Showing 63 open source projects for "ddos-attack"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1
    Proxyee

    Proxyee

    HTTP proxy server,support HTTPS & websocket

    Proxyee is a JAVA-written HTTP proxy server library that supports HTTP, HTTPS, and WebSocket protocols, and supports MITM (Man-in-the-middle), which can capture and tamper with HTTP, and HTTPS packets. The CA certificate (src/resources/ca.crt) from the project needs to be imported to a trusted root certificate authority. The CA certificate (src/resources/ca.crt) from the project needs to be imported to a trusted root certificate authority. You can use the CertDownIntercept interceptor to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    ZAP

    ZAP

    The OWASP ZAP core project

    The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by a dedicated international team of volunteers. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. It's also a great tool for experienced pentesters to use for manual security testing.
    Downloads: 104 This Week
    Last Update:
    See Project
  • 3
    pj-net-tools

    pj-net-tools

    Pure Java Network Tools

    Pure Java Network Tools. Free portable cross-platform. Include: 01) ICMP-ping, 02) ICMP-traceroute, 03) DNS-check resolver, 04) Parallel Host TCP-scanner, 05) IP-calculator, 06) Syslog-server, 07) Telnet-client, 08) Local ARP-cache request, 09) Parallel Network Ping-Scanner, 10) Snmp-Get concrete value utility. 11) Parallel ICMP flood utility. 12) Parallel UDP flood utility. 13) TFTP-server. 14) NTP-server. 15) Host TCP-ping. 16) SNMP-MRTG traffic...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 4
    TravBot | Free Travian Bot

    TravBot | Free Travian Bot

    A simple free travian bot

    ...Supports proxies. The bot also has a builder that allows you to create unlimited build queues to upgrade your villages and build new buildings. There are more features like attack warnings and troop training. Offical site: https://travbot.eu/ Join the discord channel for more information and support! - - https://discord.gg/SVaZx3A - -
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    Novel Insight Inner Circle

    Novel Insight Inner Circle

    Graphical message and file encryption tool

    ...IMPORTANT: The software requires new OpenJDK 16 (Not Oracle's J2RE 1.8) to run. Install, for example, AdoptOpenJDK for Windows. NOTE: By using encryption twice the implementation is (in theory) vulnerable to Meet-In-The-Middle attack reducing key size to 256bit but the attack still requires 2^256 bytes of memory making it impossible in practice.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Bat Attack

    Bat Attack

    Bat Attack is a cool classical 8bit game to save wife from the Bats

    Bat Attack is a cool classical 8bit game with bats instead and a lot of comic blood and gore and comical media with a funny story mode. The story starts when the main character 'Dave' is driving on his honeymoon with his wife Betty when an Evil bat swoops down and take his dearly beloved off. You have to get Betty back by using the guns available to your disposable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Our idea is to deploy a society of computational agents that collaborate in order to achieve the shared goal of decrypting a chunk of ciphertext or recovering a password from an hash by means of a dictionary-based attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    NitsLoch is an RPG inspired by several old computer games. You can collect weapons and items and attack enemies in different cities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Owasp Zap Live CD

    Owasp Zap Live CD

    A live CD, live DVD, or live disc is a complete bootable computer installation including operating system which runs in a computer's memory.This live CD contains the Owasp Zap vulnerability test solution, the OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Powerful App Monitoring Without Surprise Bills Icon
    Powerful App Monitoring Without Surprise Bills

    AppSignal starts at $23/month with all features included. No overages, no hidden fees. 30-day free trial.

    Tired of monitoring tools that punish you for scaling? AppSignal offers transparent, predictable pricing with every feature unlocked on every plan. Track errors, monitor performance, detect anomalies, and manage logs across Ruby, Python, Node.js, and more. Trusted by developers since 2012 with free dev-to-dev support. No credit card required to start your 30-day trial.
    Try AppSignal Free
  • 10
    Online Zombie Game

    Online Zombie Game

    Online Zombie Game is a medieval-zombie apocalypse rpg game.

    Online Zombie Game. Control your character through medieval zombie apocalypse! * You have 4 attributes (Health,Attack,Defence,Critical Rate) * Train your character to get stronger. * Hunt in 11 different areas to get experience,golds,diamonds. * 50+ zombie types with different attributes. * Flexible choice of hunting time. (From 1 minute to 8 hours!) * Challange other players in the Arena , get weekly rewards. * Buy weapons/armors to prepare for fight
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    OWASP Zed Attack Proxy

    OWASP Zed Attack Proxy

    Find web application vulnerabilities the easy way!

    The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. Note that this project is no longer used for hosting the ZAP downloads. You should download ZAP via https://github.com/zaproxy/zaproxy/wiki/Downloads Please see the homepage for more information about OWASP ZAP
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Revenssis Ethical Hacking Suite

    Revenssis Ethical Hacking Suite

    Fully featured network, wireless and web app pentesting suite.

    Nicknamed as the "Smartphone Version of Backtrack", Revenssis Penetration Suite is a set of all the useful types of tools used in Computer and Web Application security. Tools available in it include: Web App scanners, Encode/Decode & Hashing tools, Vulnerability Research Lab, Forensics Lab, plus the must-have utilities (Shell, SSH, DNS/WHOIS Lookup, Traceroute, Port Scanner, Spam DB Lookup, Netstat... etc). All these fitting in an application approx. 10MB (post installation).
    Downloads: 13 This Week
    Last Update:
    See Project
  • 13

    Old School Tool

    Old School gaming tool for GMs of AD&D/OSRIC.

    A java based tool that takes load off the AD&D or OSRIC GM by being able to quickly load creatures encountered and manage the combat quickly without having to reference attack matrix, hd calculations or other charts and tables. With the press of a few buttons a GM can create an encounter and then cycle through the rounds of combat easily finding the AC the creature hit, damage done and other basic information. Does NOT require a network connection to work and should run on just about any operating system or hardware. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    AESTextCrypt

    AESTextCrypt

    Encrypt and decrypt text using AES 256 bit encryption

    ...It also employs bcrypt, which implements key-stretching and an adaptive key setup phase, the complexity (number of rounds) of which is automatically set to match the processing power of the encrypting computer. This makes it highly resistant to dictionary attack. AESTextCrypt is written in Java, so can be run on all desktop platforms - Windows, Mac and Linux.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 15
    Java-based Open Source WAF (Web Application Firewall) to include inside a web application in order to protect it against attacks like Cross-Site Request Forgery (CSRF), Parameter Manipulation and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Penguin Attack is a puzzle game in the style of Tetris Attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Pulsar Game

    Pulsar Game

    Pulsar is a card video game using Stars as gameplay key elements.

    Pulsar is a card video game. A card represents a star constellation, and thus contains stars that can be used in two ways : * Attack Stars (also called AMAS Stars) will generate an attack to flip opponents cards (and take them) ; * Defense Stars will protect the card from opponents. It is also the interface with other cards to begin a battle. The inner gameplay is much more complex as Cards and Stars can evolve, be damaged. AMAS Stars are "AutoMated Attack System" Stars. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Power Surge (LD27)

    Game made for the Ludum Dare 27 game competition

    Power Surge is a 2D platformer game created by Bytefire Game for the Ludum Dare 27 game competition, under the theme of '10 seconds.' In the game, you are in charge of a moon base that creates robots, rovers, and weapons. You must use these creations to attack and steal power from an adjacent moon base. The challenge is in that each robot only has ten seconds of power, so you must make the most of each robot.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    NeSSi2

    NeSSi2

    Network security simulator

    At the moment NeSSi² is not actively maintained anymore since we are planning a successor project. NeSSi² is a network simulation tool suite addressing in particular network security aspects. Sample capabilities are profile-based attack generation, traffic analysis and support for attack/malware detection algorithm plugins.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20

    MyZone Social Network

    peer to peer social network

    ...MyZone does not downgrade the resolution of your photos and all established connections are encrypted using state of the art encryption techniques. MyZone is designed to be resilient towards cyber attacks especially DDoS attacks and government imposed censorships. MyZone should be an interesting social networking platform for users who are more concerned with the privacy of their profile information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    DOSTool

    DOS Attack Tool

    A simple DOS attack tool based on the public resources response time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    DroidVulMon

    DroidVulMon

    This project is to monitor vulnerability of Android based smartphone

    This project is to monitor vulnerability of Android based smartphone by collecting user's events activated inside of mobile smart work devices. We want to develop an Android Vulnerability Monitoring system (DroidVulMon) by collecting and aggregate diverse events activated from user's mobile device for detecting malicious attacks such as mobile exploits. We provide open source S/W with overall common modules such as collecting events and detecting malicious events.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    OpenSE(Open Secure Encoder)

    OpenSE(Open Secure Encoder)

    OpenSE - Secure your online transactions today!!

    ...For instance, you can log to your email account by filling the username and password. But, is it safety? Your email account can be stolen by the hackers. Your computer's may suffer from the virus, trojan, key logger, rootkit or phishing attack, and all of your email contents are exposed. For which applications support the Secure Encoder, you are required to input the pin number which generates from your own Secure Encoder. Thus, you can avoid the lost. It's because your account is still protected even your username and password are stolen by the hacker. Enhancing the security level and protecting your account today!!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Serangga Warcraft

    Serangga Warcraft

    Mini Warcraft game using Greenfoot

    This game using any Artificial Intelligence. Use same Player Object but can know this is hero or enemies. The player will attack if it has different type. Every character in this game has different strength and skill. This game is created by Ahmad Sidrap <ahmadsidrap@gmail.com>;.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Open Rocket Toolkit

    Simulation of historical and contemporary launch vehicles

    ORT is a tool for modelling and flying launch vehicles of arbitrary size and complexity. Unlike OpenRocket, it does not focus on amateur rockets but on real-world launch vehicles. The bundle includes a graphical design tool with an integrated simulation engine for rocket launches. Also included in the bundle is a playback application and a headless driver for logging simulations into spreadsheets. ORT integrates JME3 for 3D rendering.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next
MongoDB Logo MongoDB