Showing 22 open source projects for "malware-samples"

View related business solutions
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    TraceMAC - Traceroute for MAC addresses

    TraceMAC - Traceroute for MAC addresses

    TraceMAC is a command-line Layer 2 traceroute for Cisco switches

    ...Is tested with Cisco switches: Catalyst: 2960,3560,3750,4948,6509,9200,9300,9500 (All protocols) Nexus: C9332C, 93180YC-EX (NX-OS SSH) Express 500 (HTTP) FYI: It uses Nbtscan.exe (NetBIOS) as a alternative method to discover the mac address of a host and now seems that it is considered a malware. Anyway it is just a simple network tool that can scan the network similar to NMAP or Angry IP Scanner, etc...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 2
    Two tools able to edit your ipfilter.dat . These tools are able to edit your ipfilter.dat in order to check for big ranges and to check adjacent ranges . From the creators of ipfilterX , Nexus23 Labs . - Updates in Progress -
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    boundman

    boundman

    Add rule to windows firewall to block inbound and outbound traffic

    Boundman is an advanced, user-friendly, and sleek application designed to take control over your network connections. It allows you to efficiently manage and block incoming and outgoing traffic for specific .exe files contained within a chosen folder and its subfolders. With its intuitive PyQt5 graphical interface and robust PowerShell scripts, Boundman provides seamless integration with the Windows Firewall for a powerful network management experience.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    Phex - P2P Gnutella filesharing program

    Phex - P2P Gnutella filesharing program

    A P2P filesharing client which connects to the Gnutella network.

    Phex is a P2P filesharing client which connects to the Gnutella network. It is multi-plattform and malware-free. It offers advanced functionalities and integrates all common Gnutella extensions like multi-source downloads and advanced search features
    Downloads: 23 This Week
    Last Update:
    See Project
  • Secure File Transfer for Windows with Cerberus by Redwood Icon
    Secure File Transfer for Windows with Cerberus by Redwood

    Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.

    Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
    Try for Free
  • 5
     Abdal Admin Finder

    Abdal Admin Finder

    Find website admin page

    Find website admin page for pentester
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Abdal FTP BruteForce

    Abdal FTP BruteForce

    FTP BruteForce tool For real Pentest

    Abdal FTP BruteForce tool is a powerful software with zero error rate to test the intrusion of servers that work with FTP protocol, this tool supports proxy for attacks and can transfer all your traffic in the hacking process to the proxy Slowly
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Abdal Wizard Port Scanner

    Abdal Wizard Port Scanner

    free and open-source TCP scanner

    Abdal Wizard Port Scanner is a free and open-source for TCP scanning
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Verigio - Geo Firewall

    Verigio - Geo Firewall

    Blocking and monitoring of network traffic based on geography.

    Geo Firewall performs blocking of network traffic based on geography (geo IP), allows to add custom subnets, allows exceptions on ports for incoming traffic for specific geography, keeps visual and persistent logs, shows statistics, automatically updates geographical database.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    Personal Renamer - Easy file renaming

    Personal Renamer - Easy file renaming

    Portable Bulk File Renamer, Folder monitor. All in one.

    Renames files just about any way you like. Monitor folders for files and auto rename(Have program rename images when downloaded). Undo, Save settings, Imageview,Drag-drop, and more. File Management made easy. Very good for those pesky PDFs from customer firms that need cleaning. New features on their way, Anyone need a Folder renamer?
    Downloads: 2 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 10

    switchmap

    Creates web pages that show information about Ethernet switches.

    Switchmap is a Perl program that creates HTML pages that show information about a set of Ethernet switches. It uses SNMP to gather data from the switches. Samples of Switchmap output can be found on the Project home page.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11

    Cobrax trojan

    Cobrax Trojan - 1.0

    Troyano de conexion inversa desarrollado en C++ & Visual Basic 6.0, con codigo abierto.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Network Signature Manager (N.S.M) Lite

    Network Signature Manager (N.S.M) Lite

    Manage your Snort rules with N.S.M.

    N.S.M Lite is a simple and easy way to manage your signatures for your Snort based IDS/IPS implementation, which can improve IDS/IPS signature development for accurate detection of malicious malware. Additionally, N.S.M can be used a learning tool to help you understand the complex nature of Intrusion Detection and/or Prevention (IDP) signatures for the Snort platform.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    tcpview (aka wirefox)
    Common network dump analyzer tool to extract application data and pretty show. It reassembles and shows HTTP/SMTP/POP3/IMAP etc files. Please donate if you want this to be a candy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    EyeSpy is a is a PC/Windows based internet monitoring and visualization tool. It will scan and summarize all online activity, and display a realtime, interactive map showing the geographic location of all endpoints communicating online.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A packet dissector driven by machine learning algorithms. You train it to recognize specific types of packets by showing it examples and counterexamples of some packet type, and it will figure out which bits in the packet define it as the type you seek.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Omnivora is a low-interaction honeypot for systems running Windows operating systems and is implemented using Borland Delphi. It is primarily designed to collect autonomous spreading malware.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The purpose of this application is to watch running processes while surfing suspicious sites. This will help identify new undocumented viruses, malware and or exploit that is currently in the wild.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Malware-Blocker blocks communication from your computer to any server that is known to be a malicious one. It does that by replacing your HOSTS file (deep inside Windows directory) with a blacklist of malicious servers, which are redirected to 0.0.0.0
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Remote BHO Scanner scans a windows domain for Browser Helper Objects (BHOs) which are commonly installed with malware or spyware. It displays, for each machine, the BHOs installed, and if BHO is categorized as Spyware on the Castlecops CLSID BHO list.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Minshara Java Bluetooth Stack is a Java (JSR-82 compliant) Bluetooth stack. It's based on javabluetooth and features RFCOMM and OBEX protocols, and also security. It's exhaustively documented and provides a bunch of samples -orson.rasip.fer.hr/~tsecen.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Intrusion detection / "sticky" honey pot technology using virtual servers to detect and trap worms, hackers, and other malware. ***Historical use only - Active Development stopped***
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    Air Raid Siren is multi-platform software designed to keep users safe on wireless networks when they log onto the Internet. This easy to use software protects against common attacks, like man-in-the-middle and packet sniffing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB