Showing 9 open source projects for "malware-samples"

View related business solutions
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Verigio - Geo Firewall

    Verigio - Geo Firewall

    Blocking and monitoring of network traffic based on geography.

    Geo Firewall performs blocking of network traffic based on geography (geo IP), allows to add custom subnets, allows exceptions on ports for incoming traffic for specific geography, keeps visual and persistent logs, shows statistics, automatically updates geographical database.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2

    Cobrax trojan

    Cobrax Trojan - 1.0

    Troyano de conexion inversa desarrollado en C++ & Visual Basic 6.0, con codigo abierto.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Those who have read past the "Malware" warning can be assured there is absolutely no malware in this OS or in the download. This warning comes from the "netcat" binary included in the download as a DOS time client. Unfortunately netcat has code that is flagged as malware. FREESCO, a NAT/firewall router/server based on Linux and runs on a single 1.44MB floppy. Freesco is very powerful and versatile and can connect multiple home or small office networks to most types of Internet connections including dialup.
    Downloads: 35 This Week
    Last Update:
    See Project
  • 4
    tcpview (aka wirefox)
    Common network dump analyzer tool to extract application data and pretty show. It reassembles and shows HTTP/SMTP/POP3/IMAP etc files. Please donate if you want this to be a candy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 5
    ServerArk

    ServerArk

    Linux game server UDP flood analyzer and protector

    ServerArk is a application for Linux gaming servers that samples and analyzes incoming UDP packets at the kernel level in real time to determine if any packets are part of a UDP flood attack. Flood attacks on gaming servers are typically designed to make the players on the server lag to the point where the game is not playable. It can even crash some game servers. ServerArk automatically detects when a UDP flood attack occurs and uses kernel-level iptables rules to dynamically block those packets from being processed by the game server at all. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Anoubis is a Security Suite which implements a secured environment for applications. The core of the suite is an Application Firewall alongside with a Sandbox. Mechanisms to assure the authenticity of files, directories and applications are provided.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    EyeSpy is a is a PC/Windows based internet monitoring and visualization tool. It will scan and summarize all online activity, and display a realtime, interactive map showing the geographic location of all endpoints communicating online.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A packet dissector driven by machine learning algorithms. You train it to recognize specific types of packets by showing it examples and counterexamples of some packet type, and it will figure out which bits in the packet define it as the type you seek.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Intrusion detection / "sticky" honey pot technology using virtual servers to detect and trap worms, hackers, and other malware. ***Historical use only - Active Development stopped***
    Downloads: 2 This Week
    Last Update:
    See Project
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB