Showing 16 open source projects for "av"

View related business solutions
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 1
    UACMe

    UACMe

    Defeating Windows user account control

    ...This tool shows ONLY popular UAC bypass method used by malware, and re-implement some of them in a different way improving original concepts. There are different, not yet known to the general public, methods. This tool is not intended for AV tests and not tested to work in aggressive AV environment, if you still plan to use it with installed bloatware AV soft, use it at your own risk.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 2
    Maltrail

    Maltrail

    Malicious traffic detection system

    Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user-defined lists, where trail can be anything from domain name, URL, IP address (e.g. 185.130.5.231 for the known attacker) or HTTP User-Agent header value (e.g. sqlmap for automatic SQL injection and database takeover tool). Also, it uses (optional) advanced heuristic mechanisms that can help in the discovery of unknown threats (e.g. new malware). ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Securepoint Squid eCAP Antivirus adapter

    Securepoint Squid eCAP Antivirus adapter

    Antivirus eCAP adapter for Squid 3.1 and above.

    Securepoint Antivirus eCAP adapter for Squid 3.1 and above.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Thunderbird Anti Virus v3.5

    Thunderbird Anti Virus v3.5

    Thunderbird Anti Virus Free Scanner v3.5

    ...Complemented by the new Live I/O Telemetry, users can monitor data throughput (KB/s) in real-time, identifying anomalous activity instantly. Whether performing a Deep System Audit or a targeted Memory Analysis, Thunderbird AV operates with a minimal CPU footprint, ensuring your hardware performance remains uncompromised.
    Downloads: 14 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5
    Thunderbird Anti Virus 3.4

    Thunderbird Anti Virus 3.4

    Thunderbird Anti Virus Free Scanner v3.4

    Thunderbird Anti-Virus v3.4 | Heuristic Security & Network Intelligence Suite Thunderbird Anti-Virus v3.4 is a high-performance security framework engineered for low-latency environment protection and real-time threat mitigation. Designed with a focus on resource efficiency and transparent operations, Thunderbird AV provides a robust alternative to bloated security suites, offering a surgical approach to malware detection and system auditing. The v3.4 architecture integrates an advanced Heuristic Analysis Engine capable of deep-memory inspection and multi-tier file system scanning. This version debuts the Integrated Network Shield, a native firewall module that allows for instantaneous perimeter control. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 6

    Thunderbird Anti Virus 3.3

    Thunderbird Anti Virus Free Scanner v3.3

    Thunderbird Anti Virus v3.3 – AI-Powered Intelligence & Real-Time Security Thunderbird AV is a next-generation security suite designed to offer proactive protection through advanced heuristics and artificial intelligence. Version 3.3 introduces optimized scanning algorithms that work alongside a clean, high-performance architecture to ensure your system remains secure and responsive. Key Features: AI-Enhanced Scanning: Beyond traditional signatures, our engine utilizes AI-driven heuristics to identify suspicious patterns in Memory, Quick, and Full System scans. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    BypassHash

    BypassHash

    This tool downloads an executable and bypasses hash-based virus checks

    This tool downloads an executable, ELF (Linux) and PE (Windows), modify metadata to bypasses hash-based virus checks and protect against identification with metadata (like rich headers, timestamps, ...).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Thunderbird Anti Virus 3.2

    Thunderbird Anti Virus Free Scanner v3.2

    ...Smart Quarantine: Safely isolates suspicious files, preventing infection while allowing users to manage potential risks with ease. Ultra-Light Footprint: Built for performance, Thunderbird AV 3.2 operates silently in the background, ensuring your gaming or work sessions remain uninterrupted.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    Chromepass

    Chromepass

    Hacking Chrome Saved Passwords

    ...Decrypt Google Chrome, Chromium, Edge, Brave, Opera and Vivaldi saved paswords and cookies. Send a file with the login/password combinations and cookies remotely (http server or email) Undetectable by AV if done correctly. Custom icon, custom error message, customize port. The new client build methodology practically ensures a 0% detection rate, even without AV-evasion tactics. If this becomes false in the future, some methods will be implemented to improve AV evasion. The dependencies are checked and installed automatically, so you can just skip to Usage. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 10
    SHAD0W

    SHAD0W

    A post exploitation framework designed to operate covertly

    It uses a range of methods to evade EDR and AV while allowing the operator to continue using tooling and tradecraft they are familiar with. Its powered by Python 3.8 and C, and uses Donut for payload generation. By using Donut along with the process injection capabilities of SHAD0W, it provides the operator the ability to execute .NET assemblies, DLLs, EXEs, JS, VBS or XSLs fully inside the memory.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Windows Defender Central v0.5

    Windows Defender Central v0.5

    Windows Defender Central

    A very basic centralized management for Windows Defenders. It is in BETA state, but it is usable. It works only with Windows 10 Defenders. Updated the code: it is now compatible with build 2004 and it uses multithreading to query the machines. It uses PowerShell and SysInternalsSuite(PsExec.exe) to gather the information and it stores the data in a shared network drive (what the computers can access and have write access). It can store the data locally, if needed. What are the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    venom - shellcode generator

    venom - shellcode generator

    msfvenom shellcode generator/compiler/listenner

    .... -- 'shellcode generator' tool reproduces some of the technics used by Veil-Evasion framework, unicorn.py, powersploit, etc,etc,etc.."P.S. some payloads are undetectable by AV soluctions yes!!!" one of the reazons for that its the use of a funtion to execute the 2º stage of shell/meterpreter directly into targets ram.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    php-clamav
    PHP ClamAV - ClamAV Interface for PHP5 Scripts PHP-ClamAV is a PHP5 extension that allows to incorporate virus scanning features on your PHP5 scripts. It uses the Clam AV API for virus scanning.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    J.L Antivirus
    J.L antivirus is a free antivirus with Real-Time protection, powerful scanner and big database. Created in VB.NET +WARNING+ This AV is not for everyday use, so I dont responsible for risks and threats.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    An Antispyware Application with optional realtime protection. Perfect for complimenting your existing AV!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    snavtclient is free open source network client program for CCTV security surveillance digital video recorders (DVR) manufactured by the AV TECH Corporation. For more information please see software web site: http://snavtclient.epipe.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB