Showing 10 open source projects for "malware-patch"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • eProcurement Software Icon
    eProcurement Software

    Enterprises and companies seeking a solution to manage all their procurement operations and processes

    eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
    Learn More
  • 1
    Safe Exam Browser Patch

    Safe Exam Browser Patch

    Bypass Safe Exam Browser restrictions

    This project is a bypass of Safe Exam Browser to allow users to exit the exam screen.
    Leader badge
    Downloads: 197 This Week
    Last Update:
    See Project
  • 2
    EDGE.Patcher

    EDGE.Patcher

    VERY Big thanks for: -Q (QuQuRoon)

    Official tool for binary patching (assembly bithack & string replace) propietary Microsoft EDGE (msedge.exe) & Google Chrome (chrome.exe) browsers. * Redirect PE COFF IMPORT/Delay table to API-MS libs; * Patch binary assembly code; * Clear PE COFF certificate area;
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    RestClient for Unity

    RestClient for Unity

    A Promise based REST and HTTP client for Unity

    ...Transform request and response data (JSON serialization with JsonUtility or other tools) Automatic transforms for JSON Arrays. Supports default HTTP Methods (GET, POST, PUT, DELETE, HEAD, PATCH) Generic REQUEST method to create any http request. Based on Promises for better asynchronous programming. Learn about Promises here! Utility to work during a scene transition. Handle HTTP exceptions and retry requests easily.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Abdal FTP BruteForce

    Abdal FTP BruteForce

    FTP BruteForce tool For real Pentest

    Abdal FTP BruteForce tool is a powerful software with zero error rate to test the intrusion of servers that work with FTP protocol, this tool supports proxy for attacks and can transfer all your traffic in the hacking process to the proxy Slowly
    Downloads: 1 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 5
     Abdal Web Traffic Generator

    Abdal Web Traffic Generator

    create useful statistics and traffic on your site

    This tool will have the ability to create useful statistics and traffic on your site and actually help rank your statistics on sites like Alexa and so on.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
     Abdal 404 PenTest

    Abdal 404 PenTest

    Best tools for 404 WebApp stress

    Abdal 404 PenTest tool is a powerful software with multi-thread processing capability to generate 404 errors on the target server or site that can check the level of security of the target. Be sure to watch this tool to better understand the tutorial.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Abdal Mr Pig

    Abdal Mr Pig

    Secure file transfer with SSH

    Secure file transfer based on SSH protocol
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
     Abdal SSH BruteForce

    Abdal SSH BruteForce

    powerful SSH BruteForce tool

    Abdal SSH BruteForce tool is a powerful software with zero error rate to test the intrusion of servers that work with ssh protocol, this tool supports proxy for attacks and can transfer all your traffic in the hacking process to the proxy Slowly
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    ...Thus It's a prerequisite to Translate. The Legal Access: The Software Free version is not licensed. just some features are Available. Using any Crack, Serial, Patch for unlocking the lock is illegal. also some of the illegal methods for unlocking are infected with Virus, Worm, Trojan! We recommend that you to use The licensed version that has Full Features! Language(s): English (United States), Persian
    Downloads: 0 This Week
    Last Update:
    See Project
  • All-in-one security tool helps you prevent ransomware and breaches. Icon
    All-in-one security tool helps you prevent ransomware and breaches.

    SIEM + Detection and Response for IT Teams

    Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
    Learn More
  • 10
    With the Log Parser one can scan logs, whitelist out legitimate, non-corrupt entries (usually file paths), and apply a standard format to a log generated by any antivirus or malware-removal program. This makes for easier reading of the meat in any log.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next