Showing 155 open source projects for "get"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    BeEF

    BeEF

    The browser exploitation framework project

    BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser. Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors. Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 2
    CloudMapper

    CloudMapper

    CloudMapper analyzes your Amazon Web Services (AWS) environments

    CloudMapper helps you analyze your Amazon Web Services (AWS) environments. The original purpose was to generate network diagrams and display them in your browser (functionality no longer maintained). It now contains much more functionality, including auditing for security issues. If you want to add your own private commands, you can create a private_commands directory and add them there. You must have AWS credentials configured that can be used by the CLI with reading permissions for the...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    GoSpider

    GoSpider

    Gospider - Fast web spider written in Go

    GoSpider - Fast web spider written in Go. Fast web crawling. Brute force and parse sitemap.xml. Parse robots.txt. Generate and verify link from JavaScript files. Link Finder. Find AWS-S3 from response source. Find subdomains from the response source. Get URLs from Wayback Machine, Common Crawl, Virus Total, Alien Vault. Format output easy to Grep. Support Burp input. Crawl multiple sites in parallel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    jjb

    jjb

    A chrome extension that helps you automatically apply for Jingdong

    Regularly monitor the price changes of purchased goods, and automatically apply for JD.com price protection when the price is reduced. It will only be saved locally if you choose to save the account and log in automatically. All functions of Beijing Price Insurance are completed locally, and will not actively upload any private information to anyone. Beijing Price Insurance is not a free app. You need to tip any amount to get legal authorization. Although there are currently no mandatory...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Enterprise and Small Business CRM Solution | Clear C2 C2CRM Icon
    Enterprise and Small Business CRM Solution | Clear C2 C2CRM

    Voted Best CRM System with Top Ranked Customer Support. CRM Management includes Sales, Marketing, Relationship Management, and Help Desk.

    C2CRM consists of four modules that integrate to provide a comprehensive CRM solution: Relationship Management, Sales Automation, Marketing Automation, and Customer Service. Only buy what each user needs.
    Learn More
  • 5
    SSH MITM

    SSH MITM

    SSH man-in-the-middle tool

    This penetration testing tool allows an auditor to intercept SSH connections. A patch applied to the OpenSSH v7.5p1 source code causes it to act as a proxy between the victim and their intended SSH server; all plaintext passwords and sessions are logged to disk. Of course, the victim's SSH client will complain that the server's key has changed. But because 99.99999% of the time this is caused by a legitimate action (OS re-install, configuration change, etc), many/most users will disregard...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Algo VPN

    Algo VPN

    Set of Ansible scripts that simplifies the setup of a personal VPN

    Introducing Algo, a self-hosted personal VPN server designed for ease of deployment and security. Algo automatically deploys an on-demand VPN service in the cloud that is not shared with other users, relies on only modern protocols and ciphers, and includes only the minimal software you need. And it’s free. For anyone who is privacy conscious, travels for work frequently, or can’t afford a dedicated IT department, this one’s for you. Really, the paid-for services are just commercial...
    Downloads: 20 This Week
    Last Update:
    See Project
  • 7

    KeePass Custom Icon Dashboarder

    KeePass Plugin to download and manage custom icons

    Provides some statistics and management features for custom icons in KeePass. THIS PROJECT HAS MOVED TO https://github.com/incognito1234/Keepass-Custom-Icon-Dashboarder High definition of custom icon can be uploaded. URLs of associated entries are used to retrived the highest definition of icons. For each custom icon, the following information is available: - Number and list of entries that use it - Number and list of groups that use it Mass update features are: -...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    CSVHashCrack Suite

    CSVHashCrack Suite

    Multi hash crack suite

    This script is capable of cracking multiple hashes from a CSV-file like e.g. dumps from sqlmap. Over 17.000 md5-hashes in a CSV-file get cracked with a 14.300.000 lines wordlist in less then 1 min. Lines wich cant get cracked with the wordlist get stored in a .leftToCrack-File to further process with another Wordlist or the bruteforce-tool. In addition to the wordlist-cracker I created also a bruteforce-tool named CSVHashBrutforcer.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    basic-auth

    basic-auth

    Generic basic auth Authorization header field parser

    Generic basic auth Authorization header field parser for whatever. This is a Node.js module available through the npm registry. Get the basic auth credentials from the given request. The Authorization header is parsed and if the header is invalid, undefined is returned, otherwise an object with name and pass properties. Parse a basic auth authorization header string. This will return an object with name and pass properties, or undefined if the string is invalid.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Find out just how much your login box can do for your customer | Auth0 Icon
    Find out just how much your login box can do for your customer | Auth0

    With over 53 social login options, you can fast-track the signup and login experience for users.

    From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
    Sign up
  • 10
    X Certificate and Key management is an interface for managing asymetric keys like RSA or DSA. It is intended as a small CA for creation and signing certificates. It uses the OpenSSL library for the cryptographic operations. Please see the XCA homepage http://hohnstaedt.de/xca
    Leader badge
    Downloads: 325 This Week
    Last Update:
    See Project
  • 11

    APIthet

    An Application to security test RESTful web APIs.

    APIthet is an application to security test RESTful web APIs. Assessing APIs help in detecting security vulnerabilities at an early stage of the SDLC. Compare this with assessing an Android application that uses APIs on a backend server. This kind of assessment happens at a much later phase of the SDLC. Even worse, it does not necessarily touch all the APIs. That's not all. You specify one of the JSON parameters as random. This helps set a unique value for a specific JSON parameter in...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    KAAISv4

    KAAISv4

    Kali Applications Automatic Installation Script (For Kali Linux Only)

    KAAIS (Kali Applications Automatic Installation Script) Let's you easily install some applications which doesn't come by default with the Kali Linux distribution, and perform some other tasks (like apt-get commands and update your 'sources.list' file).. It's user friendly and it incorporates some other things. It also gets updated regularly.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    check vpn

    check vpn

    check if your vpn is falling down

    This tool check every x seconds your public ip adress, if it changes (vpn fall down for example) it stops one or several programs. When the VPN crash this tool can send a mail, play a sound. - This tool work on Windows and Linux. - You need to install JAVA 1,8 on your operating system - Download checkvpn.zip and unzip it - Double click on checkvpn.jar - Click on the button « Update ip » when the VPN is stopped to get your public ip address. - Type the programs separated by semicolon...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Piens
    Piens is a multifunctional batch-based Program. You can do many useful things with it. Its not a malware. Its just get detected because a batch file which was convertet to exe. (CMLINE.exe)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A slightly reduced strength bulk encryption. In exchange for the reduced strength, you get the ability to rsync the encrypted files, so that local changes in the plaintext file will result in (relatively) local changes to the cyphertext file.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 16
    Bias :: Versatile Information Manager
    Bias is a cross-platform versatile information management application / Organizer
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    file digest

    A command-line utility for calculating and verifying file checksums.

    ... the checksums: digest -c skein512/256 checksums.skein You can get a full list of supported algorithms and test the performance of different algorithms on your PC using the command: digest test <iterations> <filename> This will calculate hash sum of <filename> multiple times (number of times is specified by <iterations>) and output the results with precise timings. Note: if you have a 64-bit operating system, use 64-bit binary of the utility, because it is significantly faster for large files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    360-FAAR  Firewall Analysis Audit Repair

    360-FAAR Firewall Analysis Audit Repair

    360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs

    360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, firewall policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA or ScreenOS commands, and its one file! Read Policy and Logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), Cisco ASA (show run / syslog format), 360-FAAR compares firewall policies and uses...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    JChecksum

    JChecksum

    MD5 Checksum Tool

    This tool checks the integrity of files. It is very important if you don’t want your computer to get infected with viruses and malware. Sometimes, hackers and malicious software developers modify the contents of a downloadable zip, which can even result in granting them remote access to your system. While downloading various software, you might have noticed that developers usually provide hash values (MD5) of their files. This tool enables you to verify the file integrity of the downloaded...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Send OTP SMS PHP

    Send OTP SMS PHP

    Send OTP SMS to your Registered Members

    Send Bulk OTP SMS in PHP using SMS Gateway Center HTTP API You need to be registered member with https://www.smsgatewaycenter.com/ and then you can use this script to send OTP SMS to your clients and peers. This script is just an example to send sms and validate OTP using session. But you can use it with your database to get users and send out OTP SMS to registered members and have them validated. About SMSGatewayCenter.com SMS Gateway Center is one of the leading Bulk SMS Gateway...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    yagodu

    yagodu

    password safe / manager for linux and windows (and mac ?) via qt

    Password safe for Windows and Linux. If you want to manage your passwords (or other information) in one file and access that file with Windows and with Linux, this could be your choice. You create trees where each knot and leaf contains as many key/value pairs as you like. Then the whole thing is written encrypted to one file. Windows binaries and Debian32/64 binaries are downloadable. If you want to build it yourself - I suggest Linux users do that - get Qt4, call qmake and make...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Infernal Wireless

    Infernal Wireless

    Infernal Wireless Penetration Testing Suite

    ... of attacks with a click of button and save us some time. We got to admit that some of the attacks can get complex. Well, I decided to create the suite and make use of publicly available tools to achieve it. Followings are features which can be achieved with the tool: WPA2 hacking WEP Hacking WPA2 Enterprise hacking Wireless Social Engineering SSL Strip Evil Access Point Creation Infernal Wireless Report
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23

    Primes

    Calculate primes by using extremely fast sorting

    ... any kind of data. And as already mentioned, it's just the most efficient tree-based sorting algorithm that you can get. But furthermore this way of finding primes interestingly leaves a hard nut to crack for mathematicians: In very rare cases it finds numbers that are not primes. For all primes below one million this phenomenon arises in exactly two cases: 31213 which is 7 * 7 * 7 * 7 * 13 336141 which is 3 * 3 * 13 * 13 * 13 * 17 Who can explain, why?
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Java-Card-FluffyPGP-Applet

    Java-Card-FluffyPGP-Applet

    The Applet implements OpenGPG Card v 2.0.1 specification of smart card

    The FluffyPGP Applet implements the OpenGPG Card v 2.0.1 specification without using secure channels or Global Platform for portability. Get more details? please visit:
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Tattle Trail

    PHP 404 pages to trap malicious web requests and report abusers

    ... phpMyAdmin or WordPress) to exploit are run by a very few bad actors. They're easy to catch by watching for attempted visits to pages that don't exist (usually with admin or db in the path). The more these bad robots get reported (and shut down by their ISPs), the more time they have to spend looking for new hosts instead of new websites they can hack into.
    Downloads: 0 This Week
    Last Update:
    See Project