Showing 4 open source projects for "http attack"

View related business solutions
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
  • The Secure Workspace for Remote Work Icon
    The Secure Workspace for Remote Work

    Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.

    Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
  • 1
    Tiny Alien

    Tiny Alien

    Tiny Alien - Micro Serving on a Shoestring

    Tiny Alien is presented as a micro web server platform that can deliver dynamic websites securely. Backed by a ultra-light server sided scripting ability Tiny Alien packs a very powerful punch into the smallest of spaces. This rendition allows you to host a tor based web service that is highly resilient and easily deployed thanks to http://www.floodgap.com/httpi/ for their excellent webserver. ;) This is not for the faint of heart as you will be required to understand shell commands...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    WarNards

    WarNards is an advanced version of backgammon.

    WarNards is an advanced version of backgammon. Unlike ordinary backgammon, there are opportunities to build impenetrable castles, assault them, make a coordinated attack on the units (chips) of the enemy. The same options are available for single game (hunting, assault, defense, adventure). For full board rules see game site (warnards.ucoz.ru). There is only russian version of rules now, but it may be translated by Google. Computer version of WarNards based on PHP and has both web and text...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    SSH FTP Brute Force
    This is a script to perform a dictionary based attack through protocol FTP and SSH2. You need libssh2 to use ssh2 methods. Syntax use: perl ssh2ftpcrack.pl [ssh or ftp] [user] [host] [wordlist] http://packetstormsecurity.org/Crackers/wordlists/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    A so called "attack proxy", Snark allows a user to monitor and edit HTTP requests and responses. Snark can be configured to act as a web proxy, or in a tunnel mode which allows for proxy chaining, or use with other tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
  • Previous
  • You're on page 1
  • Next