Showing 14 open source projects for "hijacking"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    SSH-MITM

    SSH-MITM

    Server for security audits supporting public key authentication

    ssh man-in-the-middle (ssh-mitm) server for security audits supporting publickey authentication, session hijacking and file manipulation. SSH-MITM is a man in the middle SSH Server for security audits and malware analysis. Password and publickey authentication are supported and SSH-MITM is able to detect, if a user is able to login with publickey authentication on the remote server. This allows SSH-MITM to accept the same key as the destination server.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Genv

    Genv

    GPU environment management and cluster orchestration

    Genv is an open-source environment and cluster management system for GPUs. Genv lets you easily control, configure, monitor and enforce the GPU resources that you are using in a GPU machine or cluster. It is intended to ease up the process of GPU allocation for data scientists without code changes.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    Driver.js

    Driver.js

    A lightweight, dependency-free JavaScript library

    ...The API lets you define steps, order, and behavior, while handling positioning, scrolling, and viewport collisions gracefully. It strives to be unobtrusive: tours can be triggered contextually, resumed, or dismissed without hijacking the app. Accessibility and keyboard interaction are considered so tours remain usable beyond simple mouse clicks. Because it has no hard dependency on a specific framework, it integrates into vanilla JS apps or modern stacks alike.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    ASN

    ASN

    Command line ASN lookup, network recon, and traceroute tool

    asn is a multifunctional network investigation and OSINT command line tool designed for analyzing Autonomous System (ASN) and IP-related data. It provides a comprehensive set of capabilities for inspecting network infrastructure, routing information, and security signals associated with IP addresses, hostnames, prefixes, and organizations. It aggregates data from multiple external services to present detailed information such as BGP statistics, RPKI validation status, IP reputation,...
    Downloads: 9 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    Piral

    Piral

    Framework for next generation web apps using micro frontends

    ...It allows you to build web apps that follow the micro frontends architecture in basically no time. Piral lets you use your standard tooling to be as efficient as possible. Perfect for distributed systems running in the cloud. No proprietary software hijacking the security of your app. Every feature plays well with custom and standard tooling. The base layer gives you high convenience without sacrificing. Performance is considered important and valued as a feature. You can build fully dynamic and scalable applications in no time. Like what you see and want to take it to the next level? ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Adaptive Intelligence

    Adaptive Intelligence

    Adaptive Intelligence also known as "Artificial General Intelligence"

    Adaptive Intelligence is the implementation of neural science, forensic psychology , behavioral science with machine-learning and artificial intelligence to provide advanced automated software platforms with the ability to adjust and thrive in dynamic environments by combining cognitive flexibility, emotional regulation, resilience, and practical problem-solving skills.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    miniPHP

    miniPHP

    A small, simple PHP MVC framework skeleton that encapsulates a lot of

    miniPHP A small, simple PHP MVC framework skeleton that encapsulates a lot of features surrounded with powerful security layers. miniPHP is a very simple application, useful for small projects, helps to understand the PHP MVC skeleton, know how to authenticate and authorize, encrypt data and apply security concepts, sanitization and validation, make Ajax calls and more. It's not a full framework, nor a very basic one but it's not complicated. You can easily install, understand, and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    DNSChain

    DNSChain

    A blockchain-based DNS + HTTP server that fixes HTTPS security

    DNSChain by okTurtles is an experimental protocol and implementation combining DNS and PKI on blockchain for secure, censorship-resistant name resolution and certificate issuance. It aims to prevent MITM attacks and domain seizures by anchoring DNS records in blockchains, integrating DPKI, RESTful APIs, and interoperability with Namecoin and Onename.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    ...By invincible, I mean to browser hijacking, but not to internet settings changes, as those apply to any web browser on the system. Note: I am currently working on v3, however since it's being rewritten in C# and receiving some major changes, it may be a while before it's out.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 10
    Hijakker is the Ubuntu Linux based distro that enables someone to boot up a Windows environment on any PC, hijacking it! It can be used for browsing without leaving a trace, portable apps and troubleshooting.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Hyenae
    Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant. *** Hyenae is back *** Hyenae will be continued here: https://sourceforge.net/p/hyenae-ng
    Leader badge
    Downloads: 65 This Week
    Last Update:
    See Project
  • 12
    An open source driving game focusing on large outdoor environments and semi realistic physics, upgradable cars that change in handling and speed, creating a slight RPG element. Hijacking cars is easy and encouraged, but not by the law enforcement.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    TypoHulk is a powerful typosquatter written in Python that generates a list of most common mistakes made by Internet users when entering website address and finds which domains are online. (known as Typosquatting or URL hijacking)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A Java Hijacking tool for web application session security assessment. A simple Java Fuzzer that can mainly be used for numeric session hijacking and parameter enumeration. Demonstration video is also available.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB