Showing 111 open source projects for "include"

View related business solutions
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1

    Liferay Security Patches

    Download latest security patches for Liferay community

    This project contains security patches (binaries) for different versions of Liferay community, which are no more developed as newer versions are released. Apart from the security patches, some of the binaries include additional fixes for the issues raised at https://issues.liferay.com/ (Liferay Issue Tracking System). Please note, that this is not an official Liferay repository. The patches were kindly provided by the Liferay Community Security team members, which was compiled and released here. Source code for the security fixes can be found at https://github.com/community-security-team/liferay-portal In addition, we recommend using Liferay DXP for official product support, faster delivery of patches and updates baked by Liferay Team itself.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    keysniffer

    keysniffer

    Linux kernel mode debugfs keylogger

    ...So the module now supports a module parameter codes which shows the keycode shift_mask pair in hex (codes=1) or decimal (codes=2). You can lookup the keycodes in /usr/include/linux/input-event-codes.h. The keypress logs are recorded in debugfs as long as the module is loaded. Only root or sudoers can read the log. The module name has been camouflaged to blend-in with other kernel modules. You can, however, execute a script at shutdown or reboot (the procedure would be distro-specific) to save the keys to a file. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    gasmask

    gasmask

    All-in-one OSINT tool for reconnaissance and domain intelligence

    ...GasMasK integrates with a wide range of platforms and services including search engines, social media platforms, and security APIs to retrieve relevant information about a target. These sources include services like Shodan, Censys, Netcraft, VirusTotal, GitHub, and various DNS-related services, allowing investigators to build a comprehensive profile of a domain or organization. GasMasK is commonly used by penetration testers, red teams, and security researchers who need to collect reconnaissance data.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    Snare Lite (SIEM & Logging Software)

    Snare Lite (SIEM & Logging Software)

    Snare Enterprise: bit.ly/Snare-Trial

    ...In fact, the agnostic nature allows it to bridge gaps between multiple SIEM implementations across business units. For more on use cases, check out the Intersect Alliance website. https://www.snaresolutions.com/ Snare Enterprise’s premium features include: - Regulatory Compliance - TLS Encryption - Log Simulcasting - TCP – Guaranteed Log Delivery - USB Device Monitoring - And more! For updates follow us on social media!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 5

    sls

    SLS Team Java Library

    ...With couple of classes u can parse and construct those ugly ASN.1 structures, look at RSA and EC key formats for example. No bad dependencies between classes, so u can easily cut off unnecessary code and simply include what u need in your project. Feel free and simple without headache. We are using class Binary as best for us to work with byte arrays. Simple classes for console-like colored apps in GUI-mode. Look also http://demo.sls.team
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Security Datasets

    Security Datasets

    Re-play Security Events

    Security‑Datasets is a community-driven repository maintained by the Open Threat Research Forge (OTRF) that curates publicly available malicious and benign datasets for threat-hunting, machine learning, event analysis, and cybersecurity research. Datasets include Windows events, logs, alerts, and simulated attack data to support detection engineering and academic research.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    BLESS

    BLESS

    An SSH Certificate Authority that runs as an AWS Lambda function

    BLESS is an SSH Certificate Authority that runs as an AWS Lambda function and is used to sign SSH public keys. SSH Certificates are an excellent way to authorize users to access a particular SSH host, as they can be restricted for a single-use case, and can be short-lived. Instead of managing the authorized_keys of a host, or controlling who has access to SSH Private Keys, hosts just need to be configured to trust an SSH CA. BLESS should be run as an AWS Lambda in an isolated AWS account....
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8

    ParamIT

    a Toolset for Molecular Mechanical Force Field Parameterization

    ...The developed toolkit helps the researchers in following ways: 1) automating the creation of multiple input files for quantum and molecular mechanics programs, 2) automating the output analysis and 3) substitute the use of full MM programs with a faster specialized one. The developed tools include: 1) generator of molecule-water complexes with graphical user interface (GUI), 2) semi-automatic frequency analysis using symbolic potential energy distribution matrix and comparison of optimized internal coordinates, 3) GUI for charge fitting with three modes: manual, Monte-Carlo sampling or brute force, and 4) GUI for dihedral terms fitting. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Remme PKI (d) Protocol

    Remme PKI (d) Protocol

    Blockchain-based distributed PKI protocol

    Remme Protocol is a blockchain-based protocol focused on digital key and identity lifecycle management to resolve issues related to cybersecurity, IoT connectivity, data integrity, digital copyright protection, transparency etc. Some of the groundbreaking features include: - Free Rate Limited Transactions - Low Latency Block confirmation (0.5 seconds) - Attribute-based identity and access control - Designed for Sparse Header Light Client Validation - Time Delay Security - Hierarchical Role Based Permissions - Support for Biometric Hardware Secured Keys (e.g. Apple Secure Enclave) - Designed for Parallel Execution of Context Free Validation Logic - Designed for Inter Blockchain Communication Read the Tech paper here: https://github.com/Remmeauth/Documentation/blob/master/RemmeProtocolTechPaper.md
    Downloads: 0 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    Firing Range

    Firing Range

    Firing Range is a test bed for web application security scanners

    ...Deployed as a cloud-friendly app, it aggregates dozens of vulnerability patterns in repeatable, labeled routes so tools can be benchmarked on coverage and noise. The project doesn’t just include simple XSS forms; it spans variants such as DOM-based issues, context-sensitive sinks, template mishandling, CSRF, open redirects, and mixed content problems. Each scenario is crafted to reflect how bugs appear in production—behind frameworks, in odd encodings, or across redirects—so scanners must demonstrate accurate crawling and context understanding. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    StrongKey CryptoEngine

    StrongKey CryptoEngine

    FIDO strong authentication, encryption, digital signature engine

    StrongKey CryptoEngine (SKCE) 2.0 is a "crypto Swiss Army knife" server to perform cryptographic functions through web services, while freeing application developers to focus on business functionality. Its modules include: - A FIDO Engine to support FIDO U2F key registrations/authentications - An encryption engine to encrypt/decrypt files using AES/TDES keys - Escrowing keys to on-premises key management system (StrongAuth KeyAppliance/SAKA) - Integration to cloud storage services (AWS S3, Azure and Eucalyptus Walrus) - A signing engine to digitally sign documents, code, etc. with FIPS 140-2 HSM support - An LDAP Engine for AD/LDAP integration for authorization decisions SKCE is battle-tested and in production at one of the largest e-commerce companies in the world, protecting more than 50M documents within the business process; see http://bit.ly/14VPYlO for the case study. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    JXplorer - A Java Ldap Browser

    JXplorer - A Java Ldap Browser

    Mature LDAP, LDIF and DSML client with i18n support.

    A java LDAP client with LDIF support, security (inc SSL, SASL & GSSAPI), translated into many languages (inc. Chinese), online help, user forms and many other features. The commercial version is available at https://jxworkbench.com for $9.95. It extends JXplorer to include: - custom LDAP reporting - to pdf, word etc. - Find and Replace with regexp and attribute substitution - A secure password vault to store directory connections - etc. Support for JXplorer and JXWorkbench is available at http://jxplorer.org. Commercial support available from sales@jxworkbench.com
    Leader badge
    Downloads: 610 This Week
    Last Update:
    See Project
  • 13
    EQGRP

    EQGRP

    Decrypted content of eqgrp-auction-file.tar.xz

    ...The repository serves as an archive and reference for security researchers, documenting the exploit frameworks, implants, and utilities that were allegedly used by a highly sophisticated threat actor. The tools include network exploitation scripts, backdoors, and frameworks targeting a range of platforms and services, many of which highlight previously unknown vulnerabilities. While the repository itself is provided for educational and research purposes, it also reflects a significant historical moment in cybersecurity, influencing both defensive strategies and awareness of advanced persistent threats. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    smartIDS

    Lightweight intrusion detection for IoT and embedded devices.

    The aim of the project is a lightweight intrusion detection library for embedded devices which supports MSP430 and ARM Cortex based devices. Features include DSP/SIMD support, IoT and embedded protocols, distributed operation, event and history management, tool supported configuration and visualization. There is a Java port that supports less features.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    ENTRUST

    ENTRUST

    Role-based permissions for Laravel 5

    ...The default migration takes advantage of onDelete('cascade') clauses within the pivot tables to remove relations when a parent record is deleted. If for some reason you cannot use cascading deletes in your database, the EntrustRole and EntrustPermission classes, and the HasRole trait include event listeners to manually delete records in relevant pivot tables. In the interest of not accidentally deleting data, the event listeners will not delete pivot data if the model uses soft deleting. However, due to limitations in Laravel's event listeners, there is no way to distinguish between a call to delete() versus a call to forceDelete(). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Bloody Profanity

    Fingerprint-only auth screen for KDE/Plasma

    ...DISCLAIMER: This lock screen uses adult language, and literally gives you the finger upon auth failure, so be warned. All images and random phrases can be changed by creating files under the .BloodyProfanity directory. Files that can be overloaded include: .BloodyProfanity/conf/sarcasm.yaml # random fail messages, begin every line with '-' (see yaml docs for more) .BloodyProfanity/img/bg.png .BloodyProfanity/img/error.png Other settings can be changed by editing the globals near the top of locker.py. REQUIREMENTS: KDE, PyYAML, Subprocess32, wxPython, fprintd and of course Python. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Xiaopan OS

    Xiaopan OS

    Easy to use pentesting distribution for wireless security enthusiasts

    ...Xiaopan OS is Windows, Mac and Linux compatible and users can simply install and boot this ~70mb OS through a USB pen drive or in a virtual machine (VM) environment. Some of the tools included are Inflator, Aircrack-ng, Minidwep GTK, XFE, wifite and feeding bottle. Supported cards include RTL8187L, RT3070, AR9271 and many more.
    Downloads: 360 This Week
    Last Update:
    See Project
  • 18
    Uniscan is a simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 19
    SimpleKey

    SimpleKey

    Generates keys up to 500 characters and hashes.

    ...These keys can be all numerical, alphanumeric, all alphabetical or the previous three plus special characters. You may use your generated key for whatever purpose. SimpleKey also includes a hash table with which to hash strings and files alike. Hash algorithms include: MD4/5, Sha, Skein, Keccak, Grostl, JH, and Blake.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Penetration-Testing-Toolkit v1.0

    A web interface for various penetration testing tools

    Penetration-Testing-Toolkit is a web based project to automate Scanning a network,Exploring CMS, Generating Undectable metasploit payload, DNS-Queries, IP related informations, Information Gathering, Domain related info etc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    crypto-native

    crypto-native

    Java native access for pc/sc, pkcs11, openct based on JNA

    ...Goals of this projects are: * interoperability: it can work on any platform where JNA runs: Windows, Linux, Mac (and one day even Android) * modularity: you don't need to include pc/sc support if you only use pkcs11 * ease of integration: it depends only on few required libraries. * ease of use: it exposes a simple java interface (even if you can deal with the JNA classes directly)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    KeePass KdbpFile format

    A plugin to allow Import and Export in Fast KDBP format

    ...Note that as this is a new file format, the KdbpFile plugin is required for desktop KeePass to be able to import files that have been exported using it. Other ports and implementations of KeePass may in the future include native support for the format, but if they do not, they will not be able to read these files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Java-based Open Source WAF (Web Application Firewall) to include inside a web application in order to protect it against attacks like Cross-Site Request Forgery (CSRF), Parameter Manipulation and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    TeamSploit

    Pen Testing With Friends

    TeamSploit makes group-based penetration testing fun and easy, providing real-time collaboration and automation. TeamSploit is a suite of tools for the Metasploit Framework. TeamSploit should work with any MSF product (including, OpenSource, Express, or Pro). Features Include: - Exploitation Automation - Automated Post-Exploitation - Information and Data Gathering - Session Sharing - Trojans and Trollware TeamSploit's primary goal is to automate common penetration testing tasks, and provide access and information to fellow team members.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Limiter (botnet & overload protection)

    Simple web protection against botnet attack

    If your web is attacked by botnet, you can include this script into it and prevent server crash. Just set up a number of allowed approaches and controled time. (for ex. 1000 users/1 min) If there were connected 1001 users in 1 minute, web will be shuted down by generated htaccess file. There is a second file(you should execute it with cron) to automaticly remove htaccess file if there will be less than 1001 users per minute.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB