Showing 7 open source projects for "attacks"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Fan Powered NIL Platform Icon
    Fan Powered NIL Platform

    For College athletes, sports fans, university athletic departments, brands seeking athlete partnerships, NIL collectives, sports marketing agencies

    RallyFuel is the market leading, gamified fan-powered NIL platform that lets college sports fans fuel their favorite student-athletes.
    Learn More
  • 1

    codeZ

    A program to en/decrypt texts that are only crackable using bruteforce

    codeZ is a program that can encrypt/decrypt texts that are not crackable without using brute-force attacks. It supports loads of characters, including symbols like brackets.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    AESTextCrypt

    AESTextCrypt

    Encrypt and decrypt text using AES 256 bit encryption

    AESTextCrypt is an easy-to-use open source tool for text encryption and decryption. Primarily intended for use with email, use it wherever you need to protect text from prying eyes. The encrypted text can be copy/pasted into any text-handling application (e.g. email) instead of plain text. Convenience buttons are provided for clipboard operations. AESTextCrypt uses AES-256 bit encryption which is the strongest available encryption scheme. It also employs bcrypt, which implements...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    Droid Pentest help you to find all android apps for penetration testing and hacking so you can make complete penetration test platform .
    Downloads: 31 This Week
    Last Update:
    See Project
  • 4
    HTTPBrute is used to calculate HTTP Digest Access Authentication as per RFC 2617. The tool will be able to perform brute force attacks to retrieve a lost password for a given Authentication response. MD5 is the only hashing algorithm implemented.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try the cloud dialer that managers trust and employees love to use. Icon
    Try the cloud dialer that managers trust and employees love to use.

    Revolutionize your contact center with CallTools

    Boost your agents’ productivity and enhance customer engagement like never before with CallTools’ powerful suite of call center features, including predictive dialing, call recording, and multi-touch campaigns with email and SMS capabilities. Get a complete 360-degree view of your agents’ performance and take advantage of real-time reporting. With seamless integration options, advanced queue management, and flexible IVR settings, CallTools ensures a streamlined workflow. Effortlessly manage data targeting and caller ID strategies to optimize connection rates and improve outcomes. Empower your team with a user-friendly interface designed to simplify complex tasks while delivering consistent results.
    Learn More
  • 5
    WSFuzzer
    WSFuzzer is a fuzzing penetration testing tool used against HTTP SOAP based web services. It tests numerous aspects (input validation, XML Parser, etc) of the SOAP target. It is only to be used against targets that have granted permission to be teste
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Java based webapp that utilizes TCP Wrappers to grant an IP access to a ssh server. Brute force attacks can be avoided while still allowing password based ssh access from multiple, changing IP values.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Sting is a simple, host-based approach to detecting arp cache poisoning based man in the middle attacks (such as made by ettercap) on your LAN. It uses SNMP to periodically query the arp cache of your router and make sure its entry for you is correct.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next