Showing 57 open source projects for "accessible-coconut"

View related business solutions
  • 8 Monitoring Tools in One APM. Install in 5 Minutes. Icon
    8 Monitoring Tools in One APM. Install in 5 Minutes.

    Errors, performance, logs, uptime, hosts, anomalies, dashboards, and check-ins. One interface.

    AppSignal works out of the box for Ruby, Elixir, Node.js, Python, and more. 30-day free trial, no credit card required.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    Sigma

    Sigma

    Main Sigma Rule Repository

    ...The place where detection engineers, threat hunters and all defensive security practitioners collaborate on detection rules. The repository offers more than 3000 detection rules of different type and aims to make reliable detections accessible to all at no cost. Sigma is an open-source tool for defining generic detection rules for security event logs, enabling security professionals to detect threats across platforms.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 2
    Gpg4win

    Gpg4win

    GnuPG for Windows

    Gpg4win is the official Windows distribution of the GnuPG encryption ecosystem, providing an accessible graphical environment for secure email and file protection. It packages the GnuPG engine together with user-friendly tools such as certificate management utilities, Windows Explorer integration, and Outlook plugins, enabling encryption workflows without requiring command-line expertise. The suite supports both OpenPGP and S/MIME standards, allowing organizations and individuals to secure communications using widely recognized cryptographic methods. ...
    Downloads: 27 This Week
    Last Update:
    See Project
  • 3
    Instagram OSINT Tool

    Instagram OSINT Tool

    Instagram OSINT tool for gathering profile data and public posts

    InstagramOSINT is an open source intelligence (OSINT) tool designed to collect publicly accessible information from Instagram profiles. It retrieves details that are not always easily visible when browsing an Instagram account normally, allowing investigators, researchers, and developers to gather structured data about a target profile. It works by scraping publicly available profile information and extracting metadata from Instagram pages using Python.
    Downloads: 53 This Week
    Last Update:
    See Project
  • 4
    Toutatis

    Toutatis

    Extract public Instagram account information from usernames

    ...It helps users gather various data points from a target profile by querying Instagram using a username or account ID. The tool can retrieve details such as profile metadata, follower counts, biography information, and other publicly accessible account attributes. In addition to basic profile data, Toutatis can also reveal contact details that may be publicly exposed, including email addresses and phone numbers associated with the account. The utility is implemented in Python and runs through a simple command-line interface, making it easy to integrate into OSINT workflows and automation scripts. ...
    Downloads: 36 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    Flipper iOS App

    Flipper iOS App

    iOS Mobile App to rule all Flipper's family

    ...It is also used for firmware updates, file management, and browsing available applications from the Flipper ecosystem, effectively bridging the gap between hardware and user workflows. The interface is designed to simplify complex operations, making advanced capabilities like signal capture and replay more accessible to non-expert users.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    Xteam

    Xteam

    All-in-one command-line toolkit for security testing and OSINT tools

    ...Xteam’s architecture uses a main bash script that serves as the hub for running internal modules or downloading and executing external projects when needed. It can operate on Linux systems as well as Android devices using Termux, making it accessible in both desktop and mobile environments.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    GooFuzz

    GooFuzz

    OSINT fuzzing tool using Google dorks to find exposed resources

    GooFuzz is an open source security tool designed to perform fuzzing using an OSINT-based approach by leveraging advanced Google search techniques. It is written in Bash and automates the use of Google Dorking queries to discover publicly accessible information related to a target domain. Instead of directly sending requests to the target server, GooFuzz gathers results through search engine indexing, allowing enumeration without leaving traces in the target’s server logs. This method enables the discovery of potentially sensitive files, directories, subdomains, and parameters that are already exposed on the web. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8
    Metabigor

    Metabigor

    Command-line OSINT and reconnaissance tool without API keys

    ...Metabigor integrates multiple public data sources such as certificate transparency logs, BGP routing data, reverse WHOIS services, and IP intelligence databases to help map digital infrastructure. It can also enrich IP information with service, port, and vulnerability data using Shodan InternetDB while remaining accessible without authentication keys. In addition, it provides utilities that coordinate network scanning workflows by acting as a wrapper for tools like rustscan, masscan, and nmap.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9
    pwnedOrNot

    pwnedOrNot

    Check breached emails and find exposed passwords from public dumps

    ...If the email is found in a breach, the tool proceeds to search for associated passwords within publicly available data dumps. This two-phase approach allows investigators, security professionals, and researchers to assess the exposure level of compromised accounts using publicly accessible breach information. The tool displays useful breach details such as the name of the breach, the affected domain, the breach date, and several status indicators related to the authenticity and status of the breach. pwnedOrNot can also analyze domains to determine whether they have been involved in breaches and can list all breached domains available through the HIBP database.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 10
    uncover

    uncover

    Discover exposed internet hosts using multiple search engine APIs

    Uncover is an open source reconnaissance tool designed to quickly discover exposed hosts on the internet by querying multiple search engine APIs through a unified interface. It acts as a Go-based wrapper around well-known internet intelligence platforms, allowing users to gather information about publicly accessible systems from a single command-line tool. By integrating with services such as Shodan, Censys, FOFA, ZoomEye, and others, the tool enables security professionals to efficiently search for internet-facing assets and services. The tool is built with automation in mind, making it suitable for security workflows and pipelines used by penetration testers, researchers, and bug bounty hunters. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    kube2iam

    kube2iam

    Provides different AWS IAM roles for pods running on Kubernetes

    Provide IAM credentials to containers running inside a Kubernetes cluster based on annotations. Traditionally in AWS, service level isolation is done using IAM roles. IAM roles are attributed through instance profiles and are accessible by services through the transparent usage by the aws-sdk of the ec2 metadata API. When using the aws-sdk, a call is made to the EC2 metadata API which provides temporary credentials that are then used to make calls to the AWS service. The problem is that in a multi-tenanted containers based world, multiple containers will be sharing the underlying nodes. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    urlhunter

    urlhunter

    Search exposed URLs from shortener services using keyword filtering

    ...These datasets contain resolved long URLs that were originally hidden behind short links, which can sometimes reveal sensitive or previously unknown endpoints. urlhunter downloads these collections and allows users to search and analyze them using custom keywords or patterns. This capability makes it useful for identifying exposed resources such as documents, internal panels, or forgotten endpoints that may still be accessible online. urlhunter is written in Go and operates as a command-line utility, making it suitable for automation and integration into reconnaissance workflows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Raccoon

    Raccoon

    High-performance reconnaissance and vulnerability scanning tool

    ...It automates several common reconnaissance tasks, allowing security professionals to quickly gather information about a target system or web application. The tool combines multiple scanning techniques into a single workflow, helping users identify potential weaknesses, exposed services, and accessible resources on a target host. Raccoon can perform DNS enumeration, subdomain discovery, and URL fuzzing to uncover hidden endpoints and infrastructure components. It also integrates network scanning capabilities through tools such as Nmap to detect open ports, services, and potential vulnerabilities. By consolidating these reconnaissance tasks into a single command-line interface, Raccoon aims to streamline the early phases of security testing and provide actionable information for further investigation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Infosec Reference

    Infosec Reference

    An Information Security Reference That Doesn't Suck

    Infosec Reference is a curated knowledge base and resource repository for information security practitioners. It aggregates cheat sheets, tooling guides, protocol deep dives, incident response playbooks, and threat actor profiles—all organized under accessible categories (network, web, host, cryptography, auditing). The repo is built as a living wiki of sorts: practitioners contribute updates, expand sections, or refine explanations as the threat landscape evolves. Because security spans many domains, Infosec Reference helps consolidate high-value, battle-tested knowledge into one place, reducing the need to scour scattered blogs or notes. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    WinSCP

    WinSCP

    WinSCP is a free SFTP, SCP, S3, WebDAV, and FTP client for Windows.

    WinSCP is a popular free file manager for Windows supporting SFTP, FTP, FTPS, SCP, S3, WebDAV and local-to-local file transfers. A powerful tool to enhance your productivity with a user-friendly interface and automation options like .NET assembly or batch file scripting. Use WinSCP also for file editing, directory synchronization and site management. WinSCP is open-source and well documented. It is available in English and many other languages.
    Leader badge
    Downloads: 182,094 This Week
    Last Update:
    See Project
  • 16

    Violet PHP Password Manager

    Free php self-hosted password manager

    ...Password Generator: Create strong, unique passwords to enhance your security. Cross-Platform Compatibility: Accessible on any device with a web browser. Why Choose Violet PWM? Violet PWM is built with a strong emphasis on security and privacy. Your data is encrypted and stored securely, ensuring that only you have access. Whether you need to manage perso
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    clamtk

    clamtk

    An easy to use, light-weight, on-demand virus scanner for Linux system

    ClamTk is a graphical front-end for ClamAV, the open-source antivirus engine for Unix-like systems. It provides an easy-to-use interface for on-demand virus scanning, making ClamAV more accessible to desktop users.​
    Downloads: 16 This Week
    Last Update:
    See Project
  • 18
    cardionet

    cardionet

    A beautiful, modern Terminal User Interface (TUI) for nmap

    CardioNet simplifies network scanning by providing an intuitive graphical interface for nmap, making it accessible to both beginners and advanced users. Build complex scanning commands visually, execute them in real-time, and export results in multiple formats.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    ExtPassword!

    ExtPassword!

    Recover passwords stored on external drive

    ...can decrypt and extract multiple types of passwords and essential information, including passwords of common Web browsers, passwords of common email software, dialup/VPN passwords, wireless network keys, Windows network credentials, Windows product key, Windows security questions. This tool might be useful if you have a disk with Windows operating system that cannot boot anymore, but most files on this hard drive are still accessible and you need to extract your passwords from it.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 20
    Secure Password Manager

    Secure Password Manager

    Application to generate, store, and manage passwords with encryption

    Secure Password Manager is a portable application designed to securely generate, store, and manage passwords using advanced encryption techniques to protect sensitive data. This practical, efficient, and simple application ensures that your passwords are always safe and easily accessible. To learn more, visit our website at https://securepassapp.netlify.app/ Key features include: Robust Password Generation: Create strong passwords using a combination of letters, numbers, and special characters. Custom Password Input: Choose and manage your own secure passwords. Master Password Protection: A modifiable master password protects access to your stored passwords. ...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 21
    GhostTrack

    GhostTrack

    Useful tool to track location or mobile number

    ...The project is implemented in Python and targets cybersecurity researchers, ethical hackers, and investigators who need a lightweight reconnaissance tool for digital footprint analysis. It provides a menu-driven interface that allows users to select different tracking modes, making the tool accessible even to those with limited scripting experience. GhostTrack can be combined with complementary tools such as Seeker to enhance IP capture workflows and improve investigative coverage. Because it focuses on aggregating open data rather than exploiting systems, the tool positions itself within the information-gathering phase of security assessments and OSINT research.
    Downloads: 175 This Week
    Last Update:
    See Project
  • 22

    PassMan Password Manager

    Simple password manager written on Laravel and Filament

    PassMan password manager is designed to help you take control of your passwords — keeping them local, secure, and easily accessible. It lets you add domains, categorize your passwords and ensures that only you can access your credentials. With our tool, you can easily add domains, categorize your records by type (e.g., www, FTP, etc.), and store usernames and passwords securely. Since everything is stored locally, you’re the only one who has access to your data, providing an added layer of privacy and security. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    Supercookie

    Supercookie

    Browser fingerprinting via favicon!

    Supercookie uses favicons to assign a unique identifier to website visitors. Unlike traditional tracking methods, this ID can be stored almost persistently and cannot be easily cleared by the user. The tracking method works even in the browser's incognito mode and is not cleared by flushing the cache, closing the browser or restarting the operating system, using a VPN or installing AdBlockers. The demo of "supercookie", as well as the publication of the source code of this repository, is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    cloud_enum

    cloud_enum

    Multi-cloud OSINT tool for discovering public cloud resources

    ...It can identify both publicly accessible and protected resources, helping security researchers understand the external cloud footprint of an organization.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Kraken tool

    Kraken tool

    Kraken: A multi-platform distributed brute-force password cracking

    Kraken is an online distributed brute force password cracking tool. It allows you to parallelize dictionaries and crunch word generator-based cracking across multiple machines both as a web app in a web browser and as a standalone electron-based client. Kraken aims to be easy to use, fault-tolerant and scalable. Kraken is a dockerized application using docker-compose which will launch the db (Postgres), s3-compliant file storage (Minio), the server and the browser client. You can find the...
    Downloads: 17 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next
MongoDB Logo MongoDB