Showing 768 open source projects for "openai-python"

View related business solutions
  • Go from Data Warehouse to Data and AI platform with BigQuery Icon
    Go from Data Warehouse to Data and AI platform with BigQuery

    Build, train, and run ML models with simple SQL. Automate data prep, analysis, and predictions with built-in AI assistance from Gemini.

    BigQuery is more than a data warehouse—it's an autonomous data-to-AI platform. Use familiar SQL to train ML models, run time-series forecasts, and generate AI-powered insights with native Gemini integration. Built-in agents handle data engineering and data science workflows automatically. Get $300 in free credit, query 1 TB, and store 10 GB free monthly.
    Try BigQuery Free
  • 99.99% Uptime for MySQL and PostgreSQL on Google Cloud Icon
    99.99% Uptime for MySQL and PostgreSQL on Google Cloud

    Enterprise Plus edition delivers sub-second maintenance downtime and 2x read/write performance. Built for critical apps.

    Cloud SQL Enterprise Plus gives you a 99.99% availability SLA with near-zero downtime maintenance—typically under 10 seconds. Get 2x better read/write performance, intelligent data caching, and 35 days of point-in-time recovery. Supports MySQL, PostgreSQL, and SQL Server with built-in vector search for gen AI apps. New customers get $300 in free credit.
    Try Cloud SQL Free
  • 1
    IP Proxy Scraper - Linux

    IP Proxy Scraper - Linux

    Extracts multiple proxies from a list of websites

    Lightweigh and easy to use tool to extract multiple proxies from a list of websites. IP Proxy Scraper is also available for windows, check it out here: https://sourceforge.net/projects/ipproxyscraper/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    SauceWalk Proxy Helper

    Enumeration and automation of file discovery for your sec tools.

    SauceWalk is a freeware(.exe)/Open Source(.py) tool for aiding in the enumeration of web application structure. It consists of 2 parts a local executable (walk.exe) and a remote agent. Walk.exe iterates through the local files and folders of your target web application (for example a local copy of Wordpress) and generates requests via your favourite proxy (for example burp suite) against a given target url. The remote agent can be used to identify target files and folders on a live...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    This is a community effort to study and improve security of WPA protected WiFi networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Zero Wine Tryouts

    Zero Wine Tryouts

    An open source malware analysis tool

    Zero Wine Tryouts is an open source malware analysis tool. Just upload your suspicious file (e.g. Windows executable file, PDF file) through the web interface and let it analyze. For more information, please visit project website: http://zerowine-tryout.sourceforge.net/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build AI Apps with Gemini 3 on Vertex AI Icon
    Build AI Apps with Gemini 3 on Vertex AI

    Access Google’s most capable multimodal models. Train, test, and deploy AI with 200+ foundation models on one platform.

    Vertex AI gives developers access to Gemini 3—Google’s most advanced reasoning and coding model—plus 200+ foundation models including Claude, Llama, and Gemma. Build generative AI apps with Vertex AI Studio, customize with fine-tuning, and deploy to production with enterprise-grade MLOps. New customers get $300 in free credits.
    Try Vertex AI Free
  • 5
    HackShark Linux

    HackShark Linux

    Lightweight Linux distro for penetration testing

    Based on MATE environment HackShark Linux is a lightweight distribution for penetration testing, cyber forensic investigation and vulnerability assessment purpose.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 6

    PyLoris

    A protocol agnostic application layer denial of service attack.

    PyLoris is a scriptable tool for testing a server's vulnerability to connection exhaustion denial of service (DoS) attacks. PyLoris can utilize SOCKS proxies and SSL connections, and can target protocols such as HTTP, FTP, SMTP, IMAP, and Telnet.
    Leader badge
    Downloads: 63 This Week
    Last Update:
    See Project
  • 7
    Tyrant SQL

    Tyrant SQL

    Tyrant SQL is a Havij based cross-platform. It's Sqlmap's gui version.

    It's a poweful Sql Injection Tool. It's a GUI version of SqlMap, saving time and getting better results. Was designed basing on Havij.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Python sniffer that identifies interactive SSH sessions. It detects when an intruder uses SSH with: a wrong password, a good one or with a password cracking program. It uses two techniques: SSH client's banner identification and SSH session total by
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Net Send

    Net Send

    Net Send is an Encryped Communications Program

    Written in Python, Net Send features a current two way chat dialogue that features a customizable encryption system. Users can change what their output is encrypted as before communicating. This eliminates issues with having to develop sophisticated encryptions tha risk being cracked.
    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit for Your Google Cloud Projects Icon
    $300 in Free Credit for Your Google Cloud Projects

    Build, test, and explore on Google Cloud with $300 in free credit. No hidden charges. No surprise bills.

    Launch your next project with $300 in free Google Cloud credit—no hidden charges. Test, build, and deploy without risk. Use your credit across the Google Cloud platform to find what works best for your needs. After your credits are used, continue building with free monthly usage products. Only pay when you're ready to scale. Sign up in minutes and start exploring.
    Start Free Trial
  • 10

    NetStress-NG

    NetStress is a DDoS and network stress testing tool.

    Syn Flood Attacks SYNFlood with static source port SYNFlood with random source port SYNFlood with static source ip address SYNFlood with random source address SynFlood with fragmented packets ACK Flood Attacks ACK Flood with static source port ACK Flood with random source port ACK Flood with static source ip address ACK Flood with random source address ACK Flood with fragmented packets FIN Flood Attacks FIN Flood with static source port FIN Flood with random source...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SIPve

    SIPve

    Videovigilancia, Control de Acceso y Carnetización

    Sistema Integrado de Protección Venezolano con capacidades de Videovigilancia, Control de Acceso y Carnetización para el resguardo físico de instalaciones.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12

    WinCHMod

    A windows batch file attributes editor in pure Python

    This project is still in development and will be updated as it progesses
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Enigmatic CGI pastebin
    Simple CGI script which allows you to transfer sensitive ascii data (passwords, hashes, pem keys) via HTTPS. SSL MUST BE implemented by webserver. Algorithm: - Paste new data into textarea, submit. You get link Link consists of three md5 hashes from salt. File, containing your data, named that way. So, it is hard to bruteforce links/files. - Whenever link being opened, script reads file and prints its content into brower in text/plain content-type. Afterthat, script removes file. So...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    RSAT

    RSAT

    A script to perform SAT attacks on RSA

    SAT solvers are being used more and more in partial key exposure attacks. The scope of this script is to show that SAT solvers can be used in partial key exposure attacks of RSA with very good results.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    Falcon Attacker

    Interesting multithreaded, customizable, simple denial of service tool

    Falcon Atttacker DoS Tool. Features: Choosable DNS/IP, PORT, Page, Server Timeout, Threads, Time Between Headers. POST attacks, GET attacks, TCP flood, ICMP flood, modem hangup ping exploit flood, DNS-to-IP option for less bandwidth, speeds, other stuff, Multithreaded, Simple question/answer style attack control, comprehensive attack options. BTC: 1LGJhVQeJZ1RQXjkm3VWdJxE4Gz88tk2Y2
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Helge's Switchblade v0.9

    Helge's Switchblade v0.9

    A Portable Troubleshooting Toolkit

    Helge's Switchblade is a portable troubleshooting toolkit that can be put on an USB stick and used to aid IT professionals in supporting and maintaining a user's PC This application contains various portable and installable tools, Driver Backup & Restore function and other various custom made tools including: * A Windows log grabber * RAM- and IP- information display * Several Useful Ipconfig commands. * Driver Backup and Restore(By Giuseppe Greco) And a few useful links(nvidia/radeon graphic drivers, python documentation, microsoft technet etc And the feature i like the most is a handy chat system that lets you speak directly to Tech Support Personel
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Py Forensic

    Análisis forénsico, entorno unificado y extracción de datos

    Plataforma de recolección de información que se desarrolla mediante la programación de pequeños módulos independientes. Dichos scripts llevan a cabo las tareas forénsicas que habitualmente reservamos a otras aplicaciones. La instalación en Windows es muy sencilla (ver instrucciones en la descarga). En otras plataformas (Mac y GNU/Linux) se complica.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    GIPC

    GIPC

    Geographical IP Correlation

    TL;DR Version: I wrote a tool called GIPC (short for Geographical IP Correlation and pronounced Gypsy) which takes a list of IP address and returns the Geographical information you select based on the MaxMind.com GeoCity Database. The exe requires 2 inputs: The IP file (one IP per line) MaxMind GeoCity database – This can be downloaded HERE:http://geolite.maxmind.com/download/geoip/database/GeoLiteCity.dat.gz Please read more on my blog:...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    The sandbox libraries (libsandbox & pysandbox) are an open-source suite of software components for C/C++ and Python developers to create automated profiling tools and watchdog programs. The API's are designed for executing and instrumenting simple (single process) tasks, featuring policy-based behavioral auditing, resource quota, and statistics collecting. The sandbox libraries were originally designed and utilized as the core security module of a full-fledged online judge system for ACM/ICPC training. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    w3af
    w3af, is a Web Application Attack and Audit Framework. The w3af core and it's plugins are fully written in python. The project has more than 130 plugins, which check for SQL injection, cross site scripting (xss), local and remote file inclusion and much more. This project has been migrated to github! See details in our project site: http://w3af.org/
    Downloads: 30 This Week
    Last Update:
    See Project
  • 21

    Kryptograph

    Der Kryptograph (Python 2.7.3)

    Because of my diplom thesis now, i wont update my little project very often :(
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Cyberbit

    Cyberbit

    Visual Cryptography and Bit-Plane Complexity Segmentation in Python

    Hide secret messages in your pictures! Cyberbit lets you transmit a secret message to an intended person in a new manner. The secret message is an 1-bit deep black & white image. The message can contain written text, a drawing, a secret code etc. Using Visual Cryptography the application splits the secret message into two "shadow images" called <<shares>>. Any of the two shares will be embedded into a "normal" image file called by tradition <<vessel>>. You can use a method of hand to...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    steganoroute

    steganoroute

    Send steganographed text messages to mtr with fake hops in the network

    Steganoroute is a tool to send steganographed text messages to another computer over the network. The receiver must make a traceroute to the sender using the mtr program (and pressing 'd' once to switch the display mode to the continuous graph). This tool, the sender, creates several fake hops and makes them answer the ICMP packets (or not) to write the letters one by one on the mtr client screen.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 24

    RAWR - Rapid Assessment of Web Resources

    A web interface enumeration tool for simplifying red team reporting.

    Introducing RAWR (Rapid Assessment of Web Resources). There's a lot packed in this tool that will help you get a better grasp of the threat landscape that is your client's web resources. It has been tested from extremely large network environments, down to 5 node networks. It has been fine-tuned to promote fast, accurate, and applicable results in usable formats. RAWR will make the mapping phase of your next web assessment efficient and get you producing positive results faster!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    WTMParse

    WTMParse

    Python script to parse Unix-like WTMP files

    Python script that was originally intended for use in forensic examinations that parses WTMP files from Unix-like operating systems and generates a CSS-styled HTML report containing login terminal, username, log start date and login time/date in a table. Good for postmortem forensic examinations or as a way of getting "last" like information where you don't have the ability to boot the machine in question but can grab the wtmp.
    Downloads: 1 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB