Showing 245 open source projects for "work"

View related business solutions
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 1
     Abdal SSH BruteForce

    Abdal SSH BruteForce

    powerful SSH BruteForce tool

    Abdal SSH BruteForce tool is a powerful software with zero error rate to test the intrusion of servers that work with ssh protocol, this tool supports proxy for attacks and can transfer all your traffic in the hacking process to the proxy Slowly
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    VaultSync

    VaultSync

    Sync directories and files in a secure folder on an external drive

    VaultSync keeps synchronised data backups from one or more computers in an encrypted vault that is locked with a password. It is optimised to operate on a flash or external drive with minimal installation but it can also work on a hosted storage system like Dropbox, One Drive or Google Drive. It is really important that a backup is simple and fast to make. There is no point in having to decide what files are important or what has changed at the time of the backup, or having to manually remove unimportant files from a deep folder hierarchy after a backup. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    uMatrix

    uMatrix

    Point and click matrix to filter net requests according to source

    Definitely for advanced users. uMatrix does not guarantee that sites will work fine: it is for advanced users who can figure how to un-break sites, because essentially uMatrix is a firewall which works in relaxed block-all/allow-exceptionally mode out of the box: it is not unexpected that sites will break. uMatrix can be set to work in allow-all/block-exceptionally mode with a single click on all cells in the global scope if you prefer to work this way.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    PyExfil

    PyExfil

    A Python Package for Data Exfiltration

    PyExfil was born as a PoC and kind of a playground and grew to be something a bit more. In my eyes it’s still a messy PoC that needs a lot more work and testing to become stable. The purpose of PyExfil is to set as many exfiltrations, and now also communication, techniques that CAN be used by various threat actors/malware around to bypass various detection and mitigation tools and techniques. You can track changes at the official GitHub page. Putting it simply, it’s meant to be used as a testing tool rather than an actual Red Teaming tool. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    DNS-Based Host Blocking for Android

    DNS-Based Host Blocking for Android

    DNS-based Host Blocker (and lightweight ad blocker) for Android

    ...In the default configuration, several widely-respected host files are used to block ads, malware, and other weird stuff. On the first start, you must manually update the hosts files (using the refresh button) before the service can work correctly (issue #1); and you must also update the hosts files yourself regularly for now. Items in the hosts and DNS servers lists can be moved around and removed) of the list using standard RecyclerView interactions (long press makes the entry movable, swipe to either side removes it). For hosts, a later entry overrides a previous entry; for DNS servers, the first server is preferred. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    ...(https://seclists.org/fulldisclosure/2005/Sep/27) The great-grandaddy of SSH tcpwrapper / iptables, supporting SSH blocking scripts. I have made a slight alteration to the script to secure it if anyone has the old original in circulation. It has clearly come to my attention that my work was never credited by other authors which is very disappointing. While my intention was to not continue to support this code actively after release, as I was donating it to the OS Community, I would have like to have been recognized by other authors in the OpenSource community, who sadly have also sought to profit from the idea. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Insider

    Insider

    Static Application Security Testing (SAST) engine

    Static Application Security Testing (SAST) engine focused on covering the OWASP Top 10, to make source code analysis to find vulnerabilities right in the source code, focused on agile and easy-to-implement software inside your DevOps pipeline. Support the following technologies: Java (Maven and Android), Kotlin (Android), Swift (iOS), .NET. Insider is focused on covering the OWASP Top 10, to make source code analysis to find vulnerabilities right in the source code, focused on a agile and...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    An advanced password generator written in C++ and designed to run within the terminal emulator of any *NIX compatible system. It is based on the work by Nintendo(r) European Reasearch and Development (NERD) and the "HireMe" challenge. I've taken the work of NERD a step further and used the input-confusion-diffusion paradigm in conjunction with SHA/256 encryption to generate randomized passwords that cannot be decoded (yet - quantum computers will change this eventually!) The software generates sufficiently random passwords to allow the same plaintext password to be used multiple times without generating the same output. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Polarity Browser

    Polarity Browser

    A fast, secure, stable web browser powered by Chromium and Trident.

    ...Polarity also comes with a built in adblocker and privacy tools such as proxy/VPN support and header masking to prevent further tracking online. If you appreciate all the hard work that we put into creating and developing Polarity, please consider giving a small donation at: https://polaritybrowser.netlify.com/donate
    Downloads: 44 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    Naxsi

    Naxsi

    Open-source, high performance, low rules maintenance WAF for NGINX

    ...The administrator can either add whitelists manually by analyzing nginx's error log, or (recommended) start the project with an intensive auto-learning phase that will automatically generate whitelisting rules regarding a website's behavior. In short, Naxsi behaves like a DROP-by-default firewall, the only task is to add required ACCEPT rules for the target website to work properly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    ...Source code available on Github: Server side: https://github.com/davidesestiliwork/MyWebProject2 Client side: https://github.com/davidesestiliwork/MyWebProjectClient Token generator: https://github.com/davidesestiliwork/TokenGenerator Note: This web app require GnuPG to work properly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Parsley

    Parsley

    Validate your forms, frontend, without writing a line of javascript

    ...Parsley strongly focuses on #UI and #UX. Override almost every Parsley default behavior to fit your exact needs. Still ships almost bug free. Parsley is strongly tested, and aims to work on every browser (including IE8).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ZIPcrypt

    ZIPcrypt

    Simple Encryption / Decryption Utility

    ZIPcrypt is a simple encryption and compression software that uses patented XOTIC 512-bit+, or AES 256-bit encryption. Delivering the best encryption technology on the market today, ZIPcrypt was also designed to be fast, easy to use, and to work in parallel with the SCIFCOM Encryption as a Service website.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    MozDef

    MozDef

    MozDef: Mozilla Enterprise Defense Platform

    ...We use MozDef to ingest security events, alert us to security issues, investigate suspicious activities, handle security incidents, and visualize and categorize threat actors. The real-time capabilities allow our security personnel all over the world to work collaboratively even though we may not sit in the same room together and see changes as they occur. The integration plugins allow us to have the system automatically respond to attacks in a preplanned fashion to mitigate threats as they occur.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15

    sls

    SLS Team Java Library

    ...No bad dependencies between classes, so u can easily cut off unnecessary code and simply include what u need in your project. Feel free and simple without headache. We are using class Binary as best for us to work with byte arrays. Simple classes for console-like colored apps in GUI-mode. Look also http://demo.sls.team
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Treater Antivirus

    Treater Antivirus

    Cloud antivirus scanner based on machine detection

    Treater Anti-Virus is a free portable anti-virus on demand scanner which does not require the installation and updates of signatures. The application is able to detect and neutralize threats not found by the main protection program, such as Trojans, Ransomware, Worms, Dialers, Adware, Riskware, Pornware, SMS Blocks, etc. The utility does not require installation and can be launched from removable USB/CD drives as a "resuscitator" tool to unlock the computer. During the development, the...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17

    IDABench

    Old School Light Weight Network Forensic Tool

    This is the fork of the SHADOW IDS produced in 2003. It has been updated to work on modern (SystemD, OpenRC) GNU suites. The original developers added the plugable architecture. It has been tweaked for TSHARK. It requires a CGI web server. It will run tcpdump 24x7x???. It will render initial analysis, and searchability. # idabench Version 1.0.1 idabench is public domain software and may be freely used and # distributed with or without modification...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Somedo

    Somedo

    Social Media Downloader

    Social Media Downloader for Open Source Intelligence purpos. Supportes so far: Facebook Instagram Twitter
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    ARP AntiSpoofer
    A utility for detecting and resisting BIDIRECTIONAL ARP spoofing. It can anti-spoof for not only the local host, but also other hosts in the same subnet. It is as well a handy helper for gateways which don't work well with ARP.
    Downloads: 25 This Week
    Last Update:
    See Project
  • 20
    Xenos

    Xenos

    Windows dll injector

    ...As an application rather than a library, it provides a concrete example of how to leverage Blackbone’s robust process and memory manipulation APIs to perform manual and automated DLL injection into both 32-bit and 64-bit Windows applications. Xenos supports a variety of mapping techniques including manual mapping, and it is configured to work across supported Windows versions from Windows 7 to Windows 10 x64, making it useful for developers and modding communities working with older or newer games and applications. By basing its core functionality on Blackbone, Xenos benefits from the underlying library’s advanced memory manipulation capabilities such as process attachment, memory allocation, and loader-agnostic injection methods.
    Downloads: 228 This Week
    Last Update:
    See Project
  • 21
    Security Monkey

    Security Monkey

    Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs

    ...The monkey remembers previous states and can show you exactly what changed, and when. Security Monkey can be extended with custom account types, custom watchers, custom auditors, and custom alerters. It works on CPython 2.7. It is known to work on Ubuntu Linux and OS X. Security Monkey accesses accounts to scan via credentials it is provided.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    fields.awk

    A flat-file database program written in bash shell and awk scripts.

    Fields.awk allows users to create and work with small-to-medium databases on their home computers or a mobile device with bash shell terminal emulator. It runs on any OS compatible with bash shell, including Linux, FreeBSD, MacOSX, and Android. Certain optional features (printing/encryption) are dependent on external utilities such as lp or ccrypt.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    check vpn

    check vpn

    check if your vpn is falling down

    This tool check every x seconds your public ip adress, if it changes (vpn fall down for example) it stops one or several programs. When the VPN crash this tool can send a mail, play a sound. - This tool work on Windows and Linux. - You need to install JAVA 1,8 on your operating system - Download checkvpn.zip and unzip it - Double click on checkvpn.jar - Click on the button « Update ip » when the VPN is stopped to get your public ip address. - Type the programs separated by semicolon that you would like to stop when the vpn is falling down (ex: utorrent.exe;firefox.exe on linux just put « firefox » no extension) - Click on start button and the program will check every x seconds your ip address, if it not the vpn's ip the programs will be stopped by this tool...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    magfido

    magfido

    FIDO U2F Integration for Magento 2

    ...Learn more about Magento + FIDO at this Magento Community Forum thread: https://community.magento.com/t5/Magento-2-Feature-Requests-and/Enable-FIDO-Strong-Authentication/idi-p/79810 This code contribution is based on work done with the NIST National Cybersecurity Center of Excellence Multi-Factor Authentication for e-Commerce project (https://nccoe.nist.gov/projects/use-cases/multifactor-authentication-ecommerce).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    stenc

    SCSI Tape Encryption Manager

    SCSI Tape Encryption Manager - Manages encryption on LTO 4 and LTO 5 tape drives with hardware-based encryption. Program should work on any other SSP capable tape drives. Built specifically for Linux and AIX. Now supports key change auditing and key descriptors (uKAD). Check the Project News under the Develop section for more information. Project source code has moved to https://github.com/scsitape/stenc
    Downloads: 0 This Week
    Last Update:
    See Project