Showing 38 open source projects for "system info"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
    Get started free
  • 1
    wolfSSL
    ... by the robust wolfCrypt cryptography library, and much more. wolfSSL relies on the FIPS 140-2 validated wolfCrypt library for all cryptographic functionality. Visit http://wolfssl.com/wolfSSL/fips.html for more info!
    Downloads: 12 This Week
    Last Update:
    See Project
  • 2
    EncrypIT

    EncrypIT

    Program to quickly and easily encrypt or decrypt files or directories

    Program to quickly and easily encrypt or decrypt files or directories using Encrypting File System (EFS) as well as add and remove domain user EFS permissions to a file. There is also a button to view the info on an encrypted file as well as for backing up a users EFS PFX certificate.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    [LINUX] Pwnagotchi Connection Share

    [LINUX] Pwnagotchi Connection Share

    Simple bash script for connection sharing.

    ...: In order to make that script working you need to follow the commented instructions inside code. For more info: https://pwnagotchi.ai/configuration/#connecting-to-pi0w-with-microusb-cable-on-linux-host *designed for pwnagotchi but works on any raspberry. Telegram: @xNigredo Pwnagotchi Italia: https://t.me/pwnagotchiitalia
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    TraySafe

    TraySafe

    Elegant and reliable profile data storage

    If you're like me and you don't think your passwords are safe as cookies in your browser or any other place for that matter then this is the right app for you. TraySafe's minimalist UI is designed to be shown only in your system tray icons. With it you can copy both your username/email and password using only your left and right mouse buttons. The scroll button is used to delete items from the menu. PIN functionality is included in versions 1.1.0 and above. The serious perk of the app...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Deliver secure remote access with OpenVPN. Icon
    Deliver secure remote access with OpenVPN.

    Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

    OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
    Get started — no credit card required.
  • 5
    eurephia is an authentication and access control plug-in for OpenVPN. It improves authentication by adding user/password auth in addition to certificates. Access control is managed via iptables on Linux servers. See web page for more info
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Wi-PWN

    Wi-PWN

    ESP8266 firmware for performing deauthentication attacks

    ESP8266 firmware for performing deauthentication attacks, with ease. Wi-PWN is a firmware that performs death attacks on cheap Arduino boards. The ESP8266 is a cheap microcontroller with built-in Wi-Fi. It contains a powerful 160 MHz processor and it can be programmed using Arduino. A deauthentication attack is often confused with Wi-Fi jamming, as they both block users from accessing Wi-Fi networks. The 802.11 Wi-Fi protocol contains a so-called deauthentication frame. It is used to...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    360-FAAR  Firewall Analysis Audit Repair

    360-FAAR Firewall Analysis Audit Repair

    360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs

    360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, firewall policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA or ScreenOS commands, and its one file! Read Policy and Logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), Cisco ASA (show run / syslog format), 360-FAAR compares firewall policies and uses...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    cryptomac

    cryptomac

    macchanger automate script

    Automating macchanger tasks for my friend 'crypt0_buf' sutch as: change mac address, set TX-Power, code region settings, signal strength, set network-manager cloned mac address, Build/delete cryptostart init.d startup entry, use arpon software to prevent arp poison attacks (MitM)... WARNING: this script needs the 'startup.txt' file to build cryptostart init.d startup entry (script auto-start)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    OWASP Security Shepherd

    OWASP Security Shepherd

    Web and mobile application security awareness/training platform

    The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
    Learn More
  • 10

    ext2 info hiding mod

    Information Hiding Modification for EXT2

    This modification of the ext2 kernel module allows to create files (cover files) whose block arrangement gets manipulated to represent a binary code, which can be extracted later. The information hiding approach used in this project was introduced by Khan et. al in 'Designing a cluster-based covert channel to evade disk investigation and forensics' (1st approach). Algorithm: When a cover file is written, an even blocknr. (for the 1st datablock) is choosen to represent a 0 or an odd...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    USB 007

    USB 007

    A spy for USB drives.

    The application refers to track what happen with your computer USB ports by which USB drive and when. USB 007 can track it in your presence or absence. After inserting a removable disk such as Pen drive, Memory card, External hard disk etc. USB 007 will track the drive name, drive insertion date-time, drive space info and the file-folders (include hidden) that the drive contains. You will also get the updated info before the drive removed. The 4 more important features...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    myAuxiliary.rb

    myAuxiliary.rb

    msf post-exploitation auxiliary module

    This auxiliary module needs [metasploit] framework installed.. This module its a metasploit post-exploitation (after the targets get's exploited) auxiliary script, so we need to exploit a target first in order to use it. Affected platforms: Windows OS (all versions above windows vista) Read my WIKI for further info: https://sourceforge.net/p/myauxiliarymete/wiki/Home/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    bWAPP

    an extremely buggy web app !

    bWAPP, or a buggy web application, is a free and open source deliberately insecure web application. bWAPP helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities. bWAPP prepares one to conduct successful penetration testing and ethical hacking projects. What makes bWAPP so unique? Well, it has over 100 web bugs! It covers all major known web vulnerabilities, including all risks from the OWASP Top 10 project. The focus is not just on one specific...
    Leader badge
    Downloads: 2,239 This Week
    Last Update:
    See Project
  • 14
    EbolaShell (3) 2.1 update This is not ebola 3, just the update to 2.1 The full 3 (new) will be posted sometime this week. -Ddos with multiple methods -DNS info and reporting -Whois site look up -Port scanner -Site Check ( is it up) (only checks site from server location)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    EbolaShell -Ddos with multiple methods -DNS info and reporting -Whois site look up -Port scanner -Site Check ( is it up) (only checks site from server location)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    EbolaShell -Ddos with multiple methods -DNS info and reporting -Whois site look up -Port scanner -Site Check ( is it up) (only checks site from server location)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Penetration-Testing-Toolkit v1.0

    A web interface for various penetration testing tools

    Penetration-Testing-Toolkit is a web based project to automate Scanning a network,Exploring CMS, Generating Undectable metasploit payload, DNS-Queries, IP related informations, Information Gathering, Domain related info etc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Search Me

    Search Me

    Rich search software for Microsoft windows

    Search Me v1.2.0 ___ 12/10/2014 Search Me software is a windows search utility that let the user find what she/he wants fast. You can customize your search. You can select the size limit, file attribute, and/or file date. .NET 4 is required If you have any questions, feedback, or you want to report a but don't forget to contact me from help menu.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Solak K&D

    Solak K&D

    Pentest Distro - Windows 8 Themed - Hybrid Ubuntu 12.04.4lts / Kali

    ... on a computer that has important info on another partition unless you know what your doing. post-install notes: IMPORTANT INFO: http://0e800.weebly.com/install-notes.html This is the community edition of Solak K&D - more information can be found found here: http://forum.top-hat-sec.com/index.php?topic=4239.0 Please review wiki for latest fixes. I can be contacted by email or found on forum.top-hat-sec.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    ScreenGuard

    Put a vault on your Windows Login screen

    ScreenGuard adds a locked layer to your windows login screen. It can only be unlocked with a unique USB drive and combo. Please see "What's new in this version" for update info. Please note that the "Designed for windows 7" and "Compatible with windows 8" logo's are not part of ScreenGuard. System Requirements : ScreenGuard v1.0 - http://blackboxsoftwares.tk/projects/screenguard-v1.0/ 2.0MB Hard drive space Net framework 4.5 or above Windows 7 or 8 What's new : Emergency Login...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Plinko was originally an experiment with Prefix Trees and log parsing. The general concept is to have a single end point you can send any data to, in a "fire and forget" fashion. Plinko should identify and parse the data completely without the sending system caring what it sent. The latest version supports named fields in the STL files for tagging data parsed in the Prefix Tree and anonymous functions for parsing dynamic message payloads. We now output JSON objects and I'm working on HBase...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Wave Framework

    Wave Framework

    Open Source API-centric PHP Micro-framework

    Wave is a PHP micro-framework that is built loosely following model-view-control architecture and factory method design pattern. It is made for web services, websites and info-systems and is built to support a native API architecture, caching, user control and smart resource management. Wave is a compact framework that does not include bloated libraries and features and is developed keeping lightweight speed and optimizations in mind. While not necessary for using Wave Framework, it comes...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    NetStress-NG

    NetStress is a DDoS and network stress testing tool.

    ... Flood with static source ip address FIN Flood with random source address FIN Flood with fragmented packets UDP Flood Attacs Static source port udp flood UDP flood with random source port UDP Flood with static source ip address UDP Flood with random source address UDP Flood with fragmented packets ICMP Flood ICMP Flood with all options random(source ip, icmp type, code) HTTP Flood ... More info: http://sf.net/p/netstressng/wiki/Home/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    F-Talk P2P Encrypted Secure Voip

    F-Talk P2P Encrypted Secure Voip

    F-Talk cross-platform p2p encrypted secure voip software

    This project connect to two peers directly ( using without any central server, stun server ) together with 128bit encrypted secure voip communication. http://ftalk.armanasci.com/guide Spefications * Peer to peer direct connection without using any central dedicated server. ( First basic part of the security ) * 128bit AES Symmetric end-to-end encryption PCM datas. ( Second basic part of the security ) * 64bit Base64 Encoding transferred server side info. * Ipv4 and Ipv6 Supoort...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    RAWR - Rapid Assessment of Web Resources

    A web interface enumeration tool for simplifying red team reporting.

    Introducing RAWR (Rapid Assessment of Web Resources). There's a lot packed in this tool that will help you get a better grasp of the threat landscape that is your client's web resources. It has been tested from extremely large network environments, down to 5 node networks. It has been fine-tuned to promote fast, accurate, and applicable results in usable formats. RAWR will make the mapping phase of your next web assessment efficient and get you producing positive results faster!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next