Showing 10 open source projects for "bypass"

View related business solutions
  • Add Two Lines of Code. Get Full APM. Icon
    Add Two Lines of Code. Get Full APM.

    AppSignal installs in minutes and auto-configures dashboards, alerts, and error tracking.

    Works out of the box for Rails, Django, Express, Phoenix, and more. Monitoring exceptions and performance in no time.
    Start Free
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 1
    objection

    objection

    Objection - runtime mobile exploration

    objection is a runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak. Perform memory-related tasks, such as dumping & patching. Explore and manipulate objects on the heap. Installation is simply a matter of pip3 install objection. This will give you the objection command. You can update an existing objection installation with pip3 install --upgrade objection. A file system listing of the...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Laravel Response Cache

    Laravel Response Cache

    Speed up a Laravel app by caching the entire response

    This Laravel package can cache an entire response. By default, it will cache all successful get-requests that return text-based content (such as HTML and json) for a week. This could potentially speed up the response quite considerably. So the first time a request comes in the package will save the response before sending it to the users. When the same request comes in again we're not going through the entire application but just respond with the saved response.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    UACMe

    UACMe

    Defeating Windows user account control

    ...Since 3.5.0 version all "fixed" methods are considered obsolete and removed altogether with all supporting code/units. If you still need them. This tool shows ONLY popular UAC bypass method used by malware, and re-implement some of them in a different way improving original concepts. There are different, not yet known to the general public, methods. This tool is not intended for AV tests and not tested to work in aggressive AV environment, if you still plan to use it with installed bloatware AV soft, use it at your own risk.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    PoshC2

    PoshC2

    C2 framework used to aid red teamers with post-exploitation

    ...Out-of-the-box PoshC2 comes PowerShell/C# and Python2/Python3 implants with payloads written in PowerShell v2 and v4, C++ and C# source code, a variety of executables, DLLs and raw shellcode in addition to a Python2/Python3 payload. These enable C2 functionality on a wide range of devices and operating systems, including Windows, *nix and OSX. Shellcode containing in-build AMSI bypass and ETW patching for a high success rate and stealth. Auto-generated Apache Rewrite rules for use in a C2 proxy, protecting your C2 infrastructure and maintaining good operational security. Fully encrypted communications, protecting the confidentiality and integrity of the C2 traffic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 5
    Trojan-Go

    Trojan-Go

    A Trojan proxy written in Go

    ...Shadowsoks' encryption protocol design makes the transmitted data package itself have almost no characteristics, and it looks similar to a completely random bitflow, which can indeed effectively bypass GFW in the early days. Contrary to Shadowsoks, Trojan does not use self-defined encryption protocols to hide itself. On the contrary, the clearly characterized TLS protocol (TLS/SSL) is used to make the flow look the same as the normal HTTPS website. TLS is a mature encryption system, and HTTPS uses TLS to carry HTTP traffic. For passive testing, the flow of the Trojan agreement is completely consistent with the characteristics and behavior of the HTTPS flow. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Bilibili Helper

    Bilibili Helper

    Auxiliary tool that can replace the player, push notifications, etc.

    ...Bilibili (bilibili.com) is an auxiliary tool that can download videos, query the sender of the barrage, and some very useful live broadcast area functions. An auxiliary extension for Bilibili (bilibili.com) which allows users to bypass playback restrictions, replace video players and use shortcuts. Starting from a certain version, Bilibili Assistant uses special technical methods to realize the unlocking function of regional restrictions. It was known to only be able to re-fix the feature via a proxy method, but the cost was prohibitive and we decided not to maintain the feature anymore. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    PowerMock

    PowerMock

    Java framework that allows you to unit test code normally

    Writing unit tests can be hard and sometimes good design has to be sacrificed for the sole purpose of testability. Often testability corresponds to good design, but this is not always the case. For example final classes and methods cannot be used, private methods sometimes need to be protected or unnecessarily moved to a collaborator, static methods should be avoided completely and so on simply because of the limitations of existing frameworks. PowerMock is a framework that extends other...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Twint

    Twint

    An advanced Twitter scraping & OSINT tool written in Python

    Twint is an advanced open-source Twitter scraping and OSINT tool written in Python that extracts tweets, user data, followers, likes, and more—without relying on Twitter’s API—making it highly useful for researchers, analysts, and hobbyists who want to bypass rate limits and access public Twitter data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Dr0p1t-Framework

    Dr0p1t-Framework

    A framework that create an advanced stealthy dropper

    ...It also incorporates techniques to avoid forensic analysis, such as self-deletion and cleaning traces after execution. The generated executables are optimized to be small and efficient, improving their ability to bypass security controls.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 10
    MITMf

    MITMf

    Framework for Man-In-The-Middle attacks

    ...The framework contains a built-in SMB, HTTP and DNS server that can be controlled and used by the various plugins, it also contains a modified version of the SSLStrip proxy that allows for HTTP modification and a partial HSTS bypass. As of version 0.9.8, MITMf supports active packet filtering and manipulation (basically what better filters did, only better), allowing users to modify any type of traffic or protocol. The configuration file can be edited on-the-fly while MITMf is running, the changes will be passed down through the framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB