Showing 203 open source projects for "MCT Version Control"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1
    Application Blocker

    Application Blocker

    Easy to Use Application Restrictor Tool For Windows

    ...The tool does not work at background when using standard block. In password lock mode, the tool uses minimal resources and does not affect system performance. This program can be used to control your child or prevent access to programs on special areas like school computers. You can set an UI password to prevent unauthorized users from blocking and unblocking programs. The tool can check for updates automatically and alert you when a new version is available. It can automatically download and install newer versions. ...
    Downloads: 60 This Week
    Last Update:
    See Project
  • 2
    Thunderbird Anti Virus v3.5

    Thunderbird Anti Virus v3.5

    Thunderbird Anti Virus Free Scanner v3.5

    Thunderbird Anti-Virus v3.4 | Professional Security & Network Shield Thunderbird Anti-Virus v3.4 is a high-performance security suite engineered for users who demand elite protection without system degradation. Built on a sophisticated Heuristic Analysis Engine, it delivers surgical precision in identifying malware, ransomware, and volatile memory threats. This version introduces the Integrated Network Shield, a professional-grade firewall providing real-time perimeter control. Complemented by the new Live I/O Telemetry, users can monitor data throughput (KB/s) in real-time, identifying anomalous activity instantly. Whether performing a Deep System Audit or a targeted Memory Analysis, Thunderbird AV operates with a minimal CPU footprint, ensuring your hardware performance remains uncompromised.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 3
    SCADA-LTS

    SCADA-LTS

    A comprehensive Supervisory Control, Data Acquisition, and Execution

    SCADA-LTS is an advanced FOSS, web-based, multi-platform environment designed to build your own Supervisory Control, Data Acquisition, and Execution ecosystem. Its architecture provides a robust foundation for complex industrial automation and monitoring. Optimized for Smart Infrastructure, it is highly capable of managing industrial PV/BESS, Smart buildings, municipal Water networks or Wastewater treatment, ANPR telemetry, City-wide lighting, and other diverse data administration...
    Downloads: 24 This Week
    Last Update:
    See Project
  • 4
    ufonet

    ufonet

    UFONet - Denial of Service Toolkit

    UFONet - Is a set of hacktivist tools that allow launching coordinated DDoS and DoS attacks and combine both in a single offensive. It also works as an encrypted DarkNET to publish and receive content by creating a global client/server network based on a direct-connect P2P architecture. + FAQ: https://ufonet.03c8.net/FAQ.html -------------------------------------------- -> UFONet-v1.8 [DPh] "DarK-PhAnT0m!" (.zip) -> md5 = [ c8ab016f6370c8391e2e6f9a7cbe990a ] -> UFONet-v1.8...
    Downloads: 16 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 5
    Thunderbird Anti Virus 3.4

    Thunderbird Anti Virus 3.4

    Thunderbird Anti Virus Free Scanner v3.4

    ...Designed with a focus on resource efficiency and transparent operations, Thunderbird AV provides a robust alternative to bloated security suites, offering a surgical approach to malware detection and system auditing. The v3.4 architecture integrates an advanced Heuristic Analysis Engine capable of deep-memory inspection and multi-tier file system scanning. This version debuts the Integrated Network Shield, a native firewall module that allows for instantaneous perimeter control. Complementing this is the Live I/O Analytics layer, which provides real-time telemetry of network throughput, allowing administrators and power users to identify anomalous data patterns as they occur.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6

    ICS Sensor Sim Lab

    ICS Sensor Traffic Simulator

    This tool simulates network traffic typical of an Industrial Control System (ICS) environment. It generates synthetic Modbus/TCP packets to help test monitoring and intrusion detection systems. Quick Start To use this tool, run the simulator: bash # Run for 30 seconds and save to traffic.log python lab_runner.py ics-sim --duration 30 --output traffic.log
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    SafeNotes - Encrypted Journaling

    SafeNotes - Encrypted Journaling

    SafeNotes - A encrypted and easy-to-use journaling application

    SafeNotes is an encrypted and user-friendly note-taking application designed to keep your personal notes and journal entries safe and organized. With SafeNotes, you can easily create, edit, and manage your notes, all while ensuring your data is protected through robust AES-256 encryption and password hashing. The app features a sleek and intuitive interface built with MaterialSkin, offering light and dark themes to suit your preferences. SafeNotes is perfect for anyone looking to keep...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8
    SecureDel

    SecureDel

    Secure File Deletion

    SecureDel is a small utility that does not require installation and can be used directly from a USB drive. The program is very lightweight, very easy to use, very fast, and uses six different deletion algorithms. It does not leave any trace in the system where it acts and performs deletions in such a way that deleted files can no longer be recovered. It generates a report after each deletion to display the processing times. SecureDel 1.2.3 Released. Good Deletion!
    Downloads: 6 This Week
    Last Update:
    See Project
  • 9

    PassMan Password Manager

    Simple password manager written on Laravel and Filament

    PassMan password manager is designed to help you take control of your passwords — keeping them local, secure, and easily accessible. It lets you add domains, categorize your passwords and ensures that only you can access your credentials. With our tool, you can easily add domains, categorize your records by type (e.g., www, FTP, etc.), and store usernames and passwords securely. Since everything is stored locally, you’re the only one who has access to your data, providing an added layer...
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10
    RufasSlider

    RufasSlider

    Klotsky class block slider puzzles.

    RufaSlider is a collection of 16 different block slider puzzles for kids and casual puzzlers that works on laptops and PCs running Windows, OSX or GNU/Linux. It includes a Klotski-style family, a DirtyDozen family, and a Traffic-Rush family. And now these puzzle families come with AutoSolvers to help you. The Klotski family uses rectangles of 4 sizes: 1x1, 2x2, 1x2, 2x1. The objective in each game is stated near the window top, but usually involves moving a large block to a specified...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11

    WendzelNNTPd

    A free Usenet server with SQL backend and RBAC.

    The WendzelNNTPd is a IPv6-ready NNTP usenet-server with the main goal to be as easy to use as possible. It is portable (Linux/*BSD/*nix), supports AUTHINFO authentication, contains ACL as well as role based ACL and supports invisible newsgroups. It currently supports MySQL and SQLite backends.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    LibNetBlock - A Network Blocking Library

    LibNetBlock - A Network Blocking Library

    A library for blocking access to network on-the-fly

    LibNetBlock is a library that on-the-fly (by preloading) prevents a program under its control to use the network, to help to keep the user's privacy, prevent data leakage and virus spreading. You can think of LibNetBlock as a simple layer-7 (L7) firewall that simply blocks the network access for the program it controls. There is NO NEED to rebuild your software, because LibNetBlock is a pre-loadable library, meaning you just need to RUN the software with LibNetBlock loaded. LibNetBlock is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    CSRmanage

    CSRmanage

    Centralized vetting and records of Certificate Signing Requests (CSRs)

    CSRmanage is an application that can be used to validate CSRs (Certificate Signing Requests) and store them along with anciliary information about the personnel involved with CSRs and certificate installations and approvals. CSR evaluation is configurable/very strict. With adequate configuration, CSRmanage may save organizations time and money by ensuring that CSRs to be submitted are formatted corrrectly and conform to organizational network/I.T/DNS naming conventions. It can also...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    qFlipper

    qFlipper

    Desktop application for updating Flipper Zero firmware via PC

    qFlipper is a cross-platform desktop application that serves as the official graphical interface for managing and maintaining the Flipper Zero device from a computer environment. Built using the Qt framework, it runs on Windows, macOS, and Linux, providing a consistent user experience across operating systems. Its primary function is to simplify firmware management by allowing users to update, repair, or install firmware with a single action, reducing the complexity typically associated with...
    Downloads: 57 This Week
    Last Update:
    See Project
  • 15
    PacketFence - Enterprise NAC that actual
    A network access control (NAC) system featuring a captive-portal for registration and remediation, wired and wireless management, 802.1X support, isolation of devices, integration with IDS; it can be used to secure networks from small to large. Source code is hosted here: https://github.com/inverse-inc/packetfence Issue tracker is hosted here: https://github.com/inverse-inc/packetfence/issues
    Downloads: 11 This Week
    Last Update:
    See Project
  • 16
    Infection Monkey

    Infection Monkey

    Infection Monkey is a automated security testing tool for networks

    Infection Monkey is a open source automated security testing tool for testing a network's security baseline. Monkey is a tool that infects machines and propagates and Monkey Island is the server for an administrator to control and visualize progress of Infection Monkey.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 17
    Ultimate AppLocker Bypass List

    Ultimate AppLocker Bypass List

    The most common techniques to bypass AppLocker

    UltimateAppLockerByPassList is a community-curated repository that collects known techniques, patterns, and candidate binaries that have been observed or proposed to bypass Microsoft AppLocker and similar executable control policies. The project functions as a living catalog: entries list binaries, script hosts, and patterns that researchers have tested or reported in the wild, along with notes about context, platform constraints, and mitigation ideas. It is aimed primarily at defenders,...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    boundman

    boundman

    Add rule to windows firewall to block inbound and outbound traffic

    Boundman is an advanced, user-friendly, and sleek application designed to take control over your network connections. It allows you to efficiently manage and block incoming and outgoing traffic for specific .exe files contained within a chosen folder and its subfolders. With its intuitive PyQt5 graphical interface and robust PowerShell scripts, Boundman provides seamless integration with the Windows Firewall for a powerful network management experience.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    KubiScan

    KubiScan

    A tool to scan Kubernetes cluster for risky permissions

    A tool for scanning Kubernetes cluster for risky permissions in Kubernetes's Role-based access control (RBAC) authorization model. KubiScan helps cluster administrators identify permissions that attackers could potentially exploit to compromise the clusters. This can be especially helpful on large environments where there are lots of permissions that can be challenging to track. KubiScan gathers information about risky roles\clusterroles, rolebindings\clusterrolebindings, users and pods,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Openblocks

    Openblocks

    The Open Source Retool Alternative

    It's cumbersome to create a single app. You had to design user interfaces, write code in multiple languages and frameworks, and understand how all of that code works together. Low-code/No-code platforms are fast to get started with but quickly become unmaintainable and inflexible. This creates more problems than it solves. Retool-like solutions are great for their simplicity and flexibility, but they can also be limited in different ways compared to frameworks like React/Vue. An all-in-one...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Bitwarden Desktop Application

    Bitwarden Desktop Application

    Secure desktop password management application

    Bitwarden is an easy-to-use and secure desktop vault for managing passwords and other sensitive data. It helps individuals and teams share, store and sync sensitive data, and create and secure passwords. All data is fully encrypted before it even leaves your device, with end-to-end AES-256 bit encryption, salted hashing, and PBKDF2 SHA-256. Written using Electron and Angular, this native desktop application can be accessed on Windows, macOS and Linux desktops.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 22
    Checksum Control
    A program to verify and write checksumfiles. It supports SFV and MD5 , even some exotic MD5 file types. Very easy to use, with a wizard interface.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 23
    Kubesploit

    Kubesploit

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments written in Golang and built on top of Merlin project by Russel Van Tuyl. While researching Docker and Kubernetes, we noticed that most of the tools available today are aimed at passive scanning for vulnerabilities in the cluster, and there is a lack of more complex attack vector coverage. They might allow you to see the problem but not exploit it. It is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    NPS

    NPS

    Lightweight, high-performance, powerful intranet penetration proxy

    ...Comprehensive protocol support, compatible with almost all commonly used protocols, such as tcp, udp, http(s), socks5, p2p, http proxy. Full platform compatibility (linux, windows, macos, Synology, etc.), support installation as a system service simply. Comprehensive control, both client and server control are allowed. Https integration, support to convert backend proxy and web services to https, and support multiple certificates. Just simple configuration on web ui can complete most requirements. Complete information display, such as traffic, system information, real-time bandwidth, client version, etc. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    gitjacker

    gitjacker

    Leak git repositories from misconfigured websites

    Leak git repositories from misconfigured websites. Gitjacker downloads git repositories and extracts their contents from sites where the .git directory has been mistakenly uploaded. It will still manage to recover a significant portion of a repository even where directory listings are disabled. For educational/penetration testing use only. You will need to have git installed to use Gitjacker.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB