Showing 1202 open source projects for "use"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Free CRM Software With Something for Everyone Icon
    Free CRM Software With Something for Everyone

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    Think CRM software is just about contact management? Think again. HubSpot CRM has free tools for everyone on your team, and it’s 100% free. Here’s how our free CRM solution makes your job easier.
    Get free CRM
  • 1
    SSH MITM

    SSH MITM

    SSH man-in-the-middle tool

    This penetration testing tool allows an auditor to intercept SSH connections. A patch applied to the OpenSSH v7.5p1 source code causes it to act as a proxy between the victim and their intended SSH server; all plaintext passwords and sessions are logged to disk. Of course, the victim's SSH client will complain that the server's key has changed. But because 99.99999% of the time this is caused by a legitimate action (OS re-install, configuration change, etc), many/most users will disregard...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Web Security Dojo

    Web Security Dojo

    Virtual training environment to learn web app ethical hacking.

    Web Security Dojo is a virtual machine that provides the tools, targets, and documentation to learn and practice web application security testing. A preconfigured, stand-alone training environment ideal for classroom and conferences. No Internet required to use. Ideal for those interested in getting hands-on practice for ethical hacking, penetration testing, bug bounties, and capture the flag (CTF). A single OVA file will import into VirtualBox and VMware. There is also an Ansible script...
    Leader badge
    Downloads: 146 This Week
    Last Update:
    See Project
  • 3

    SDRLive

    Linux live CD configured for SDR

    SDRLive (formerly LinuxSDR) is a linux live cd based on Ubuntu 18.04, and configured for use with software defined radios. A large selection of software has been preinstalled, such as GNURadio, dump1090, GQRX, cubic-sdr, etc. View the changelog on the wiki for a list of installed applications.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 4

    Password Generator

    Password Generator

    Password Generator: Enter Keyword,Generates Password! (To Recover Use Keyword) For Devlopers Use Python Project
    Downloads: 0 This Week
    Last Update:
    See Project
  • Save hundreds of developer hours with components built for SaaS applications. Icon
    Save hundreds of developer hours with components built for SaaS applications.

    The #1 Embedded Analytics Solution for SaaS Teams.

    Whether you want full self-service analytics or simpler multi-tenant security, Qrvey’s embeddable components and scalable data management remove the guess work.
    Try Developer Playground
  • 5
    Snare Lite (SIEM & Logging Software)

    Snare Lite (SIEM & Logging Software)

    Snare Enterprise: bit.ly/Snare-Trial

    ... architecture regardless of third party developers. In fact, the agnostic nature allows it to bridge gaps between multiple SIEM implementations across business units. For more on use cases, check out the Intersect Alliance website. https://www.snaresolutions.com/ Snare Enterprise’s premium features include: - Regulatory Compliance - TLS Encryption - Log Simulcasting - TCP – Guaranteed Log Delivery - USB Device Monitoring - And more! For updates follow us on social media!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Simple Cipher Algorithm

    Simple Cipher Algorithm

    Java Encryption Utility.

    Very simple to use symmetric Java encryption utility. Please write a review. Email me with any questions or problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Kamus

    Kamus

    An open source, git-ops, zero-trust secret encryption and decryption

    An open source, GitOps, zero-trust secrets encryption and decryption solution for Kubernetes applications. Kamus enables users to easily encrypt secrets that can be decrypted only by the application running on Kubernetes. The encryption is done using strong encryption providers (currently supported: Azure KeyVault, Google Cloud KMS, Amazon Web Services KMS, and AES).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    ZIPcrypt

    ZIPcrypt

    Simple Encryption / Decryption Utility

    ZIPcrypt is a simple encryption and compression software that uses patented XOTIC 512-bit+, or AES 256-bit encryption. Delivering the best encryption technology on the market today, ZIPcrypt was also designed to be fast, easy to use, and to work in parallel with the SCIFCOM Encryption as a Service website.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Modlishka

    Modlishka

    Powerful and flexible HTTP reverse proxy

    Modlishka is a powerful and flexible HTTP reverse proxy. It implements an entirely new and interesting approach of handling browser-based HTTP traffic flow, which allows to transparently proxy of multi-domain destination traffic, both TLS and non-TLS, over a single domain, without the requirement of installing any additional certificate on the client. What exactly does this mean? In short, it simply has a lot of potential, that can be used in many use case scenarios. Modlishka was written...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 10
    BLESS

    BLESS

    An SSH Certificate Authority that runs as an AWS Lambda function

    BLESS is an SSH Certificate Authority that runs as an AWS Lambda function and is used to sign SSH public keys. SSH Certificates are an excellent way to authorize users to access a particular SSH host, as they can be restricted for a single-use case, and can be short-lived. Instead of managing the authorized_keys of a host, or controlling who has access to SSH Private Keys, hosts just need to be configured to trust an SSH CA. BLESS should be run as an AWS Lambda in an isolated AWS account...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    AQUATONE

    AQUATONE

    A tool for domain flyovers

    Aquatone is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based attack surface. Aquatone is designed to be as easy to use as possible and to integrate with your existing toolset with no or minimal glue. Aquatone is started by piping output of a command into the tool. It doesn't really care how the piped data looks as URLs, domains, and IP addresses will be extracted with regular expression pattern matching...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    PivotSuite

    PivotSuite

    Network Pivoting Toolkit

    PivotSuite is a portable, platform-independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to move around inside a network. It is a Standalone Utility, Which can use as a Server or as a Client. If the compromised host is directly accessible (Forward Connection) from Our pentest machine, Then we can run pivotsuite as a server on the compromised machine and access the different subnet hosts from our pentest machine, Which...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    SSL Signature Check (SSLSigcheck) is an email filter designed to be run from within procmail. It will examine the signature and certificate of a signed email, and add header information that procmail recipes can use to filter the message.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    JavaScript CSRF Protection Bundle

    JavaScript CSRF Protection Bundle

    Automatic CSRF protection for JavaScript apps using a Symfony API

    Archived! Now that all modern browsers implement SameSite cookies and the Origin HTTP header, this bundle is - in most cases - not necessary anymore. Learn how to protect your Symfony APIs from CSRF attacks. If you need to maintain old applications, take a look to DneustadtCsrfCookieBundle. This API Platform and Symfony bundle provides automatic Cross Site Request Forgery (CSRF or XSRF) protection for client-side applications. Despite the name, it works with any client-side technology...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Zharudar

    Zharudar

    Bangladeshi pc cleaning software

    'Zharudar 1.9'- it is a software containing the facilities: system optimization, temporary file cleaning and exclusive utility tools. It's easy to use. And it's the first software in Bangladesh which enables the services mentioned above. It's popularity is growing very rapidly in Bangladesh. It's the 9th version of Zharudar software that I'm talking about. I hope people all over the world will enjoy using this software.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    WiFi Password Recovery

    WiFi Password Recovery

    A free utility to recover the passwords of wireless networks

    ... which use the following security types: WEP, WPA, WPA-PSK, WPA2, WPA2-PSK.* GitHub Repository: https://github.com/EvolSoft/WiFi-Password-Recovery *Note: On Windows XP the passwords of WiFi networks using WPA security will be shown as 64 HEX digits. You can use these characters as password to connect to the wireless network anyway.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 17

    Metasploitable

    Metasploitable is an intentionally vulnerable Linux virtual machine

    This is Metasploitable2 (Linux) Metasploitable is an intentionally vulnerable Linux virtual machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques. The default login and password is msfadmin:msfadmin. Never expose this VM to an untrusted network (use NAT or Host-only mode if you have any questions what that means). To contact the developers, please send email to msfdev@metasploit.com
    Leader badge
    Downloads: 14,572 This Week
    Last Update:
    See Project
  • 18
    WaGis-Mass-IP-Blacklist-Windows-Firewall

    WaGis-Mass-IP-Blacklist-Windows-Firewall

    This Tool blocks a Mass of IP's via the Windows Firewall - IP Blocker

    This is a easy to use Mass-IP-Blocker/Blacklister Tool. Much more efficient than a Batch-Script. You can automatically block IP Addresses from a Online-IP-List, or just paste in your own IP's you want to block.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 19

    KeePass Custom Icon Dashboarder

    KeePass Plugin to download and manage custom icons

    Provides some statistics and management features for custom icons in KeePass. THIS PROJECT HAS MOVED TO https://github.com/incognito1234/Keepass-Custom-Icon-Dashboarder High definition of custom icon can be uploaded. URLs of associated entries are used to retrived the highest definition of icons. For each custom icon, the following information is available: - Number and list of entries that use it - Number and list of groups that use it Mass update features...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    SSHTOOLS

    SSHTOOLS

    Java SSH API

    ... it, however, these are now considered deprecated and we do not recommend their use in anyway.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 21
    CTS Surveyor

    CTS Surveyor

    Foot traffic and facial analytics for your business and home

    Surveyor is a software solution that monitors its environment via camera and gathers demographic information about the public in the surrounding area, providing important statistics such as number of people passing by as well as providing facial analytics to classify the pedestrians based on their age and gender. The statistical data is stored in a local database and is made available via RESTful API’s, and easy integration with other applications can be accomplished via a WebSocket...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    sls

    SLS Team Java Library

    Java library with Cryptographic algorithms. Easy to use Crypto algorithms. Works on Windows, Linux, Android. No external lib dependencies, no useless abstractions, no 'crypto provider'. Elliptic curves was borrowed from BouncyCastle and simplified a lot. Most of EC classes are custom algorithms for certain curves. Can be easily deleted if u dont need them. With couple of classes u can parse and construct those ugly ASN.1 structures, look at RSA and EC key formats for example. No bad...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    goim

    goim

    goim is a im server writen by golang

    ... of the config. Install comet/logic/job modules and use Supervisor management (You might need to change the configuration files based on your servers).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    ParamIT

    a Toolset for Molecular Mechanical Force Field Parameterization

    ParamIT is a toolkit aiding the development of molecular mechanical force field parameterization of small, drag like, molecules within CHARMM general force field (CGenFF) protocol. The developed toolkit helps the researchers in following ways: 1) automating the creation of multiple input files for quantum and molecular mechanics programs, 2) automating the output analysis and 3) substitute the use of full MM programs with a faster specialized one. The developed tools include: 1) generator...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Secret File

    Secret File

    File Encryption/Decryption using password

    Secret File is a free and easy to use encryption/decryption app that can encrypt nearly any kind of file format using passwords. Files can be stored as personal or sent over the internet as confidential as the data of files are securely encrypted at the binary level itself and can be decrypted at any time and anywhere. You can also use multi-level protection for more secureness.
    Downloads: 1 This Week
    Last Update:
    See Project