Showing 70 open source projects for "python games code"

View related business solutions
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    The i-Code Console is a web based application purposely created to access the existing database of a Prelude installation and provide a single access point to the stored events. This project includes the web app, the web server and all the utilities and 3 example rules for the Prelude Correlator module. This console was created within the i-Code Project (http://www.icode-project.eu).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Moihack Port-Flooder

    A simple TCP/UDP Port Flooder written in Python.

    Code is much smaller in size now - from about 130 pure lines of codes to 35 lines only. To run it you must have Python 3.2 or newer installed.Tested this on Windows,but guess it will work in Linux also,since there are not any OS specific lines in the code. This tool was only written for personal tests and usage! It was NOT written to DDoS other people and/or cause harm to hardware.I am NOT responsible for any kind of damage you make by using this software. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    FakeNet

    Windows Network Simulation tool for Malware Analysis

    ...It redirects all traffic leaving a machine to the localhost (including hard-coded IP traffic and DNS traffic) and implements several protocols to ensure that malicious code continues to execute and can be observed by an analyst. The tool supports DNS, HTTP, and SSL protocols and provides a python extension interface for implementing new or custom protocols. It also the capability to listen for traffic to any port as well as create packet capture on the localhost. Right now the tool only supports WinXP Service Pack 3. ...
    Leader badge
    Downloads: 124 This Week
    Last Update:
    See Project
  • 4

    Pass Phrase Generator

    Strong pass phrase generator using python on ubuntu

    Strong pass phrase generator using python on ubuntu. The code takes 2 random words and a random number, concatenates them together and puts one of the words into upper case. This provides a long easy to remember pass phrase which satisfies "must include numbers, letters, upper and lower case" password guidelines. The code is called Pass Phrase Generator because it lets me use the acronym PPG which is the energy weapons used in Babylon 5.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    This is where web developers can get tools that can make their life easier. Web technologies and languages used contain but are not limited to HTML, XHTML, CSS, JavaScript, PHP, and AJAX. All code is extremely slim, fast running, and is W3C compliant.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    edx33v2 is a Silkroad Online proxy application that uses a man-in-the-middle attack vector to provide the end user full access to the underlying communication channel between the client and server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    SLEncrypt is a python module for encryption with 11 ciphers at the moment, including ADFGVX, Autokey, Caesar/ROT13, Vigenere, XOR and a lot more. It contains functions allowing you to easily encrypt/decrypt files. The code is about 95% PEP 8 compilant.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Powerfuzzer is a highly automated web fuzzer based on many other Open Source fuzzers available (incl. cfuzzer, fuzzled, fuzzer.pl, jbrofuzz, webscarab, wapiti, Socket Fuzzer). It can detect XSS, Injections (SQL, LDAP, commands, code, XPATH) and other
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    A non-brute-force sudoku solver. Ukodos is sodoku backwards; According to wikipedia, Sodoku is a bacterial zoonotic disease.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    A toolkit of nitty-gritty classes from real-life projects. Contains generic snippets along with things like server-side DOM implementation or RSA or code generation tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    pyMoul: Python tools for Myst Online - URU Live (MOUL)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    LinSIeVe is a System Integrity Verifier for Linux kernel code and read-only data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A small program designed to code and decode strings of letters based on DNA.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Polydish is a polymorphic Internet server capable of accepting pluggable protocols (written in Python or Ruby), and can thereby serve any type of content imaginable. The backend code is a fast, secure, C-based server, employing thread pools and OpenSSL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Started as part of the Google Summer of Code 2005, this tool adjusts security settings on Linux systems, including firewall and SELinux policies. This tool aims to replace the system-config-securitylevel tool from Red Hat and Fedora Core systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Confiture is the new generation of the cryptographic software, Confiture use the all new innovation cryptographic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Download code, Learn code, Share code. The Ongoing Object-oriented Perl Project. scripts, tutorials, modules, case studies, anything OOPerl --not excluding contributions of OO discipline in other programming languages.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    TextCodec can encode texts using simple algorithm and then decode them by using statistical language data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    This toolkit will provide seemless backend support for multiple Firewall and IDS systems deployment. The initial release will only support Snort and FreeBSD\\\'s ipfw, but future releases will expand the firewall selection. The main code is Python,
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    cryptshell is a shell used for analysable code (eg anything before wwII). It automates letter substitution, transposition, and has modules useful for breaking various weak ciphers (enigma, substitution, vinigre). It has no real practical value.
    Downloads: 0 This Week
    Last Update:
    See Project