Showing 84 open source projects for "context-shredder"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 1
    File Shredder Express

    File Shredder Express

    Shred your files and folders securely

    This program shreds your files and folders securely and fast. https://github.com/shampuan/File-Shredder-Express
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    Pomerium

    Pomerium

    Pomerium is an identity and context-aware access proxy

    ...Pomerium uses identity and context to ensure secure access to internal applications, servers, and infrastructure even from untrusted networks. Pomerium adds authentication and authorization to any application or server, giving IT Management a centralized panel for organization-wide control. Assert compliance in your current architecture without giving up control over data tenancy.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 3
    World Monitor

    World Monitor

    Real-time global intelligence dashboard

    ...Built primarily with TypeScript and modern web technologies, the project aims to reduce information fragmentation by consolidating hundreds of curated feeds into a single interactive environment. The platform emphasizes geospatial context through features such as interactive maps and a 3D WebGL globe, enabling users to visualize global events dynamically. It incorporates AI-assisted summarization and local LLM support to help users process large volumes of information more efficiently. The application can run as a native desktop app or progressive web app, reflecting a focus on accessibility and offline-capable intelligence workflows. ...
    Downloads: 94 This Week
    Last Update:
    See Project
  • 4
    NanoClaw

    NanoClaw

    A lightweight alternative to Clawdbot / OpenClaw

    ...The project connects directly to WhatsApp, letting you deploy an assistant that can chat in a familiar interface while still supporting real agent behaviors instead of simple call-and-response prompts. It includes memory so the assistant can retain important context across interactions, enabling more consistent follow-through on ongoing tasks. It also supports scheduled jobs, making it suitable for recurring reminders, periodic automations, and timed workflows without needing an external orchestrator.
    Downloads: 5 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    Cerbos

    Cerbos

    Cerbos is the open core, language-agnostic authorization solution

    ...Focus on delivering exceptional products, not maintaining the authorization infrastructure. Context-aware role definitions and attribute-based access control. Implement adaptable, granular security policies that exceed standard role-based access control.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    BeEF

    BeEF

    The browser exploitation framework project

    ...Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors. Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. BeEF will hook one or more web browsers and use them as beachheads for launching directed command modules and further attacks against the system from within the browser context.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Gpg4win

    Gpg4win

    GnuPG for Windows

    Gpg4win is the official Windows distribution of the GnuPG encryption ecosystem, providing an accessible graphical environment for secure email and file protection. It packages the GnuPG engine together with user-friendly tools such as certificate management utilities, Windows Explorer integration, and Outlook plugins, enabling encryption workflows without requiring command-line expertise. The suite supports both OpenPGP and S/MIME standards, allowing organizations and individuals to secure...
    Downloads: 33 This Week
    Last Update:
    See Project
  • 8
    Mitaka

    Mitaka

    Browser extension for fast OSINT searches and IOC investigation

    ...Instead of manually copying and pasting suspicious indicators into multiple intelligence platforms, users can simply highlight a value on any webpage and access multiple OSINT services through a context menu. Mitaka automatically detects the type of indicator and generates appropriate search options for relevant threat intelligence services. Mitaka also includes a refanging capability that converts obfuscated indicators, such as example[.]com or hxxp://example.com, into valid formats that can be analyzed immediately.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    Tetragon

    Tetragon

    eBPF-based Security Observability and Runtime Enforcement

    Tetragon is a flexible Kubernetes-aware security observability and runtime enforcement tool that applies policy and filtering directly with eBPF, allowing for reduced observation overhead, tracking of any process, and real-time enforcement of policies. Observe the complete lifecycle of every process on your machine with Kubernetes context awareness. Translate high-level policies for file monitoring, network observability, container security, and more into low-overhead eBPF programs. Synchronous monitoring, filtering, and enforcement completely in the kernel with eBPF.
    Downloads: 5 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 10
    Dunst

    Dunst

    Lightweight and customizable notification daemon

    Dunst is a lightweight replacement for the notification daemons provided by most desktop environments. It’s very customizable, isn’t dependent on any toolkits, and therefore fits into those window manager-centric setups we all love to customize to perfection. Customize fonts, icons, timeouts, and more. Are you unhappy with the default shortcuts and colors? No worries, you can change these all with a simple configuration file tweak. Change the look or behavior of notifications matching a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Wfuzz

    Wfuzz

    Web application fuzzer

    Wfuzz provides a framework to automate web applications security assessments and could help you to secure your web applications by finding and exploiting web application vulnerabilities. Wfuzz it is based on a simple concept: it replaces any reference to the FUZZ keyword by the value of a given payload. A payload in Wfuzz is a source of data. This simple concept allows any input to be injected in any field of an HTTP request, allowing to perform complex web security attacks in different web...
    Downloads: 17 This Week
    Last Update:
    See Project
  • 12
    ezXSS

    ezXSS

    ezXSS is an easy way for penetration testers and bug bounty hunters

    ezXSS is an open-source XSS (Cross-Site Scripting) testing platform designed to help security researchers identify and collect XSS vulnerabilities. It acts as a payload receiver and logger, storing details about triggered XSS attacks such as the user agent, cookies, DOM, and referrer. This tool is highly useful in bug bounty hunting and penetration testing for monitoring and documenting XSS vectors in real-time.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    OpenCTI

    OpenCTI

    Open Cyber Threat Intelligence Platform

    ...It provides a modern web application backed by a GraphQL API and a data model aligned with the STIX2 standard to ensure interoperability across the threat intelligence ecosystem. The platform enables teams to correlate technical indicators such as observables and TTPs with higher-level context like attribution and victimology, creating a unified intelligence knowledge base. OpenCTI is built to integrate with external tools including MISP, TheHive, and MITRE ATT&CK, allowing it to function as a central intelligence hub in security operations. Its design emphasizes traceability by linking intelligence objects back to their original sources and tracking confidence levels and temporal metadata.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 14
    Mobile Verification Toolkit

    Mobile Verification Toolkit

    Helps with conducting forensics of mobile devices

    Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices. It has been developed and released by the Amnesty International Security Lab in July 2021 in the context of the Pegasus project along with a technical forensic methodology and forensic evidence. MVT is a forensic research tool intended for technologists and investigators. Using it requires understanding the basics of forensic analysis and using command-line tools. This is not intended for end-user self-assessment. If you are concerned with the security of your device please seek expert assistance. ...
    Downloads: 33 This Week
    Last Update:
    See Project
  • 15
    Robin

    Robin

    AI-powered tool for dark web OSINT search and investigation

    ...The tool helps refine investigative queries, collect results from multiple dark web sources, and filter relevant intelligence using AI-driven processing. Robin also performs scraping of discovered pages through Tor sessions, allowing users to gather additional context from dark web sites while maintaining the required network routing. By integrating AI models, the platform can interpret results, highlight key information, and produce summaries that help analysts understand findings faster. The project provides a modular architecture separating search, scraping, and AI processing components so it can be extended with new data sources.
    Downloads: 19 This Week
    Last Update:
    See Project
  • 16
    Checkov

    Checkov

    Prevent cloud misconfigurations during build-time for Terraform

    ...Scan cloud resources in build-time for misconfigured attributes with a simple Python policy-as-code framework. Analyze relationships between cloud resources using Checkov’s graph-based YAML policies. Execute, test, and modify runner parameters in the context of a subject repository CI/CD and version control integrations.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 17
    Global Threat & Event Intelligence Map

    Global Threat & Event Intelligence Map

    Interactive map for exploring global conflicts & geopolitical threats

    GlobalThreatMap is an open source web application designed to visualize geopolitical events, conflicts, and military activity around the world on an interactive map. It helps users explore ongoing wars, international tensions, military base locations, and historical conflict data across different countries. It aggregates and processes global event information and presents it geographically so users can quickly understand where significant geopolitical developments are occurring....
    Downloads: 9 This Week
    Last Update:
    See Project
  • 18
    Boulder

    Boulder

    An ACME-based certificate authority, written in Go

    ...The ACME protocol allows the CA to automatically verify that an applicant for a certificate actually controls an identifier, and allows domain holders to issue and revoke certificates for their domains. Boulder is the software that runs Let's Encrypt. This component model lets us separate the function of the CA by security context. The Web Front End, Validation Authority, OCSP Responder and Publisher need access to the Internet, which puts them at greater risk of compromise. The Registration Authority can live without Internet connectivity, but still needs to talk to the Web Front End and Validation Authority. The Certificate Authority need only receive instructions from the Registration Authority. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    pompelmi

    pompelmi

    Minimal Node.js wrapper around ClamAV

    ...It is designed to support local or remote model backends, allowing users to choose between privacy-focused local execution or cloud-based services. Pompelmi also includes features for managing conversations, enabling users to maintain context and revisit previous interactions. Its lightweight architecture ensures that it can run efficiently without requiring significant resources. Overall, Pompelmi provides a straightforward entry point for users looking to interact with AI systems without dealing with complex configurations.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    WhatBreach

    WhatBreach

    OSINT tool for discovering email addresses in known data breaches

    ...It gathers breach information from various sources and APIs to identify where the email has been exposed in leaked databases or online paste sites. Once breaches are discovered, WhatBreach can provide additional context such as the databases associated with those leaks and any related paste dumps containing the email address. If the breach databases are publicly available, the tool can attempt to download them for further analysis. It also supports deeper investigation of email domains and related profiles, making it useful for researchers, security analysts, and penetration testers conducting reconnaissance or breach analysis.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 21
    RedAmon

    RedAmon

    AI-powered framework for automated penetration testing and red teaming

    RedAmon is an AI-powered red team framework designed to automate offensive cybersecurity operations from reconnaissance to exploitation and post-exploitation. It combines artificial intelligence with traditional penetration testing tools to create a fully autonomous pipeline capable of discovering vulnerabilities and executing security assessments without human intervention. It begins with a multi-phase reconnaissance engine that maps the entire attack surface of a target, collecting...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22
    tirith

    tirith

    Your browser catches homograph attacks

    ...It targets real-world attack classes like Unicode homograph URLs (lookalike domains), terminal injection tricks (ANSI escape sequences and bidi overrides), and “pipe-to-shell” installation patterns such as curl | bash that attackers frequently abuse. The project emphasizes local-only analysis with no telemetry and no background daemons, so it can run offline and keep sensitive command context on-device. It integrates into popular shells via hooks (zsh, bash, fish, and PowerShell), including paste-aware protections so hidden characters or malicious rewrites get caught at the moment they enter the terminal.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    Latte

    Latte

    The safest & truly intuitive templates for PHP

    ...It can modify the page, obtain sensitive information or even steal the user's identity. Templating systems fail to defend against XSS. Latte is the only system with an effective defense, thanks to context-sensitive escaping. Latte is based on PHP, whereas Twig is based on Python. A designer in Latte doesn't have to constantly switch between two different conventions. Stay in touch. The plugin for Tracy informs you on each page which templates and which variables are being rendered. Latte has native support in NetBeans and an excellent plugin for PhpStorm that suggests tags, filters and PHP code. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Claude Code Security Reviewer

    Claude Code Security Reviewer

    An AI-powered security review GitHub Action using Claude

    The claude-code-security-review repository implements a GitHub Action that uses Claude (via the Anthropic API) to perform semantic security audits of code changes in pull requests. Rather than relying purely on pattern matching or static analysis, this action feeds diffs and surrounding context to Claude to reason about potential vulnerabilities (e.g. injection, misconfigurations, secrets exposure, etc). When a PR is opened, the action analyzes only the changed files (diff-aware scanning), generates findings (with explanations, severity, and remediation suggestions), filters false positives using custom prompt logic, and posts comments directly on the PR. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    ThreatMapper

    ThreatMapper

    Open source cloud native security observability platform

    Thousands of companies trust Deepfence to secure their most critical cloud workloads and applications with a unified platform. Experience rapid threat detection and remediation, while significantly reducing non-critical security alerts by 90%. Deepfence ThreatMapper hunts for threats in your production platforms, and ranks these threats based on their risk of exploit. It uncovers vulnerable software components, exposed secrets, and deviations from good security practices. ThreatMapper uses a...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next
MongoDB Logo MongoDB