request/response protocols, maintains per-protocol RTT histories and simple service hints, and can emit structured events and a final table in JSON or CSV formats.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    IP Availability Scanner

    IP Availability Scanner

    Fast IP and Port Scanner

    This utility efficiently scans IP addresses and gathers host names and MAC addresses. It offers the capability to export scan results and includes features for port scanning of selected hosts. Enhanced with a multithreaded framework, the tool delivers increased speed, supporting functionalities like trigger actions and banner grabbing during port scans. For more advanced options, right-click on the displayed grids. This context menu includes options for port scanning, copying results, and network diagnostics tools like ping and traceroute. Additionally, it allows for easy access to ports using standard protocols such as SSH. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 14
    pyWhat

    pyWhat

    Identify emails, IP addresses, and more

    pyWhat is a Python-based identification tool designed to figure out “what” a piece of text or file content represents, especially in security and OSINT workflows. Given inputs such as hex strings, URLs, email addresses, IP addresses, credit card numbers, cryptocurrency wallets, or entire .pcap capture files, it scans for structured patterns and tells you what it finds. The tool is recursive: it can traverse files and directories to extract meaningful entities, which is useful when analyzing malware samples, network captures, or code repositories at scale. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    maskphish

    MaskPhish: First ever URL masking tool for Phishing

    MaskPhish can hide any URL to another URL. We can make https://ngrok.io/4GTJ78C [Example Link] to https://google.com/live-football@is.gd/6hts4 [Example Link] For more Cybersecurity information visit https://www.kalilinux.in
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Cyber Security Tool

    Cyber Patriots, more easy to access

    A cyber security tool to help you guide to services, computer management and ect... Want a feature added or need a bug reported? Email: KillingIndividualZeros@gmail.com
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    The PCS Security Technology Evaluation Tool (P-STET) is a tool funded by the I3P which allows maintainers of Critical Infrastructure systems to evaluate and compare the costs and benefits of implementing cyber security technology.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Cake Fuzzer

    Security testing tool for CakePHP based web applications

    Cake Fuzzer is an open-source project meant to help automatically and continuously discover vulnerabilities in web applications created based on specific frameworks with very limited false positives. Currently, it is implemented to support the Cake PHP framework. Cake Fuzzer is based on the concept of Interactive Application Security Testing (IAST). The goals of the project are: - create an automated process of discovering vulnerabilities in applications based on the CakePHP Framework; -...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    spyse-subdomain-finder

    scrounges subdomains without the api from spyse cybersecurity search e

    ...Because this methods below may not bring out all subdomains as the api can and perhaps the portability also. https://www.nmmapper.com/sys/tools/subdomainfinder/ https://www.nmmapper.com/kalitools/theharvester/email-harvester-tool/online/ https://www.nmmapper.com/st/networkmapper/nmap/online-port-scanning/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next