Showing 334 open source projects for "visual\"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Flowsint

    Flowsint

    Graph-based OSINT investigation platform w visual relationship mapping

    Flowsint is an open source OSINT investigation platform designed to help analysts explore and understand relationships between digital entities through a visual graph interface. The platform focuses on reconnaissance and open source intelligence workflows, enabling investigators to map connections between domains, IP addresses, organizations, individuals, and other data points. By presenting these relationships in an interactive graph, Flowsint allows users to quickly identify patterns, associations, and investigative leads that might be difficult to detect through traditional data analysis methods. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    Domain Digger

    Domain Digger

    Domain analysis toolkit for DNS, IP, and WHOIS lookups

    Domain Digger is an open source toolkit designed to help users analyze and explore domain-related information in a structured and visual way. It provides a centralized interface for investigating various technical details associated with a domain, including DNS records, IP information, and WHOIS data. By combining several domain intelligence features into a single platform, it simplifies the process of gathering and understanding domain infrastructure details. Domain Digger presents domain information through organized views and visual components, making it easier to interpret relationships between domains, DNS records, and network addresses. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 3
    Service Bus Explorer

    Service Bus Explorer

    Connect to a Service Bus namespace and administer messaging entities

    The Service Bus Explorer allows users to connect to a Service Bus namespace and administer messaging entities in an easy manner. The tool provides advanced features like import/export functionality or the ability to test topics, queues, subscriptions, relay services, notification hubs, and events hubs. Microsoft Azure Service Bus is a reliable information delivery service. The purpose of this service is to make communication easier. When two or more parties want to exchange information, they...
    Downloads: 69 This Week
    Last Update:
    See Project
  • 4
    dnstwist

    dnstwist

    Detects phishing and lookalike domains using DNS fuzzing techniques

    ...Security teams can use the tool to discover potential threats where attackers attempt to deceive users with lookalike domains. dnstwist also helps detect phishing activity by comparing web page content and visual similarity between domains using fuzzy hashing and perceptual hashing techniques. By automating DNS fuzzing and analysis, it provides organizations with an additional source of targeted threat intelligence. The tool can output results in structured formats, making it easier to integrate with security workflows or further analyze suspicious domains.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    Bitwarden Mobile Application

    Bitwarden Mobile Application

    The mobile app vault (iOS and Android)

    The Bitwarden mobile application is written in C# with Xamarin Android, Xamarin iOS, and Xamarin Forms. Manage, store, secure, and share unlimited passwords across unlimited devices from anywhere. Bitwarden delivers open-source password management solutions to everyone, whether at home, at work, or on the go. Generate strong, unique, and random passwords based on security requirements for every website you frequent. Bitwarden Send quickly transmits encrypted information, files and plaintext,...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    AzureAD Attack Defense

    AzureAD Attack Defense

    This publication is a collection of various common attack scenarios

    AzureAD-Attack-Defense is a community-maintained playbook that collects common attack scenarios against Microsoft Entra ID (formerly Azure Active Directory) together with detection and mitigation guidance. The repository is organized into focused chapters — for example: Password Spray, Consent Grant, Service Principals in Azure DevOps, Entra Connect Sync Service Account, Replay of Primary Refresh Token (PRT), Entra ID Security Config Analyzer, and Adversary-in-the-Middle — each written to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    USB Raptor

    USB Raptor

    Lock and unlock your computer using USB flash drives as keys

    Turn any USB flash drive to a computer lock and unlock key! USB Raptor can lock the system once a specific USB drive is removed from the computer and unlock when the drive is plugged in again to any USB port. The utility checks constantly the USB drives for the presence of a specific unlock file with encrypted content. If this specific file is found the computer stays unlocked otherwise the computer locks. To release the system lock user must plug the USB with the file in any USB port....
    Leader badge
    Downloads: 1,356 This Week
    Last Update:
    See Project
  • 8
    Harbour MiniGUI Extended Edition.
    Harbour MiniGUI Extended Edition. HARBOUR MINIGUI SOURCE WITH HMGS-IDE (IDE VISUAL TO MAKE WIN32 APLICATIONS WITH HARBOUR) UNNOFICIAL BUILD WITH EXTENDED NEW FEATURES.
    Leader badge
    Downloads: 31 This Week
    Last Update:
    See Project
  • 9
    TorRefresher-proxy

    TorRefresher-proxy

    One-click Tor IP refresher with bridge support built-in

    TorRefresher is a lightweight Windows tray application designed to make using Tor simple and efficient. Built to work with the official Tor Expert Bundle, it gives you full control over your Tor connection without needing to touch the command line. 🔄 Automatic IP Rotation – Refresh your Tor circuit on a timer of your choice 🖱 One-Click Manual Refresh – Instantly change your IP from the tray 🌍 Exit Node Info – See your current IP and country at a glance 🔒 Bridge Mode Support –...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8 Monitoring Tools in One APM. Install in 5 Minutes. Icon
    8 Monitoring Tools in One APM. Install in 5 Minutes.

    Errors, performance, logs, uptime, hosts, anomalies, dashboards, and check-ins. One interface.

    AppSignal works out of the box for Ruby, Elixir, Node.js, Python, and more. 30-day free trial, no credit card required.
    Start Free
  • 10
    Digital Signer (a PDF Signing software)

    Digital Signer (a PDF Signing software)

    Digital Signature & eSigning software. Bulk PDF signing. Sign all Page

    Digital Signer is a powerful and user-friendly software designed to secure and sign your digital documents with ease. Ideal for Tender filling, individuals, businesses, and professionals, this software ensures that your sensitive documents are protected from unauthorized editing and tampering, maintaining their integrity and authenticity. Key Features Sign PDFs with Hardware Devices: Ensuring the highest level of security. Digital Signature Certificates (DSC): Apply digital...
    Downloads: 59 This Week
    Last Update:
    See Project
  • 11
    Pen Possible

    Pen Possible

    scans a given textual string in 146 pen on paper possible combinations

    Application scans a given textual string in 146 pen on paper possible combinations- horizontal, vertical, diagonal, reverse, join top, join bottom, groups(2/3/4..), edges & in quadrant dimensions of your choice
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    ufonet

    ufonet

    UFONet - Denial of Service Toolkit

    UFONet - Is a set of hacktivist tools that allow launching coordinated DDoS and DoS attacks and combine both in a single offensive. It also works as an encrypted DarkNET to publish and receive content by creating a global client/server network based on a direct-connect P2P architecture. + FAQ: https://ufonet.03c8.net/FAQ.html -------------------------------------------- -> UFONet-v1.8 [DPh] "DarK-PhAnT0m!" (.zip) -> md5 = [ c8ab016f6370c8391e2e6f9a7cbe990a ] -> UFONet-v1.8...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 13
    JakiKaliOS

    JakiKaliOS

    JakiKaliOS V.0.01 is a LiveRAM Debian distribution based on Kali Linux

    JakiKaliOS is a LiveRAM Linux distribution based on Kali Linux, designed for cybersecurity professionals, ethical hackers, forensic analysts, and laboratory environments. The system runs entirely in RAM by default, leaving no disk footprint and providing fast, clean, and temporary work sessions ideal for security testing and controlled operations. JakiKaliOS includes a lightweight XFCE desktop optimized for performance and low resource usage, suitable for virtual machines, VPS consoles,...
    Leader badge
    Downloads: 16 This Week
    Last Update:
    See Project
  • 14

    Thunderbird Anti Virus 3.3

    Thunderbird Anti Virus Free Scanner v3.3

    ...Key Features: AI-Enhanced Scanning: Beyond traditional signatures, our engine utilizes AI-driven heuristics to identify suspicious patterns in Memory, Quick, and Full System scans. Intelligent Real-Time Protection: A dynamic monitoring core that can be toggled instantly. The system provides live visual feedback, alerting you with an "At Risk" status if your protection layers are offline. Process Neural Tracking: Monitor system health through a live dashboard that tracks all active threads and background processes in real time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    GmSSL

    GmSSL

    Password toolbox that supports national secret

    ...National secret algorithm and SSL protocol are embedded in existing projects. The default CMake build system can be easily used with default compilation tools such as Visual Studio and Android NDK. Developers can also manually write Makefiles to compile in special environments, tailoring.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    Very easy password generator

    Very easy password generator

    easily generate strong passwords

    Easily generate strong passwords, the program generates 3 password length options, 24 characters, 33 characters and 42 characters
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ActiveX OCX to encrypt files with a very fast implementation of AES 256 bits and standard RC4, for news and improvements visit http://rspencdll.sourceforge.net/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    C-Total

    C-Total

    Control Total sobre las conecciones de RED

    Administra reglas del Firewall de Windows de forma transparente sin ocultar información, muestra reglas creadas por el sistema y cualquier programa que utilice internet. NOTA: Para crear reglas y/o eliminarlas debe ejecutar C-Total como administrador.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 19
    BloodHound Legacy

    BloodHound Legacy

    Six Degrees of Domain Admin

    BloodHound Legacy is the deprecated open‑source version of the BloodHound Active Directory attack path analysis tool. It uses graph theory to model and visualize privileged relationships in AD, Entra ID, and Azure environments. Security professionals use it to enumerate domain privilege escalation paths, misconfigurations, and attack surfaces in corporate networks
    Downloads: 8 This Week
    Last Update:
    See Project
  • 20
    Openblocks

    Openblocks

    The Open Source Retool Alternative

    It's cumbersome to create a single app. You had to design user interfaces, write code in multiple languages and frameworks, and understand how all of that code works together. Low-code/No-code platforms are fast to get started with but quickly become unmaintainable and inflexible. This creates more problems than it solves. Retool-like solutions are great for their simplicity and flexibility, but they can also be limited in different ways compared to frameworks like React/Vue. An all-in-one...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes:...
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 22
    Password Manager

    Password Manager

    https://sourceforge.net/projects/pswmgr/

    Password Manager è un gestore di password. Le password contenute e salvate in Password Manager vengono memorizzate in un database protetto da password e unicamente da chi la conosce. Le password vengono così mantenute al sicuro da occhi indiscreti e rimangono sempre disponibili nel caso ne venga dimenticata qualcuna. È possibile creare più di un profilo in modo da poter permettere a chiunque di poter memorizzare le proprie password sullo stesso PC. Password Manager è dotato anche di un...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Shadowsocks for Windows

    Shadowsocks for Windows

    A secure socks5 proxy for Windows

    ...It also has a flexible industry-level encryption algorithm that supports custom algorithms. Shadowsocks for Windows requires a Microsoft .NET Framework 4.7.2 or higher, as well as Microsoft Visual C++ 2015 Redistributable (x86).
    Downloads: 73 This Week
    Last Update:
    See Project
  • 24
    HostHunter

    HostHunter

    OSINT reconnaissance tool for discovering hostnames from IP addresses

    HostHunter is an open source reconnaissance tool designed to discover and extract hostnames associated with a large set of IPv4 or IPv6 addresses. It helps security professionals map IP addresses to virtual hostnames using a combination of OSINT data sources and active reconnaissance techniques. This approach enables users to identify hidden or additional services that may be hosted behind a single IP address. By correlating hostname information from certificates, APIs, HTTP headers, and...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25

    Visual Figaro

    System safety, dependability and security analysis

    ...FIGARO is objet oriented, close to natural language and enables building libraries of reusable components (knowledge bases). Go to "Files" tab to download various Figaro based tools (Visual Figaro, KB3, YAMS), lots of examples and documentation.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB