Showing 16 open source projects for "cyber"

View related business solutions
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    GRASSMARLIN

    GRASSMARLIN

    Provides situational awareness of Industrial Control Systems (ICS)

    GRASSMARLIN provides IP network situational awareness of industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks to support network security. Passively map, and visually display, an ICS/SCADA network topology while safely conducting device discovery, accounting, and reporting on these critical cyber-physical systems.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 2
    Java Vulnerable Lab - Pentesting Lab

    Java Vulnerable Lab - Pentesting Lab

    a deliberately vulnerable Web application

    This is Vulnerable Web Application developed for course by Cyber Security and Privacy Foundation (www.cysecurity.org) for Java programmers The full course on Hacking and Securing Web Java Programs is available in https://www.udemy.com/hacking-securing-java-web-programming/ WAR file: ---------- https://sourceforge.net/projects/javavulnerablelab/files/latest/JavaVulnerableLab.war/download Virtualbox VM file: -------------------------- http://sourceforge.net/projects/javavulnerablelab/files/v0.1/JavaVulnerableLab.ova/download Credentials for the VM: ------------------------ Username: root Password: cspf Stand-alone file: (Run the Jar file directly) -------------- http://sourceforge.net/projects/javavulnerablelab/files/v0.2/JavaVulnerableLab.jar/download
    Leader badge
    Downloads: 7 This Week
    Last Update:
    See Project
  • 3
    Cyber Knight is a game engine for developing educational software for computer science. The platform features an isometric tile engine and a code visualizer for python.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    JBernstein

    JBernstein

    JBernstein: Exploration techniques for non-linear constraint checking

    JBernstein is a tool implemented in Java that enables to check whether a polynomial constraint holds for all variables within their domain. It is mainly used in the verification or synthesis of cyber-physical systems where the system model is nonlinear. The tool also supports specifications in assume-guarantee style. The underlying algorithm is based on a translation to Bernstein polynomials, and several optimization techniques are implemented to ensure efficiency. Concerning performance, the tool enables to check all examples in the PVS Bernstein testsuite within a second, which can be an order of magnitude faster than some other tools such as QEPCAD or REDLOG. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 5
    Rosie

    Rosie

    Cyber Cafe client/server that works with DRBL

    ROSIE is a basic cyber-cafe style application that uses DRBL (https://sourceforge.net/projects/drbl/). It's used in places like community based IT centres to control user sessions on the computers. ROSIE comes in two parts. The ROSIE client is the user interface to control the sessions and it can be installed on a computer or even a USB. It will run as long as Java is installed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    MyZone Social Network

    peer to peer social network

    ...MyZone does not downgrade the resolution of your photos and all established connections are encrypted using state of the art encryption techniques. MyZone is designed to be resilient towards cyber attacks especially DDoS attacks and government imposed censorships. MyZone should be an interesting social networking platform for users who are more concerned with the privacy of their profile information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Cyber Decker
    That's a java port of the old and awesome game cyber decker by Shawn Overcash
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Maintenance and expansion of the CYBER-TA Anonymous Alert Publication System initially developed by SRI
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    LanOS Open Edition is a tool with an user interface that assists the use of the Linux Ubuntu in Lan Houses, Cyber Coffees and other establishments of public access.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 10
    The PCS Security Technology Evaluation Tool (P-STET) is a tool funded by the I3P which allows maintainers of Critical Infrastructure systems to evaluate and compare the costs and benefits of implementing cyber security technology.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    CyberRails is an Empire Builder (Mayfair crayon train game) inspired game. Players build track, pick up and deliver resources based on contracts. Features include multi-player, extensible playing boards and images and fun, fun, fun!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The Cyber Hordes is a single or multi-player RTS game where each player builds robots and gives them various components (weapons etc..) and then general orders (e.g. Attack), which the AI of the robot will attempt to complete on its own.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    'cxtable' (stands for Cyber-X-Table, but I prefer xTable when referring to it) aims at creating a peer-to-peer-ISH network to be used primarily as the "Card Table" for old-time roleplaying in a new-time world...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A tool for playing online RPG session in Cyberpunk 2nd edition.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Cyber-Billing is a Billing System for Internet Cafe. Very easy to install, use, and maintained. Cyber-Billing requires Java 1.6. (Sistem Billing Internet untuk Warung Internet)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Little Cyber Wars (LCW) is a computer program that allows one to play his favorite miniatures game on the internet, either connected live, or it’s also playable through email.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB