Search Results for "ddos attack java" - Page 4

Showing 93 open source projects for "ddos attack java"

View related business solutions
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 1
    Vobali is a program to record, evaluate and analyse actions of a volleyball match. The actions evaluated are the usual ones: Reception, Set, Attack, Service, Block and Dig. The evaluation itself is between 1 and n_max and is recorded per set and position.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    A desktop D20 dice roller written in Java. Simple polyhedral rolls are supported as well as composite rolls (eg. Roll attack, damage and special damage all at once reporting on the three rolls).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    This project is a pure Java implementation of an MMORPG / mud, server and client. It is a fully persistent world, backed by a MySQL datastore. Features NPC AI, shard-level scalability, and persistent items, and a particle attack system.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    This is a strategy planner aimed mainly at the hardcore first person shooter fans. Similar to a white board application it allows many users to connect to a central server and the users are able to draw and place actions on the board for everyone to see
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    Java Implementation of a remote GUI for Waldorf's Rack Attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A threaded java MUD server with persistence in MySQL using sprocs. Uses command pattern and reflection for command parsing. NIO for networking. Excellent code comments. Map command uses visited rooms. Plans for configurable attack profiles per enemy.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Mock in the Middle is a Java Proxy designed for testing network applications. It serves as a mock proxy between a client and a server. By recording and replaying network conversations, the client can later be tested without a live server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    JBoats is a boat racing game. It features time attack mode, 1 player versus CPU, split screen multiplayer. Java 1.5 is required.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Sting is a simple, host-based approach to detecting arp cache poisoning based man in the middle attacks (such as made by ettercap) on your LAN. It uses SNMP to periodically query the arp cache of your router and make sure its entry for you is correct.
    Downloads: 0 This Week
    Last Update:
    See Project
  • eProcurement Software Icon
    eProcurement Software

    Enterprises and companies seeking a solution to manage all their procurement operations and processes

    eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
    Learn More
  • 10
    Spellcast is a game of wizards that fight in a tournament to the death. Each wizard must master spell casting to overcome their enemies and defend themselves from attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    The Cyber Hordes is a single or multi-player RTS game where each player builds robots and gives them various components (weapons etc..) and then general orders (e.g. Attack), which the AI of the robot will attempt to complete on its own.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    ADAM is the Active Defense Algorithm and Model. It is a formally defined process of determining appropriate active response actions in the event of an attack. This implementation shows that active defense can be a legitimate and responsible security tool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    GPP is a General Purpose Proxy Java graphical application intended mainly for packet inspection and modification. It's main idea is to be a little user-friendly portable man-in-the-middle tool for security analysis. Later, some protocols should be added
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    TLogin is a java login applet for tomcat that uses a database to track login attempts and the source of those attempts. Tlogin provides features for preventing web based password guessing attack by placing temporary locks on the account after every fail
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A Tetris Attack Clone. *Not* classic tetris. Online multiplayer and limited IRC-style chat and game control. Available as both a Java applet and Java application. Registered on www.jars.com.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Travail de maturité: DDOS
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    Java-tradewars Attack Terminal - A helper for the popular text game TradeWars 2002 written in Java. This program can be used as an applet on a board website or as a stand alone program.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18

    Avatar the mmorpg

    Avatar - The Last Airbender You are an element bender

    Avatar - The Last Airbender You are an element bender, you are one of the 4 factions in the world, Earth Air Fire Water, protect your homeland, learn all you can, and maybe you can become an Avatar and rule all 4 elements.
    Downloads: 0 This Week
    Last Update:
    See Project