18 projects for "network security" with 1 filter applied:

  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • 1
    Hack Instagram Account with AI

    Hack Instagram Account with AI

    AI-driven Instagram account security hacking

    Hack Instagram Password - AI-Powered Tool This application was made using the API of PASS REVELATOR, for more information about Instagram hacking account and security, please visit their website: https://www.passwordrevelator.net/en/passdecryptor Advanced machine learning tool for Instagram password security assessment. Features AI-driven brute force attacks, pattern recognition, and neural network prediction. KEY FEATURES: • AI-Powered Password Generation - Machine learning instead of wordlists • Neural Network Prediction - Simulated neural networks for smart guessing • Context-Aware Attacks - Analyzes usernames for intelligent variations • Multi-Phase AI Strategy - Progressive techniques from simple to complex • Advanced Anonymity - Tor integration and proxy rotation • Real-time Monitoring - Performance metrics and success rates TECHNICAL SPECIFICATIONS: • Python 3.8+ required • Advanced machine learning algorithms
    Downloads: 19 This Week
    Last Update:
    See Project
  • 2
    OpenRemote

    OpenRemote

    Open Source for Internet of Things

    An Open Community in the Home Automation and Domotics space. We believe an Open Source approach can revolutionize the way people create, install, and maintain software in the industry. Our panel technology integrates with your favorite protocol and runtime hardware through Open Source software. We open up the front-end and support a unified panel and visual programming model. An installer can pick and choose hardware products from different vendors and still present one panel UI to the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    The PHP Web Toolkit enables the rapid development of multi-layered web applications and is designed to be easy to use, extensible, reliable, reusable, scalable and secure. It integrates with ADOdb, FCKeditor, kses, Libmcrypt, Libmhash and Smarty.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    MixRoutix
    Simple test For Mikrotik Router, application access to test Mikrotik Command with form. Simple scripting to Show Output Respons like default Command on mikroutik. Application Programmable Interface (API) allows users to create custom software solutions to communicate with RouterOS to gather information, adjust configuration and manage router. API closely follows syntax from command line interface (CLI). It can be used to create translated or custom configuration tools to aid ease of use...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Rent Manager Software Icon
    Rent Manager Software

    Landlords, multi-family homes, manufactured home communities, single family homes, associations, commercial properties and mixed portfolios.

    Rent Manager is award-winning property management software built for residential, commercial, and short-term-stay portfolios of any size. The program’s fully customizable features include a double-entry accounting system, maintenance management/scheduling, marketing integration, mobile applications, more than 450 insightful reports, and an API that integrates with the best PropTech providers on the market.
    Learn More
  • 5
    Text Encryption and Decryption

    Text Encryption and Decryption

    Anoncrypt-Text Encryption and Decryption Website in Java(Struts2)

    Anoncrypt by HTCoders is a web based Text Encryption and Decryption Project using Java Technology following Struts2 Framwork . It Consist of two modules > Password based Encryption (Symmetric Encryption) > Self-Destructible Message Service (Once the message is read , it is destroyed and cant be decrypted again .)
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    Cyberoam iView - Open Source SIEM
    Cyberoam iView; the Intelligent Logging & Reporting solution provides organizations network visibility across multiple devices to achieve higher levels of security, data confidentiality while meeting the requirements of regulatory compliance. To know more about Cyberoam and it’s security solutions visit us at www.cyberoam.com.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    MRelay

    Host to Host Network Acceleration and Encryption

    MRelay splits and distributes the traffic of a single TCP connection to several connections and merges the data at the other end. Using this approach, it is possible to achieve high throughput between two points on the network regardless of the delay between two points. MRelay can optionally encrypt the data and exchange some http headers before the relay process to make the traffic look like a regular http file download. This can be used to overcome the highly restrictive firewalls that are...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Open Jungo

    Open Jungo

    Open software persistence model

    Open Jungo is a flexible entity persistence model that makes it easy to create object-centric components with minimal coding. Unlike most current entity frameworks, Jungo does not require developers to structure their code in any particular way or specify database structures. Open Jungo supports most major proprietary and open source databases as well as well as a built-in highly efficient zero-configuration object-oriented database systems. It requires no external dependencies and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    FLAK
    Flak Is An Automation Frame-Work For MDK3 It Help's Users To Use MDK3 With Ease And in Interactive Way.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Rezku Point of Sale Icon
    Rezku Point of Sale

    Designed for Real-World Restaurant Operations

    Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
    Learn More
  • 10
    mikrotik-ips-ids

    mikrotik-ips-ids

    IDS + IPS for RouterOS (mikrotik)

    This project reads logs from your mikrotik firewall and creates an address list with detected attackers
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Underground IM - Java Instant Messenger

    Underground IM - Java Instant Messenger

    Underground IM is a free Java Instant Messaging solution.

    Underground IM is a free Java Instant Messaging solution. Both a client and a server are available. Underground IM is open source software distributed free of charge under the terms of the GNU General Public License. *Public Server: 64.94.101.216:5632
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    DAL4j

    Data Access Layer 4 Java

    Welcome to Data Access Layer for Java (DAL4j) a set of command line tools and framework used to reverse engineer a MySQL or SQLServer database schema into a set of JPA Entity Beans. DAL4j can be useful for scenarios where there is an existing database schema but a technology other that JPA is used to interact with the database. DAL4j can provide an easy way to migrate your code base from other technologies such as JDBC or Hibernate to JPA. The beans generated can be 1 or two types:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    BanglaDos

    A Denial of Service Attacking Desktop App

    An open source network stress testing and denial-of-service attack application, initially developed by Samin Yasar. The idea behind BanglaDos is that it can allow you to participate in attacks even if you've no clue how to hack. It send thousand of garbage request to web servers like visa.com , paypal.com to shut them down. If many computers using BanglaDos pointed at a single site to make a real impact, letting a central administrator press the big button of website destruction makes the...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14
    Build FW1 Cisco Netscreen PolicyFromLogs
    These three tools build Checkpoint, Cisco ASA or Netscreen policys from logfiles. They write dbedit, access-list or set address, set service and set policy commands for the traffic seen in the logs, that can be cut and pasted into the firewalls. WOOT
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    IceScan is a free open source network analyzing and security auditing tool for Unix-like and Windows operating systems. It uses libpcap, a packet capture and filtering library.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Software repository of the hack://src project. Includes security related software for crypto, vulnerability/patch notification & management, and ultra low level system access for stealth forensics & intrusion detection or malware removal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    SIPES (Security Incident Pollicy Enforcement System) aims to provide an automated e-mail,XML and PKI based system for automated security policy enforcement based on statefull risk assesment and open exchange formats.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Read Watchguard firewall .xml log files and move into a mysql database. Will include improved reporting capabilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next