Showing 20 open source projects for "android root check"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    GitHub Action to detect license names

    GitHub Action to detect license names

    GitHub Action for license compliance: Python, JavaScript, iOS, Android

    Check CSV file generated by JavaScript license-checker package. Check JSON file generated by Android gradle-license-plugin package. Check Plist file generated by iOS cocoapods-acknowledgments package. Allows to check license types for JavaScript, Java or any other dependencies with known licenses in one of the supported file formats. CSV files with package name and license name columns (detect license type).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Brook

    Brook

    Brook is a cross-platform strong encryption and not detectable proxy

    Brook is a cross-platform strong encryption and not detectable proxy. Brook's goal is to keep it simple, stupid and not detectable. You can run commands after entering the command-line interface. Usually, everyone uses the command line interface on Linux servers. Of course, Linux also has desktops that can also run GUI. Of course, macOS and Windows also have command-line interfaces, but you may not use them frequently. Usually, the applications opened by double-clicking/clicking on...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    Keybase client

    Keybase client

    Keybase Go library, client, service, OS X, iOS, Android, Electron

    Keybase is secure messaging and file-sharing. We use public key cryptography to ensure your messages stay private. Even we can’t read your chats. Keybase works for families, roommates, clubs, and groups of friends, too. Keybase connects to public identities, too. You can connect with communities from Twitter, Reddit, and elsewhere. Don’t live dangerously when it comes to documents. Keybase can store your group’s photos, videos, and documents with end-to-end encryption. You can set a timer on...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    EMAGNET

    EMAGNET

    Automated hacking tool to find leaked databases with 97.1% accuracy

    Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password. Before using Emagnet, please remember that with great power comes great responsibility. Pastebin patched the vulnerability I previously used in order to get recent uploads, so at the moment it is not possible to get recently uploaded files, you are now limited to all syntaxes exempt the default one (95% get's uploaded as 'text' and this is removed from all recent upload lists). Bruteforce...
    Downloads: 10 This Week
    Last Update:
    See Project
  • Secure File Transfer for Windows with Cerberus by Redwood Icon
    Secure File Transfer for Windows with Cerberus by Redwood

    Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.

    Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
    Try for Free
  • 5
    Ghost of Death
    Ghost of Death is an app to spoof your OS. It's meant to spoof scanning apps, like nmap or Metasploit. You must be admin/root. 2-28-26: Addressed a couple of bugs. Totally reworked Linux version. This app won't get a perfect match in the spoof, but it won't let them know your OS. 3-1-26: Tweaked on the Linux version some more. 3-2-26: That last Linux version was messed up, new one works, theoretically. 3-3-26: After much labor it's done. It has Windows, Mac and Android now. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    PasswdSafe
    Port of the Password Safe application to Android
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7

    System Hardening Benchmark

    System Hardening Compliance Auditor

    This tool simulates a security compliance audit, checking system configurations against a defined benchmark (e.g., DISA STIG or CIS).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
     In-Browser-File-Encrypter

    In-Browser-File-Encrypter

    The source code of the In-Browser-File-Encrypter web app

    The In-Browser File Encrypter is a simple web application that enables you to securely encrypt your files directly in your browser using the AES-256 encryption algorithm in CBC mode. Check it out at: https://codepen.io/Northstrix/pen/xxvXvJL and https://northstrix.github.io/In-Browser-File-Encrypter/V1.0/web-app.html GitHub page: https://github.com/Northstrix/In-Browser-File-Encrypter The download shortcut:...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Plum Harbor

    Plum Harbor

    An open-source file sharing app built using Next.js and Perplexity.

    An open-source file sharing app built using Next.js and Perplexity. The app employs ML-KEM-1024, ChaCha20, Serpent-256, and HMAC-SHA512 to ensure data confidentiality and integrity. The app is also equipped with a dedicated password vault. Check it out at https://plum-harbor.netlify.app/ GitHub page: https://github.com/Northstrix/plum-harbor Codeberg page: https://codeberg.org/Northstrix/plum-harbor The app is available in English and Hebrew. German version is available...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 10
    Udp2raw-tunnel

    Udp2raw-tunnel

    Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic

    ...Nevertheless, if you used udp2raw + any UDP-based VPN together, you can tunnel any traffic(include TCP/UDP/ICMP), currently, OpenVPN/L2TP/ShadowVPN and tinyfecVPN are confirmed to be supported. Linux host (including desktop Linux,Android phone/tablet,OpenWRT router,or Raspberry PI) with root account or cap_net_raw capability. ICMP/FakeTCP headers help you bypass UDP blocking, UDP QOS or improper UDP NAT behavior on some ISPs. In ICMP header mode,udp2raw works like an ICMP tunnel. UDP headers are also supported. In UDP header mode, it behaves just like a normal UDP tunnel, and you can just make use of the other features (such as encryption, anti-replay, or connection stalization).
    Downloads: 12 This Week
    Last Update:
    See Project
  • 11
    Exposure Notifications Server

    Exposure Notifications Server

    Exposure Notification Reference Server | Covid19 Exposure Notification

    Exposure Notifications Server is an open source reference implementation developed by Google to support the COVID-19 Exposure Notifications API, designed for use by public health authorities around the world. The server provides a secure and privacy-preserving backend system that enables governments and organizations to deploy exposure notification applications for Android and iOS devices. It handles essential backend functions, including receiving and validating temporary exposure keys from users who have tested positive, storing those keys, and generating downloadable key files for mobile devices to check for potential exposure matches. The system integrates cryptographic signing for authenticity, supports configurable data retention policies, and ensures user privacy by design—no personally identifiable information is stored or transmitted. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    SecurePIS

    SecurePIS

    Encrypted Personal Information System

    A fast and lightweight end to end encrypted Personal Information System. It has easy to use check-in/check-out functionality, tracks the history of every updates on each database entry, it supports secure attachments of digital files like images and audio/video, and most of all the database is secured by industry standard encryption technologies. Very intuitive and easy to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    PermissionsDispatcher

    PermissionsDispatcher

    A declarative API to handle Android runtime permissions

    PermissionsDispatcher provides a simple annotation-based API to handle runtime permissions. This library lifts the burden that comes with writing a bunch of check statements whether permission has been granted or not from you, in order to keep your code clean and safe. PermissionsDispatcher introduces only a few annotations, keeping its general API concise. Annotate a method that explains why the permissions are needed. It passes in a PermissionRequest object which can be used to continue or...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Wi-PWN

    Wi-PWN

    ESP8266 firmware for performing deauthentication attacks

    ESP8266 firmware for performing deauthentication attacks, with ease. Wi-PWN is a firmware that performs death attacks on cheap Arduino boards. The ESP8266 is a cheap microcontroller with built-in Wi-Fi. It contains a powerful 160 MHz processor and it can be programmed using Arduino. A deauthentication attack is often confused with Wi-Fi jamming, as they both block users from accessing Wi-Fi networks. The 802.11 Wi-Fi protocol contains a so-called deauthentication frame. It is used to...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 15
    PushSharp

    PushSharp

    A server-side library for sending Push Notifications to iOS

    ...The goal is to simplify things and focus on the core functionality of the library, leaving things like constructing valid payloads up to the developer. For APNS you will also need to occasionally check with the feedback service to see if there are any expired device tokens you should no longer send notifications to.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ...;) Please check MD5 after Download. You can find this on the official site of this project (german). You can find a link to this very simple site below. How to start: -------- Windows: double-click on CryptolinN.exe -------- Linux: sh CryptolinN.sh OR FIRST chmod +x CryptolinN.sh THAN ./CryptolinN.sh -------- Console: java -jar CryptolinN.exe --help N = version number
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Penetration-Testing-Toolkit v1.0

    A web interface for various penetration testing tools

    Penetration-Testing-Toolkit is a web based project to automate Scanning a network,Exploring CMS, Generating Undectable metasploit payload, DNS-Queries, IP related informations, Information Gathering, Domain related info etc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    SMS and Call Filter

    SMS and Call Filter

    'SMS and Call Filter' can filter sms based on trained data set.

    'SMS and Call Filter' filters sms based on trained data set. Can efficiently block promotional sms from GP, Banglalink, Teletalk, Airtel, Robi any many more. It blocks incoming call with caller id less than 6 digits. You can just install and use this app. You can also add your own sms blocking rule. All your blocked sms will be saved in the database, you can see them and easily delete or restore to inbox. Important Notes: 1. If this app 'thinks' a message is spam, that doesn't mean that...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    SecuXabber

    SecuXabber

    A secure Jabber-client for Android using strong encryption

    SecuXabber is a secure Jabber-client for Android that bases on Xabber and uses a strong, asymmetric enryption that works on top of the XMPP protocol. A key pair is generated on application start-up. Users can send their public key to other SecuXabber users via Bluetooth. This ensures the origin of the public key because people do a face-to-face check during key exchange. After the keys are imported by both users, all communication between them is done fully encrpyted using a strong 4096 bit end-to-end encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Tested Devices : 1.Samsung Galaxy Y 2.Samsung Galaxy Y Duos Procedure : 1.copy both files in root of memory card 2.Insert that memory card in your android device 3.Now switch off your device 4.Now press volume up + power + home button together to start recovery mode 5.In this mode touch will not work so navigate using volume up and down keys and select using home button 6.Now select ‘update zip from sd card’ 7.Now select 'cwm.zip' 8.Yellow coloured menu will appear 9.Select ‘install zip from sd card’ 10.Then select ‘choose zip from sd card’ 11.Select ‘ delete_passward.zip’ 12.Now select ‘yes’ 13.Then the process will complete after some time 14.Now press back and select ‘Reboot Device’ 15.Now Draw Any pattern your device will unlock 16.Now to set new pattern lo
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB