Showing 149 open source projects for "computer based test"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 1
    exploit.co.il Vulnerable Web app designed as a learning platform to test various SQL injection Techniques This is a fully functional web site with a content management system based on fckeditor. You can download it as source code or a pre configured
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    This is is a modular, test driven website that tries to break web clients of all kind. If you are developing applications that interact with websites you might want to throw it at this website first and see if it survives.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    WinSync
    Backup script for Windows based on robocopy Fast backup, syncs changed files only. Space efficient, all duplicate files are Hardlinked. Easy Overview of destination folder Structure: Computer Name > Date_Time > Drive > Folder > File
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    This is a highly configurable and flexible testing tool capable of generating different streams of network packets based on set of parameters user provides, for performance & robustness testing on a NIDS - Network Intrusion detection System.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8 Monitoring Tools in One APM. Install in 5 Minutes. Icon
    8 Monitoring Tools in One APM. Install in 5 Minutes.

    Errors, performance, logs, uptime, hosts, anomalies, dashboards, and check-ins. One interface.

    AppSignal works out of the box for Ruby, Elixir, Node.js, Python, and more. 30-day free trial, no credit card required.
    Start Free
  • 5
    n00bRAT
    An undetectable Remote Administration Tool -OR- trojan, an all new approach. Easily usable, Client just requires any Web Browser to control remote machine via WebPage. Fooling firewalls/ids/ips security solutions, as it operates like any web-site.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    BlueOxygen Debus is the security implementation of tree for BlueOxygen Cimande. Originally this is a Cimande Security, but we found that there is several security that we can implement and we must test it, so we decouple it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A simple security tool to test for the integrity of a computer installation. SdT constructs a signature of the current system state and checks installation state with a previously made signature. Is intended to work on a compromised system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    GeeVir - software product specifically designed to search for computer viruses using the GA (genetic algorithms)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Dark Cracker is a dictionary based brute-force DES-encrypted password cracker written in PERL which allows *nix system administrators to test password files against a dictionary of common passwords and detect accounts without a password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 10
    rjudge is a judge system for the Olympiad in Informatics. It can be also used as a problem test tool in the programming contest and daily practice. It provides many security features to ensure the smooth implement of judgement.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Zivios is a web based control panel which brings together vital open source technologies needed by medium and large enterprises. Zivios provides identity management,user, group and computer provisioning, as well as remote management of services.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    In your web applications wherever user registration is required, use this checker script to strictly enforce users to select stronger passwords. It tests cracking passwords against 4 rules. It has also built-in smoke test page.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    This project is a long time ago project made to destroy the autoruns that we haven't decided in the hard disk or a floppy disk. It destroys the VBScript and JavaScript on the root of each drive excepts the CD's (we can't do yet) and secure the computer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    CartoReso intends to facilitate enterprise computer network mapping.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    acegi usage example which contains some extended features: 1.get permission from db, 2.tag to test if the user has permission for an url 3.the permission can be refreshed when permission changes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Cnc's IP Data Volume Report

    Logs IP to IP contact, number of packets, bytes.

    Cnc's IP Data Volume Report: Logs IP to IP contact, number of packets, bytes, time of contact, Ethernet too! View via local web interface. Very simple for those who want to view who your computer is contacting the most!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    This project aims to develop a prototype system that explores how we should re-invision computer system design based on changes in how people get the software that they run, as well as advances in static analysis of software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Computer Breaker is a network testing tool that allows networking administrators to test if a computer is vulnerable to malicious attacks. Using the Nessus scanner, computer-breaker scans the remote host and automaticaly exploits its vulnerabilities.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Pillager is a set of PHP Scripts that allows you to test the security of your web server permissions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Magnet Card based authentication kiosk for computer lab login.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Vcn = Virtual computer Network will protect your computer from all malware and hackers by setting up 3 virtual empty computers and the integrated vpn for privacy will protect you from isp eavesdropping and other people interrested in tracking you
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    GuerillaTactics is an effort to bring "Computer Education Through Security Analysis". We aim to create a security education "lab kit" including management software and a curriculum framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Tomahawk is a command line utility that supports high speeds bidirectional replay (300-750 Mbps) of saved tcpdump(8) files. Tomahawk is great for testing the throughput and blocking capabilities of network-based intrusion prevention systems (NIPS).
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    iPod Tracker will enable iPod owners to be able to trace their iPod through a small program that runs on every Internet-Enabled iPod-to-Windows Computer connection. This was created mainly for iPod owners who are fearful of theft.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Sussen is a tool that checks for vulnerabilities and configuration issues on computer systems. It is based on the Open Vulnerability and Assessment Language.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB