Showing 55 open source projects for "query"

View related business solutions
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    More flexibility. More control.

    Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1
    Damn Vulnerable GraphQL Application

    Damn Vulnerable GraphQL Application

    Vulnerable implementation of Facebook's GraphQL technology

    Damn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security. DVGA has numerous flaws, such as Injections, Code Executions, Bypasses, Denial of Service, and more. See the full list under the Scenarios section. A public Postman collection is also available to replay solutions to the challenges. DVGA supports Beginner and Expert level game modes, which will change the exploitation difficulty.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    PDFRip

    PDFRip

    A multi-threaded PDF password cracking utility

    A multi-threaded PDF password cracking utility equipped with commonly encountered password format builders and dictionary attacks. pdfrip is a fast multithreaded PDF password cracking utility written in Rust with support for wordlist-based dictionary attacks, date and number range bruteforcing, and a custom query builder for password formats. You can write your own queries like STRING{69-420} with the -q option which would generate a wordlist with the full number range. You can pass in an year as the input with the -d option which would bruteforce all 365 days of the year in DDMMYYYY format which is a pretty commonly used password format for PDFs. ...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 3
    Alertmanager

    Alertmanager

    Prometheus Alertmanager

    The Alertmanager handles alerts sent by client applications such as the Prometheus server. It takes care of deduplicating, grouping, and routing them to the correct receiver integrations such as email, PagerDuty, or OpsGenie. It also takes care of silencing and inhibition of alerts. Precompiled binaries for released versions are available in the download section on prometheus.io. Using the latest production release binary is the recommended way of installing Alertmanager. The current...
    Downloads: 43 This Week
    Last Update:
    See Project
  • 4
    Toutatis

    Toutatis

    Extract public Instagram account information from usernames

    Toutatis is an open source command-line tool designed to extract publicly available information from Instagram accounts. It helps users gather various data points from a target profile by querying Instagram using a username or account ID. The tool can retrieve details such as profile metadata, follower counts, biography information, and other publicly accessible account attributes. In addition to basic profile data, Toutatis can also reveal contact details that may be publicly exposed,...
    Downloads: 31 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 5
    Terrascan

    Terrascan

    Detect compliance and security violations across Infrastructure

    ...Terracan provides 500+ out-of-the-box policies so that you can scan IaC against common policy standards such as the CIS Benchmark. It leverages the Open Policy Agent (OPA) engine so that you can easily create custom policies using the Rego query language. Monitor provisioned cloud infrastructure for configuration changes that introduce posture drift, and enables reverting to a secure posture. Detect security vulnerabilities and compliance violations.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 6
    Osquery

    Osquery

    SQL operating system instrumentation and monitoring framework

    ...Osquery uses basic SQL commands to leverage a relational data-model to describe a device. Frequently, attackers will leave a malicious process running but delete the original binary on disk. This query returns any process whose original binary has been deleted, which could be an indicator of a suspicious process.
    Downloads: 22 This Week
    Last Update:
    See Project
  • 7
    Robin

    Robin

    AI-powered tool for dark web OSINT search and investigation

    Robin is an AI-powered open source tool designed to assist investigators and researchers in conducting dark web OSINT (Open Source Intelligence) investigations. It combines automated dark web search capabilities with large language models (LLMs) to analyze and summarize information discovered across hidden services and Tor-based search engines. The tool helps refine investigative queries, collect results from multiple dark web sources, and filter relevant intelligence using AI-driven...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 8
    uncover

    uncover

    Discover exposed internet hosts using multiple search engine APIs

    Uncover is an open source reconnaissance tool designed to quickly discover exposed hosts on the internet by querying multiple search engine APIs through a unified interface. It acts as a Go-based wrapper around well-known internet intelligence platforms, allowing users to gather information about publicly accessible systems from a single command-line tool. By integrating with services such as Shodan, Censys, FOFA, ZoomEye, and others, the tool enables security professionals to efficiently...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 9
    Apiato

    Apiato

    PHP Framework for building scalable API's on top of Laravel

    ...Authentication with OAuth2.0 for first/third-party clients (using Laravel Passport). Role-Based Access Control (RBAC), seeded with a Super Admin, Roles, and Permissions. Query Parameters support (orderBy, sorted, and filter) with full-text search. Useful Endpoints for managing users, roles/permissions, tokens, and more. API Documentations generator, to generate API docs from PHP Docblock using ApiDocJS (provided by Documentation Container). Supports CORS (Cross-Origin Resource Sharing) and JSONP (JSON with padding). ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • 10
    SiteDorks

    SiteDorks

    Automate search engine dorking across hundreds of websites

    ...It allows users to perform search engine “dork” queries against a large set of predefined domains, making it easier to discover publicly available information across different platforms. SiteDorks supports several major search engines including Google, Bing, Brave, Ecosia, DuckDuckGo, Yahoo, and Yandex. Instead of manually running the same query for many sites, SiteDorks generates and executes the queries automatically using lists of “dorkable” websites. A built-in dataset contains hundreds of websites grouped into categories such as cloud services, developer platforms, documentation sites, social platforms, and communication tools. Users can also supply custom domain lists or CSV files to tailor searches for tasks like penetration testing, bug bounty research, or OSINT investigations.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    gitGraber

    gitGraber

    Real-time GitHub monitor that detects leaked API keys and secrets

    gitGraber is a Python-based security tool designed to monitor GitHub in real time to detect exposed sensitive information in publicly indexed repositories. It scans recently indexed files on GitHub and searches for patterns that may indicate leaked credentials, API keys, or other confidential data used by popular online services. Instead of analyzing the full history of repositories, the tool focuses on newly indexed content, allowing security researchers and bug bounty hunters to quickly...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    MemGuard

    MemGuard

    Secure software enclave for storage of sensitive information in memory

    ...Sensitive data is encrypted and authenticated in memory with XSalsa20Poly1305. The scheme used also defends against cold-boot attacks. Memory allocation bypasses the language runtime by using system calls to query the kernel for resources directly. This avoids interference from the garbage collector. Buffers that store plaintext data are fortified with guard pages and canary values to detect spurious accesses and overflows. The effort is taken to prevent sensitive data from touching the disk. This includes locking memory to prevent swapping and handling core dumps. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    Harpoon

    Harpoon

    Command line OSINT and threat intelligence automation tool

    Harpoon is a command line tool designed to assist with open source intelligence (OSINT) and threat intelligence investigations. It helps security professionals and researchers collect and analyze publicly available information from a wide range of online sources. Harpoon is written in Python and organized around a modular plugin system, where each plugin is responsible for querying a specific platform, API, or intelligence service. This design allows users to automate many reconnaissance and...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    IVRE

    IVRE

    Open source framework for large scale network reconnaissance and analy

    ...IVRE stores the collected data in a database and offers multiple ways to explore and analyze it, including a web interface, command line tools, and a Python API. This allows security professionals to query scan results, inspect network flows, and identify patterns across large datasets. The project can be used to build self hosted alternatives to internet scanning services such as Shodan or Censys, giving organizations full control over their own reconnaissance infrastructure.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    sqlmap

    sqlmap

    Automatic SQL injection and database takeover tool

    sqlmap is a powerful, feature-filled, open source penetration testing tool. It makes detecting and exploiting SQL injection flaws and taking over the database servers an automated process. sqlmap comes with a great range of features that along with its powerful detection engine make it the ultimate penetration tester. It offers full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, and many other database management systems. It also...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 16
    Greenplum Database

    Greenplum Database

    Massive parallel data platform for analytics, machine learning and AI

    Rapidly create and deploy models for complex applications in cybersecurity, predictive maintenance, risk management, fraud detection, and many other areas. With its unique cost-based query optimizer designed for large-scale data workloads, Greenplum scales interactive and batch-mode analytics to large datasets in the petabytes without degrading query performance and throughput. Based on PostgreSQL, Greenplum provides you with more control over the software you deploy, reducing vendor lock-in, and allowing open influence on product direction. ...
    Downloads: 16 This Week
    Last Update:
    See Project
  • 17
    ESignPDF

    ESignPDF

    Sign PDF with Digital Signature Certificate

    ...endpoint=zulu&uuid=f0851b11-f391-43b0-ae80-4a29f9cc8c9f -> Download ESignPDF jar file -> Double click on downloaded file -> Follow displayed instructions -> Get signed PDF You can request to concerned certificate authority for obtaining Digital Signature Certificate ( DSC ) file despite of USB token if you have any query, then mail me at parvesh.garg@outlook.com
    Downloads: 6 This Week
    Last Update:
    See Project
  • 18
    OnionSearch

    OnionSearch

    Search multiple Tor .onion engines at once and collect hidden links.

    ...It also offers flexible command-line options that allow users to limit results, choose which engines to query, and export collected data. By automating searches across several dark web search engines, OnionSearch simplifies the process of discovering information on hidden services.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 19
    Openblocks

    Openblocks

    The Open Source Retool Alternative

    It's cumbersome to create a single app. You had to design user interfaces, write code in multiple languages and frameworks, and understand how all of that code works together. Low-code/No-code platforms are fast to get started with but quickly become unmaintainable and inflexible. This creates more problems than it solves. Retool-like solutions are great for their simplicity and flexibility, but they can also be limited in different ways compared to frameworks like React/Vue. An all-in-one...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Adldap2

    Adldap2

    LDAP Authentication & Management for Laravel

    Adldap2-Laravel is an extension to the core Adldap2 package. Using the built-in authentication driver, easily allow LDAP users to log into your application and control which users can login via Scopes and Rules. Users can be imported into your database upon first login, or you can import your entire directory via a simple command: php artisan adldap:import. Search for LDAP records with a fluent and easy-to-use interface you're used to. You'll feel right at home. LDAP records are returned as...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 21
    Shield GraphQL

    Shield GraphQL

    A GraphQL tool to ease the creation of permission layer

    ...Shield lets you create a handful of rules and compose them into meaningful structures using logical operators. To prevent recalculation of rules, every rule caches its result based on selected caching mechanism and speeds up query execution. Shield generates a type-map from your schema to make sure you have assigned your rules to the right places.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Bilibili Helper

    Bilibili Helper

    Auxiliary tool that can replace the player, push notifications, etc.

    Bilibili (bilibili.com) Auxiliary tool that can replace the player, push notifications and perform some shortcut operations. Bilibili (bilibili.com) is an auxiliary tool that can download videos, query the sender of the barrage, and some very useful live broadcast area functions. An auxiliary extension for Bilibili (bilibili.com) which allows users to bypass playback restrictions, replace video players and use shortcuts. Starting from a certain version, Bilibili Assistant uses special technical methods to realize the unlocking function of regional restrictions. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    PiracyChecker

    PiracyChecker

    An Android library that prevents your app from being pirated

    ...Google Play offers a licensing service that lets you enforce licensing policies for applications that you publish on Google Play. With Google Play Licensing, your application can query Google Play to obtain the licensing status for the current user. Any application that you publish through Google Play can use the Google Play Licensing service. No special account or registration is needed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Luci App For Clash

    Luci App For Clash

    Luci interface for Clash Openwrt

    A rule-based custom proxy client for Openwrt based on Clash.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 25
    Windows Defender Central v0.5

    Windows Defender Central v0.5

    Windows Defender Central

    ...It is in BETA state, but it is usable. It works only with Windows 10 Defenders. Updated the code: it is now compatible with build 2004 and it uses multithreading to query the machines. It uses PowerShell and SysInternalsSuite(PsExec.exe) to gather the information and it stores the data in a shared network drive (what the computers can access and have write access). It can store the data locally, if needed. What are the "computer name" background colors? -White: idle -Green: querying state -Pink: any other action besides querying -Red: one or more protections are disabled It can't show color on the highlighted row... ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next
MongoDB Logo MongoDB