Showing 283 open source projects for "network discovery tool"

View related business solutions
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1
    Materials Discovery: GNoME

    Materials Discovery: GNoME

    AI discovers 520000 stable inorganic crystal structures for research

    Materials Discovery (GNoME) is a large-scale research initiative by Google DeepMind focused on applying graph neural networks to accelerate the discovery of stable inorganic crystal materials. The project centers on Graph Networks for Materials Exploration (GNoME), a message-passing neural network architecture trained on density functional theory (DFT) data to predict material stability and energy formation.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    Fapro

    Fapro

    Fake Protocol Server

    Fapro is an open-source asset discovery and vulnerability scanning tool developed by Fofa Pro. It assists in identifying and managing network assets, detecting potential vulnerabilities, and enhancing overall security posture
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    BBOT

    BBOT

    The recursive internet scanner for hackers

    ...BBOT is particularly valuable for security researchers and red teamers who need to automate multi-stage discovery processes across complex infrastructures. Its architecture supports chaining multiple reconnaissance techniques together, enabling continuous discovery rather than one-off scans. The tool balances power and usability by providing sensible defaults while still exposing deep configuration options for advanced users.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    Sideband

    Sideband

    LXMF client for Android, Linux and macOS to communicate with people

    ...It emphasizes metadata resistance and secure message delivery, working effectively in offline, low-bandwidth, or disaster recovery scenarios. Built-in Rust, Sideband supports encrypted group messaging, file transfers, and network self-discovery. It is ideal for use in community networks, crisis response, and decentralized communications infrastructure.
    Downloads: 38 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    Mantis

    Mantis

    Automated framework for asset discovery and vulnerability scanning

    Mantis is an open source security framework designed to automate the workflow of asset discovery, reconnaissance, and vulnerability scanning for organizations and security teams. Mantis operates through a command line interface and accepts targets such as top level domains, IP addresses, or network ranges as input. From these inputs, it automatically discovers associated digital assets including subdomains and SSL certificates, allowing users to map the attack surface of a system. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    ToolUniverse

    ToolUniverse

    Democratizing AI scientists with ToolUniverse

    ToolUniverse is a comprehensive open-source ecosystem designed to transform any large language model into an autonomous “AI scientist” capable of performing real scientific research tasks through structured tool interaction. It standardizes how AI systems discover, select, and execute tools by introducing a unified AI-Tool Interaction Protocol that allows models to seamlessly connect with hundreds of scientific resources, including machine learning models, datasets, APIs, and analytical packages. Instead of requiring custom pipelines or fine-tuning, ToolUniverse wraps around existing models and enables them to reason, experiment, and iterate on complex workflows such as drug discovery, data analysis, and hypothesis testing. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    pytest

    pytest

    Python testing tool for writing better programs

    ...pytest features auto-discovery of test modules and functions; modular fixtures made for small or parametrized long-lived test resources; and a rich plugin architecture of more than 850 external plugins. pytest can immediately run unittest and nose tests suites as well.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 8
    X-osint

    X-osint

    Open source OSINT tool for gathering data on emails, phones, and IPs

    ...It provides investigators and researchers with a centralized interface for running information-gathering tasks that would normally require multiple separate tools. X-osint can also perform domain-related reconnaissance activities such as subdomain enumeration, DNS lookups, and host discovery to help identify infrastructure associated with a target. In addition to network and domain intelligence, it includes features for extracting metadata from files or images and analyzing text content to uncover hidden details. X-osint is written primarily in Python and is designed to run in terminal environments, particularly on Linux systems and Termux setups.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 9
    Volatility

    Volatility

    An advanced memory forensics framework

    Volatility is a widely used open-source framework for analyzing memory captures (RAM dumps) from Windows, Linux, and macOS systems. It enables investigators and malware analysts to extract process lists, network connections, DLLs, strings, artifacts, and more. Volatility supports many plugins for detecting hidden processes, malware, rootkits, and event tracing. It’s essential in digital forensics and incident response workflows.
    Downloads: 120 This Week
    Last Update:
    See Project
  • Add Two Lines of Code. Get Full APM. Icon
    Add Two Lines of Code. Get Full APM.

    AppSignal installs in minutes and auto-configures dashboards, alerts, and error tracking.

    Works out of the box for Rails, Django, Express, Phoenix, and more. Monitoring exceptions and performance in no time.
    Start Free
  • 10
    ChemCrow

    ChemCrow

    Chemcrow

    ChemCrow is an AI-powered framework designed to assist in chemical research and discovery. It integrates AI models with chemical knowledge bases to provide intelligent recommendations for synthesis planning, reaction prediction, and material discovery. This tool helps automate and accelerate research in computational chemistry and drug development.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 11
    PyRx - Virtual Screening Tool

    PyRx - Virtual Screening Tool

    Virtual Screening software for Computational Drug Discovery

    PyRx is a Virtual Screening software for Computational Drug Discovery that can be used to screen libraries of compounds against potential drug targets. PyRx enables Medicinal Chemists to run Virtual Screening from any platform and helps users in every step of this process - from data preparation to job submission and analysis of the results. While it is true that there is no magic button in the drug discovery process, PyRx includes docking wizard with easy-to-use user interface which makes it a valuable tool for Computer-Aided Drug Design. ...
    Leader badge
    Downloads: 1,785 This Week
    Last Update:
    See Project
  • 12
    Raccoon

    Raccoon

    High-performance reconnaissance and vulnerability scanning tool

    ...Raccoon can perform DNS enumeration, subdomain discovery, and URL fuzzing to uncover hidden endpoints and infrastructure components. It also integrates network scanning capabilities through tools such as Nmap to detect open ports, services, and potential vulnerabilities. By consolidating these reconnaissance tasks into a single command-line interface, Raccoon aims to streamline the early phases of security testing and provide actionable information for further investigation.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Klavis AI

    Klavis AI

    MCP integration platforms for AI agents to use tools at any scale

    ...Founded by ex-Google DeepMind and ex-Lyft engineers, Klavis provides 50+ production-ready MCP servers with enterprise OAuth support for GitHub, Slack, Gmail, Salesforce, Linear, Notion, and more. The flagship product Strata solves tool overload through progressive discovery, achieving +13% higher accuracy and 83%+ success on complex workflows. Developers can integrate via Python/TypeScript SDKs or REST API, with support for OpenAI, Claude, Gemini, LangChain, LlamaIndex, and CrewAI. Features include built-in authentication, multi-tenancy, hosted servers, Docker support, and enterprise security guardrails. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    BruteForceAI

    BruteForceAI

    Advanced LLM-powered brute-force tool combining AI intelligence

    BruteForceAI is an open-source security testing tool that applies large language models to the analysis of login forms and authentication flows in web applications. At a high level, the project uses AI to inspect HTML content, identify the relevant form elements, and automate selector discovery so that a tester does not need to hand-map every field before evaluation. It combines that analysis layer with automated credential testing workflows, framing itself as a more adaptive alternative to older brute-force tooling that depends heavily on manual configuration. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    Tribler

    Tribler

    Privacy enhanced BitTorrent client with P2P content discovery

    Tribler is a decentralized, privacy-enhanced BitTorrent client developed by researchers at Delft University of Technology. It introduces built-in anonymity using a Tor-like onion routing network and integrates its own blockchain for economic incentives and trust management. Tribler supports standard torrenting features along with distributed search, self-contained channels, and peer reputation. Its goal is to provide a fully autonomous file-sharing network without relying on external...
    Downloads: 31 This Week
    Last Update:
    See Project
  • 16
    Trafilatura

    Trafilatura

    Python & command-line tool to gather text on the Web

    Trafilatura is a Python package and command-line tool designed to gather text on the Web. It includes discovery, extraction and text-processing components. Its main applications are web crawling, downloads, scraping, and extraction of main texts, metadata and comments. It aims at staying handy and modular: no database is required, the output can be converted to various commonly used formats.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    FinalRecon

    FinalRecon

    All-in-one Python web reconnaissance tool for fast target analysis

    FinalRecon is an all-in-one web reconnaissance tool written in Python that helps security professionals gather information about a target website quickly and efficiently. It combines multiple reconnaissance techniques into a single command-line utility so users do not need to run several separate tools to collect similar data. FinalRecon focuses on providing a fast overview of a web target while maintaining accuracy in the collected results.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    discover

    discover

    Automation framework for reconnaissance and penetration testing tasks

    ...The tool is commonly used in Kali Linux environments.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    ACI.dev

    ACI.dev

    Open platform connecting AI agents to tools via unified MCP server

    ACI is an open source platform designed to enable AI agents to interact with external tools through a unified and structured interface. It focuses on simplifying tool integration by connecting hundreds of pre-built services into agentic environments, allowing developers to avoid building custom API clients and authentication flows for each service. ACI provides intent-aware tool access, meaning agents can dynamically discover and use tools based on context rather than rigid configurations....
    Downloads: 3 This Week
    Last Update:
    See Project
  • 20
    Argus

    Argus

    Python toolkit for OSINT and reconnaissance with 135+ modules

    Argus is a Python-based open source toolkit designed to simplify information gathering and reconnaissance tasks in cybersecurity. It provides an integrated command-line environment that consolidates numerous reconnaissance utilities into a single framework. The tool enables users to collect data about networks, domains, web applications, and infrastructure in an organized and efficient manner. Argus includes a modular architecture with more than 130 modules that support activities such as...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 21
    ExtractThinker

    ExtractThinker

    ExtractThinker is a Document Intelligence library for LLMs

    ExtractThinker is a tool designed to facilitate the extraction and analysis of information from various data sources, aiding in data processing and knowledge discovery.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    WhatBreach

    WhatBreach

    OSINT tool for discovering email addresses in known data breaches

    WhatBreach is an open source OSINT (Open Source Intelligence) tool designed to help users discover whether an email address has appeared in known data breaches. It simplifies the process of investigating compromised credentials by allowing users to search for a single email address or analyze multiple email addresses at once. It gathers breach information from various sources and APIs to identify where the email has been exposed in leaked databases or online paste sites. Once breaches are...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23
    aws-cli

    aws-cli

    Universal Command Line Interface for Amazon Web Services

    The AWS CLI is the universal command-line interface for managing AWS services, automating tasks, and scripting cloud workflows. It exposes nearly every public API from EC2 and S3 to IAM, Lambda, and beyond, providing parity with the service SDKs in a tool you can run anywhere. Profiles, regions, single-sign-on, and credential helpers make it straightforward to switch contexts securely across accounts and environments. Its output controls and JMESPath querying let you slice, filter, and...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 24
    Claude Scientific Skills

    Claude Scientific Skills

    A set of ready to use Agent Skills for research, science, engineering

    Claude Scientific Skills is a large open source collection of ready-to-use scientific capabilities that extend AI coding agents into full research assistants. The project provides more than 170 curated skills covering domains such as genomics, drug discovery, medical imaging, physics, and advanced data analysis. Each skill bundles documentation, examples, and tool integrations so agents can reliably execute complex multi-step scientific workflows. The framework follows the open Agent Skills standard and works with multiple AI development environments including Claude Code, Cursor, and Codex. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 25
    theHarvester

    theHarvester

    E-mails, subdomains and names

    theHarvester is a very simple to use, yet powerful and effective tool designed to be used in the early stages of a penetration test or red team engagement. Use it for open source intelligence (OSINT) gathering to help determine a company's external threat landscape on the internet. The tool gathers emails, names, subdomains, IPs and URLs using multiple public data sources.
    Downloads: 46 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB