Showing 41 open source projects for "z-push"

View related business solutions
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    More flexibility. More control.

    Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    phpscanner

    phpscanner

    An sql injection tools ..

    This perl script is functionaly for search the admin page/s. Brute-force from a-z, for login admin corectly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Wordpress Brute Force A-Z ..

    Wordpress Brute Force A-Z ..

    I guarantee it will works a hundred percent ..

    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    EbraSha Dos Attacker Ver 4.0

    EbraSha Dos Attacker Ver 4.0

    Custom DOS Attack In Kali Linux

    EbraSha Dos Attacker Ver 4.0 ----------- DESCRIPTION : EbraSha DOS Attacker is a network tool For custom DOS Attack EbraSha DOS Attacker Programming By Ebrahim Shafiei wiTh c++ ##### EbraSha DOS Attacker Site : Www.EbraSha.Org ----------- Features : + Syn Attack + UDP Attack + ICMP Attack + Pars Fuxy Attack Use The : (Syn,RST,PUSH,FIN,ACK,URG,XMAS,YMAS Tcp Flag) + EbraSha Crazy Attack (Send DDOS Fake Attacker To All Computer In Your Network) + EbraSha Black Sails Attack (The Best Option For Dos To Apache , Nginx , IIS , Tomcat , DataBases , RDP , ... ) + Syn Attack + Router CUP Death Attack (Kill The Cpu In A Min ;) ) + Reflected Flood Attack ----------- Copyright : EbraSha Dos Attacker Ver 4.0 Copyright (C) <2015-2017> <Ebrahim Shafiei> This program is free software: But you can not redistribute it and/or modify it under the terms of the Abdal General Private License as published by the Hacking Software Foundation , either version 1
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Wireless Attack Toolkit (WAT)

    Wireless Attack Toolkit (WAT)

    A push-button wireless hacking and Man-in-the-Middle attack toolkit

    This project is designed to run on Embedded ARM platforms (specifically v6 and RaspberryPi but I'm working on more). It provides users with automated wireless attack tools that air paired with man-in-the-middle tools to effectively and silently attack wireless clients. Some of the tools included in the kit are: Custom regex-based DNS Server DHCP Aircrack-ng suite Browser Exploitation Framework (Preconfigured for metasploit) Metasploit Python-based Transparent Injection...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • 5

    NetStress-NG

    NetStress is a DDoS and network stress testing tool.

    Syn Flood Attacks SYNFlood with static source port SYNFlood with random source port SYNFlood with static source ip address SYNFlood with random source address SynFlood with fragmented packets ACK Flood Attacks ACK Flood with static source port ACK Flood with random source port ACK Flood with static source ip address ACK Flood with random source address ACK Flood with fragmented packets FIN Flood Attacks FIN Flood with static source port FIN Flood with random source...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 6

    ELock

    Prevent unauthorised access to operating system

    ...The functionality is similar to AppCenter (which works only on Motorola devices). Works on Motorola, Casio, Datalogic and others devices. Program ELock pozwala administratorowi zablokować dostęp użytkownika do opcji systemu na urządzeniach z systemem Windows CE5.0, CE6.0. Umożliwia kontrolę uruchamianych programów. Jest programem podobnym do AppCenter (pracującym jedynie na terminalach Motoroli). Działa między innymi na terminalach Motoroli, Casio, Datalogic.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Z bigets Open source

    Z bigets Open source

    #Web site : http://zbigets.wordpress.com/

    #Donwload Server.rar And Client.rar Z bigets est un programme comme prorat avec plusieurs options.Le projet est open source pour but d'aider les gens qui débutent dans le monde de la programmation. [Changelog] -Connection victimes pour cela il faux lancer la fenetre victime . et lancer le trojan -Bloquer le sysyteme -Capture ecran -Change ip -shut down et restart -Keylogger -Sauvegarde des images. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Password Checker

    Password Checker

    A program designed to check passwords.

    This program checks the namespace of the password input ([a-z][A-Z][0-9][`-/]) and then determine the total number of passwords that an attacker might go through to brute-force the password. This is currently and ALPHA program, and as such everything that you "get" out of it should be examined closely.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9

    syscheck

    Host and service monitoring

    MOVED to GITHUB https://github.com/henrik-andreasson/syscheck/ It's a framework build with shell scripts to make sure a system is working and at good health. It started as checker for EJBCA . Used in high security environments, that cant allow standard probes to be installed. The result is sent out with syslog.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 10
    Open OMA DM is a open source OMA server provide a C based DM server. Database is using MySQL. Multi-thread is using libevent. Encryption library is openssl.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Random Password generator for kde Generates a set of random passwords of any length that can include the letter a-z, A-Z any number and symbols and any other character that QString can handle or hex values.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Allows to transparently encrypt repository contents with AES 256. The main advantage is that no additional software needed to be installed in untrusted location. Files are automatically encrypted on the fly when doing git push from trusted location.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Vernash: Stream cipher based on the Vernam cipher and Variable-Length Hashes
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A highly configurable sensor management system that provides the ability to remotely manage Snort [Barnyard] based Intrusion Detection Systems, push configuration files, monitor sensor health, and view Snort alerts all from a clean simple web interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A shell script which determines by brute force the best compression format (bzip2, gzip, Z, zip, etc.) and which compression level to use in order to archive a file the smallest possible.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Open eSign allows software developers and technical parties in a company to create secure, online (web-based) forms and documents that follow a business process flow and enable legally recognized electronic signatures using digital signature technology.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB