Showing 4 open source projects for "android attack"

View related business solutions
  • Say goodbye spreadsheets and wall calendars. Hello automated task and employee scheduling. Icon
    Trusted by thousands, Operto Teams (formerly VRScheduler) puts everything you need to get your vacation rental work done in one place. It's the calm, organized way to manage your cleaning or vacation rental property management staff.
  • Nurp | Algorithmic Trading Icon
    Nurp | Algorithmic Trading

    See How Our Users Are Leveraging Algorithmic Trading To Produce Market Beating Returns

    Unleash your full trading potential with Nurp's powerful algorithms, insights, and supportive community
  • 1
    Udp2raw-tunnel

    Udp2raw-tunnel

    Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic

    A tunnel which turns UDP traffic into encrypted fakeTCP/UDP/ICMP traffic by using Raw Socket, helps you bypass UDP FireWalls(or unstable UDP environment). When used alone, Udp2raw tunnels only UDP traffic. Nevertheless, if you used udp2raw + any UDP-based VPN together, you can tunnel any traffic(include TCP/UDP/ICMP), currently, OpenVPN/L2TP/ShadowVPN and tinyfecVPN are confirmed to be supported. Linux host (including desktop Linux,Android phone/tablet,OpenWRT router,or Raspberry PI) with root...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    binserve

    binserve

    A fast production-ready static web server with TLS (HTTPS)

    A fast static web server with TLS (HTTPS), routing, hot reloading, caching, templating, and security in a single binary you can set up with zero code. Binserve is designed to be performant, this is thanks to Actix-Web - one of the fastest web frameworks out there and DashMap for handling routes and cache storage. Binserve is cross-platform and portable to any major operating system, like it can run on your Android phone! Routing is simply matching a URI path to a file or a directory in a JSON...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Tamper Dev

    Tamper Dev

    Extension that allows you to intercept and edit HTTP/HTTPS requests

    If you are a developer, you can use Tamper Dev to debug your websites, or if you are a pentester, you can use it to search for security vulnerabilities by inspecting the HTTP traffic from your browser. Unlike most other extensions, Tamper Dev allows you to intercept, inspect and modify the requests before they are sent to the server. This extension provides functionality similar to Burp Proxy, MITM Proxy, OWASP ZAP, Tamper Data, and Postman Proxy, but without the need of additional software,...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4

    PyLoris

    A protocol agnostic application layer denial of service attack.

    PyLoris is a scriptable tool for testing a server's vulnerability to connection exhaustion denial of service (DoS) attacks. PyLoris can utilize SOCKS proxies and SSL connections, and can target protocols such as HTTP, FTP, SMTP, IMAP, and Telnet.
    Leader badge
    Downloads: 124 This Week
    Last Update:
    See Project
  • BIGDBM is a leading provider of B2B data Icon
    BIGDBM is a leading provider of B2B data

    For marketing companies, sales organizations, data providers, e-commerce stores

    Unlock significant value in your marketing campaigns, lead generation strategies, and identity verification workflows with our leading US consumer and B2B datasets. Our unrivaled consumer datasets provide you with valuable consumer insights including lifestyle attributes, buyer intent, and consumer website visits. Explore our B2B dataset for comprehensive and up-to-date contact data on US companies and professionals to build your sales pipeline. Trust our identity data for accurate identity verification to ensure platform trust and compliance.
  • Previous
  • You're on page 1
  • Next