Showing 102 open source projects for "source testing unit testing"

View related business solutions
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • 1
    LeakTrack provides memory leak tracking and out-of-range access checks for acquired memory blocks for you C/C++ applications on each platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    pamtester is a tiny utility program to test the pluggable authentication modules (PAM) facility, specifically designed to help PAM module authors to intensively test their own modules.
    Leader badge
    Downloads: 117 This Week
    Last Update:
    See Project
  • 3
    The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Valkyries is a parallel programming project designed for and developed on a Beowulf cluster to crack several UNIX systems' passwords by brute-force. Currently implemented system cracks only numerical passwords but it's being developed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5
    hcraft is a HTTP systems penetration testing framework designed to make exploitation of known vulnerabilities in HTTP systems a dynamic, simple process.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    nmap-sql is a feature-addition to the popular nmap security tool. It adds MysQL logging functionality directly to the nmap binary to assist large scale auditing and pen-testing with multiple scanners and subnets logging to a central database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Strength in numbers. Existing products we're involved in include port to Linux of Tony Forbes' MFAC for brute-force factorization of MM61 for relatively small factors, and further development and improvement of Tim Charron's ECMnet distributed computing f
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    NBTView is a 'NetBIOS Swiss Army Knife' written in C, and usable under several UNIX-like systems. NBTView allows you to passively monitor NetBIOS intelligence (users logged in, shares, etc.), run queries against machines, and brute-force share passwords.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 10
    Disk Optimizer selects files to be placed on any disk medium that will maximize the space used. It is very efficient in finding an optimum file set since it uses a Genetic Algorithm instead of brute force.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Utilities for measuring characteristics of cryptographic hash functions: avalanche property, (partial) collision search, Maurer's universal statistical test, Filiol's Mobius ANF statistical analisys. EdonC, EdonR, MD5 and SHA-1 hash-plugins included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    NetChat is a network version of the "chat" utility that comes with PPP. It is a general purpose network "conversations" tool, designed for network testing. It can also be used for (very) quick setup of a server for a new protocol.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The John Darm project aims at developping a software that can tests a brute force attack on weak UNIX passwords. It s a multi-client application that dispatches the calculations between the different clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The aim of this project is to collect and develop high quality pseudo random number generator (s) and to develop methods for testing suspected random sequences.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    RAMdisk-based Operating System for conducting Security Audits. Includes hping2, xprobe, netcat, lsh, wardialer, and more -- all on 1 computer disk. Runs off your RAM, so there is no need to reformat your computer. Great for pen testing!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    QT based Linux web security tool that it is designed to test targets for weak passwords using crack, leech and URL testing functions. Plugins allow potentially any protocol (eg http, ftp) or server to be attacked, while remaining anonymous using proxys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A suite of tools (a sniffer, a TCP hijacker, an ARP poisoner and a TCP tunnel through ICMP/IGMP packets) created for testing TCP/IP weakness and using them in a non-conventional way. [Up to now I've done only the sniffer-related part]
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Regular Expression, Arbitrary Protocol, Opensource Filtering Firewall (Reapoff) is a regular expression enabled TCP/IP plug proxy. The proxy operates on data using a pair of simple rule based configuration files defining the testing and actions on th
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    dkbf is a distributed, keyboard, brute-force program for Linux clusters that attacks Windows NT Lanman and NT hashes using the Message Passing Interface (MPI).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Blaster Scan is a TCP port scanner. It can extract users exploiting vrfy or expn, check anonymous access on FTP, check brute force on FTP and POP3, extract daemons\' versions, and scan for CGI bugs. It also has a SYN port scan, the ability to ping hosts t
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    BFBTester is great for doing quick, proactive, security checks of binary programs. BFBTester will perform checks of single and multiple argument command line overflows and environment variable overflows. Versions 2.0-BETA and higher can also watch for tem
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    hping2 is an interactive packet costructor and responses analyzer that uses the same CLI of the ping program (but with a lot of extensions). It can be used to performs a lot of tasks, like testing of firewall rules, (spoofed) port scanning, et cetera.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    NetBox is a software programmed in C for testing vulnerabilities in the network. Using this software you can attack your network using a combination of differents known attacks (ARP or DNS Spoofing, MITM, ...) and detect bugs of security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    boef

    Buffer Overflow Exploitation Framework

    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The program uses a number of processes to brute-force crack MD5 hashes. MD5 brute-force cracking involves hashing all possible strings and each time compare the obtained hash to the one we are trying to crack
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB