Showing 27 open source projects for "stealth"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
    Get started free
  • 1
    RustScan

    RustScan

    The Modern Port Scanner

    ... pipes ports into Nmap. RustScan is a modern take on the port scanner. Sleek & fast. All while providing extensive extendability to you. Not to mention RustScan uses Adaptive Learning to improve itself over time, making it the best port scanner for you. Speed is guaranteed via RustScan. However, if you want to run a slow scan due to stealth that is possible too. We have tests that check to see if RustScan is significantly slower than the previous version.
    Downloads: 19 This Week
    Last Update:
    See Project
  • 2
    CyberScraper 2077

    CyberScraper 2077

    A Powerful web scraper powered by LLM | OpenAI, Gemini & Ollama

    CyberScraper 2077 is not just another web scraping tool – it's a glimpse into the future of data extraction. Born from the neon-lit streets of a cyberpunk world, this AI-powered scraper uses OpenAI, Gemini and LocalLLM Models to slice through the web's defenses, extracting the data you need with unparalleled precision and style.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Monero

    Monero

    Secure, Private Digital Currency

    Monero is a secure, private, untraceable cryptocurrency. It is decentralized-- dependent on a distributed peer-to-peer consensus network where every transaction is cryptographically secured. With Monero you are your own bank, you control your funds and can spend safely. No one else can see your balances, track your transfers or any other transactions unless you allow them to. Monero uses ring signatures, ring confidential transactions, and stealth addresses making it absolutely private...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    PoshC2

    PoshC2

    C2 framework used to aid red teamers with post-exploitation

    ... to a Python2/Python3 payload. These enable C2 functionality on a wide range of devices and operating systems, including Windows, *nix and OSX. Shellcode containing in-build AMSI bypass and ETW patching for a high success rate and stealth. Auto-generated Apache Rewrite rules for use in a C2 proxy, protecting your C2 infrastructure and maintaining good operational security. Fully encrypted communications, protecting the confidentiality and integrity of the C2 traffic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Red Hat Enterprise Linux on Microsoft Azure Icon
    Red Hat Enterprise Linux on Microsoft Azure

    Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

    Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
    Learn More
  • 5
    Hidden miner builder

    Hidden miner builder

    Hidden miner builder

    A Monero mining tool focused on running mining processes in the background without user detection.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    AZip

    AZip

    AZip - A portable Zip Archive Manager

    AZip is a free Zip Archive Manager with unique features such as: built-in content Search, smart archive Update, archive Recompression. The goal is to keep the user interface as simple as possible and bother the user the least possible with options or useless gadgets. More details and screenshots on the AZip Web site: http://azip.sf.net Alire crate: https://alire.ada.dev/crates/azip Mirror: https://github.com/zertovitch/azip
    Leader badge
    Downloads: 26 This Week
    Last Update:
    See Project
  • 7

    GenAIPot

    GenAIPot is the first A.I honeypot that emulates services and using Generative AI to do that in order to be more stealth.

    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    CliFM

    CliFM

    The command line file manager

    A file manager for the Unix terminal. Unlike most file managers out there, based on the TUI, CliFM is entirely based on command-line. It is also ultra-lightweight, lightning fast, extensible, and written in C.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    DarkRadiant

    DarkRadiant

    Cross-Platform Level Editor for Doom3 and The Dark Mod

    Project has been moved to https://github.com/codereader/DarkRadiant! DarkRadiant is an overhauled version of GTKRadiant designed for use with The Dark Mod stealth game (https://www.thedarkmod.com), a Thief-inspired game making use of the idTech4 engine. DarkRadiant is capable of editing maps in The Dark Mod, Doom 3, Quake 4 and XreaL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 10
    A place for storage and distrubution of Tidus' Stealth Scripts
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Drive Badger

    Drive Badger

    Open source platform for covert data exfiltration operations.

    Drive Badger is a software tool for data exfiltration – which means, for copying data from the computer to external USB drive. Unlike many other tools from IT security area, it's not a Proof-of-Concept kind of tool, bringing some groundbreaking techniques. Everything, what Drive Badger does, can be as well run manually, step by step. Instead, what Drive Badger really does, is doing it all better, by putting the maximum focus on:
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Lime Miner

    Lime Miner

    A simple hidden silent XMR miner

    A simple, customizable Monero (XMR) miner with options for stealth mining.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    The Endling's Artifice

    Stealth/action shoot-em up game

    The Endling's Artifice is a tactical stealth/action game. It is a reboot of the Intruder's Thunder series. You can play the game as a stealth game, sneaking past enemy NPCs, or as a shoot-em up action game, killing everything that gets in your way. It's entirely up to you. This game features a rendering engine that uses LWJGL. The game can be played in full-screen or an 800x600 window. Custom levels can be created by using the IT4LevelEditor, and played in the game.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    mIRC XDCC Stealth script

    A XDCC script for mIRC with lots of options

    A set of scripts for mIRC that can be used to improve downloading from XDCC bots on IRC channels. The add on features bot and pack tracking, auto resume, auto network joining, and much more. Due to randomized wait times, the user can avoid overloading the bots and being booted from XDCC channels. I set this up a couple of years ago, so it may be somewhat dated, but I figured someone somewhere out there might have some use for it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Intruder's Thunder 3: Shadow Destiny

    Intruder's Thunder 3: Shadow Destiny

    2D tactical stealth/action game

    Intruder's Thunder 3: Shadow Destiny is the sequel to Intruder's Thunder 2. It features an overhauled graphics engine, a new soundtrack, new game mechanics, new levels, and a unique story. The Intruder's Thunder games have been in development since 2011, and the third installment is by far the best one yet. Download the full version today and try it out!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    PBM stealth

    Data hiding in bi-level pbm images

    Implementation of block parity for hiding data in bi-level pbm images in java. Increasing the security of stenography by using a random symmetric key for embedding and extraction of data from image. The project also has a PBM viewer in java and ascii viewer which shows the pbm images in ascii format.This project uses binary coded pbm images. Research paper : http://arxiv.org/abs/1304.1683 Key mechanism is not functional and program have bugs which are to be fixed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Privacy and Security Firefox Portable is a heavily modified version of Mozilla Firefox, 3.6.8 Portable Edition that includes many improvements made to enhance privacy, security, and anonymity above and beyond that of the default Firefox configuration
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Intruder's Thunder 2

    Stealth/Action game written in Java

    Intruder's Thunder 2 is a stealth/action game written in Java. It is the direct sequel to my first game, Intruder's Thunder. It comes with a level editor so anybody can create their own levels.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    iNetmon Portable
    iNet Portable boasts a confluence of innovative technologies coupled with many years of research undertaken in the area of network monitoring. It is aimed to take the burden of network administrators.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    intrudersthunder

    2D stealth game written in Java

    Intruder's Thunder is a 2D stealth game written in Java. It was the first game that I ever wrote. I am currently in the process of developing a sequel, which will be vastly superior to the original.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Stealth update is a time sync tool for real time unix systems which require to keep up with the accurate time. This uses Ntpdate and what makes this tool different is that it makes sure that the time is updated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Opera Browser Portable (Auto Update)
    Opera Browser Portable (with Auto Update) is full functional Portable Application created by using JPE Setup Capture tool, which overcomes the limitations of Portable Application. The main feature is that it can update itself on while on the go.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23
    GoogleChrome Portable with Manual Update
    Google Chrome Portable with Manual Update Program data is stored in "Chrome" folder and Settings are stored in "Profil" folder. To update this portable version run or double click UPDATER.EXE and choose Release-Channel to get the latest version.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    Foxit Reader Portable Auto Update
    Portable Foxit Reader with Automatic Update and Manual Update working.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Mozilla Thunderbird Portable Auto Update
    Mozilla Thunderbird Portable (with Auto Update) is full functional Portable Application created by using JPE Setup Capture tool, that overcomes the limitations of Portable Application. The main feature is that it can update itself on while on the go.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next