19 projects for "back" with 2 filters applied:

  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    OpenCTI

    OpenCTI

    Open Cyber Threat Intelligence Platform

    ...OpenCTI is built to integrate with external tools including MISP, TheHive, and MITRE ATT&CK, allowing it to function as a central intelligence hub in security operations. Its design emphasizes traceability by linking intelligence objects back to their original sources and tracking confidence levels and temporal metadata.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    Atlantis iOS

    Atlantis iOS

    A lightweight and powerful iOS framework for intercepting HTTP/HTTPS

    Don't let cumbersome web debugging tools hold you back. With Proxyman's native macOS app, you can capture, inspect, and manipulate HTTP(s) traffic with ease. Intuitive, thoughtful, and built with meticulous attention to detail. Dive into the network level to diagnose and fix problems with reliable and powerful tools. Proxyman acts as a man-in-the-middle server that captures the traffic between your applications and SSL Web Server.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    bin64ed

    bin64ed

    Base64 encode (or decode) files of any type with this lightweight tool

    bin64ed is a binary base64 encoder/decoder that allows you to encode/decode binary files (such as images, pdfs, etc) to and from base64.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    DDOS Perl is a denial of service attack handling script in Perl, like DDOS Deflate but with key differences. Can run at sub 1 minute intervals Banned IPs can be blocked for an increasing time Allowed IPs aren't stored in the same file as banned IPs
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Enigma Encryption any OS

    Enigma Encryption any OS

    A cross-plattform encryption tool for texts and files

    Enigma encrypts texts (PINs, Passwords, Messages, etc.) of any kind and is available for any OS, because it's just an HTML-Webpage with JavaScript in the back. So you can share secrets with friends on any device which has a HTML-Browser. On my Homepage you can find out how to use file-encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    GH Spammer

    GH Spammer

    Advanced Spamming Tool

    ...It can bypass any spamming filter, mails directly delivered to victim's priority inbox (In case of gmail), It can mail html content, can be used to spam multiple email id's. This tool is developed basically by keeping gmail spamming filters in mind. (Viz. Spam filter, priority inbox, eyc..) I designed it long back for one of my friend's specific needs. But now i thought i should share it with everybody.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Itilect FTP Proxy

    Itilect FTP Proxy

    Provide users with a managed temporary access to arbitary FTP

    ...If they are allowed to access this host, proxy will establish connection with a target FTP and authenticate using real credentials. After that, server will act as a proxy between user and target FTP, forwarding requests back and forth.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    PULSE

    PULSE

    Php User Login System Exentended

    ...Even if Pulse is easy to use, it's strongly secure: it has on its side the power of MD5 and SHA-1 algorithms! Salted properly! Pulse is fully opensource, you may download and re-distribute the code in any form, a link back to the project would be appreciated, but is not required. Enjoy! ~ David, project leader
    Downloads: 0 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    The csvdatamix project aims to randomize CSV input data files in order to conceal the original state of the data. Similar to data masking or data transformation. Also has mapping abilities to translate back to the original state of the data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Hyenae
    ...It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant. *** Hyenae is back *** Hyenae will be continued here: https://sourceforge.net/p/hyenae-ng
    Leader badge
    Downloads: 47 This Week
    Last Update:
    See Project
  • 12
    mySQLenum is a command line automatic blind sql injection tool for web application that uses MySql server as its back-end. Its main goal is to provide an easy to use command line interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Cherubim takes a snapshot of the computer screen and stores the image in a log file. The log file can then be played back like a movie.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Authpfng is a new authentication back-end to allow people to sign in to the network administrated by an OpenBSD pf-firewall. Login can be done by ssh, web-based and smb. You can assign traffic quotas and QoS per-user or after a certain bandwidth usage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    sudosh is a sudo shell, filter and can be used as a login shell. Sudosh records all keystrokes and output and can play back the session as just like a VCR.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A full-featured, Java-based back-office suite specifically designed for use in global financial institutions to facilitate straight-through-processing and other much-needed operational efficiencies. Built using best-of-breed, open-source technologies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The purpose of on-line is to maintain servers 24/7 connected to the net. It will monitor your network connection and make sure its on-line (if not, it will bring it back). It is capable of syncing your IP (e.g: noip, dns2go). It has a notification system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    lrzip

    Long Range Zip

    Lrzip is a lossless compression application designed to scale with modern hardware resources using a variety of different back end compression algorithms with the ability to have unlimited size compression windows and optional high grade encryption. The larger the file the better the compression possible and the more powerful the hardware the faster it can compress with a heavily multithreaded design.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB