Showing 95 open source projects for "virtual windows machine"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1

    Object Oriented Distributed Systems

    Simplified Architecture for Distributed Systems

    OODVS is a Java framework which goal is to increase the Java runtime support for Object Oriented Distributed Virtual Systems providing local access to distributed resources via proxies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    swap_digger

    swap_digger

    swap_digger is a tool used to automate Linux swap analysis

    swap_digger is a bash script used to automate Linux swap analysis for post-exploitation or forensics purpose. It automates swap extraction and searches for Linux user credentials, Web form credentials, Web form emails, HTTP basic authentication, WiFi SSID and keys, etc. swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    An essential utility, passgen was written in response to the lack of a useful password generator, which should be standard issue for any multi-user machine. passgen generates passwords which comply to security stds recommended by CERT, NIST and others.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    TorVM

    A VM for using Tor

    Preconfigured Debian Virtual Machine for use with Tor. Features: - Newest available tor version. - Iptables-script for tunneling all traffic through Tor. - Preconfigured MATE desktop environment.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    Mpge

    Mpge

    Mpge

    Mpge is a wrapper of meterpreter (msfconsole, msfpayload and msfencode) of Metasploit Framework directly integrated with Mac OS X Snow Leopard 10.6.8 and with OS X Mavericks 10.9. With Mpge is possible make trojan horse files for Microsoft Windows, Linux and Mac OS X 10.3 Panther, OS X 10.4 Tiger, OS X 10.5 Leopard and OS X Montain Lion 10.8.1 for all Mac OS X is possible make a trojan horse files contains a reverse shell into files .pkg and files .app. I used three real Mac OS X: Attacker:...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    AdwCleaner
    AdwCleaner is a free tool that will scan your computer and efficiently removes Adware (ads softwares), PUP/LPI (Potentially Undesirable Program), Toolbars, Hijacker (Hijack of the browser's homepage). It also features anti adware host that will help to prevent advertising software from installing on your machine. It works with a Search and Delete mode. It can be easily uninstalled using the mode "Uninstall". AdwCleaner is now part of the Malwarebytes family. We at Malwarebytes are big...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    Vulnerable Operating Systems

    Vulnerable Operating Systems

    deliberately vulnerable operating systems

    VulnOS are a series of deliberately vulnerable operating systems packed as virtual machines to teach Offensive IT Security and to enhance penetration testing skills. For educational purposes!
    Downloads: 10 This Week
    Last Update:
    See Project
  • 8
    ODS3 Virtual Machine Challenge

    ODS3 Virtual Machine Challenge

    Virtual Machine Image To Test Penetration Skills

    The ODS3 Virtual Machine Challenge are downloadable images that can be run as VMWare or VirtualBox instances. The Idea behind the challenge is to test and exercise web application penetration testing in a controlled environment. These images are great for cyber security students, penetration testers and hobbyist. Care should be taken if installed on an Internet access host as the application are purposely vulnerable to attack and exploitation.
    Downloads: 48 This Week
    Last Update:
    See Project
  • 9
    cyborghawk v1.1

    cyborghawk v1.1

    Latest-v1.1 of The World's most advanced pen testing distribution ever

    updated version of The most advanced, powerful and yet beautiful penetration testing distribution ever created.Lined up with ultimate collection of tools for pro Ethical Hackers and Cyber Security Experts. Simplify security in your IT infrastructure with Cyborg. Its real strength comes from the understanding that a tester requires a strong and efficient system,that benefits from a strong selection of tools, integrated with a stable linux environment.
    Downloads: 91 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 10

    Web Pentesting Environment

    Vulnerable Virtual Machine to Learn

    ...For instant support ask me @ahmaddotninja 5. Why didn`t I setup tools ? because you should learn how to install any tool on any platform ** Installation steps :-: 1- WPE is virtual Machine so you will need VM software we recommended Oracle VM VirtualBox Get it from here https://www.virtualbox.org/wiki/Downloads 2- uncompressed WPE.7z 3- after you install VirtualBox go to the menu bar select Machine > add 4- Browse to WPE folder select WPE.vbox // we use only OpenSource or Free software
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11

    PerlSCAP

    Perl implementation of a SCAP benchmark tool

    Interprets XCCDF checklists referencing OVAL machine checks and uses them to determine a machine's benchmark state. A XCCDF results file is generated as output.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    ANNFiD

    A forensic file identification tool using neural networks

    Just carved a bunch of bytes and have no idea what they could be? Maybe ANNFiD can help. ANNFiD uses neural network to identify byte patterns. It can be trained and has a GUI to help in the process. The tool is still on a very early stage, but could improve exponentially with the help of the developer community
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Esgix

    Esgix

    Pentest virtual machine

    Penetration testing virtual machine ! Learn how to hack ! From a last year project of Network System and Security Master's degree at the ESGI, ESGIX virtual machine has been created to provide a test environement to people who want to learn penetration testing. The main objective is to obtain root access on the virtual machine, using However you could have fun by finding security holes and intrusions techniques, and exploit them as you think best. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Matriux-VM

    Matriux-VM

    Matriux OS - Virtual Machine

    Matriux is a GNU/Linux, Debian based security distribution designed for penetration testing and cyber forensic investigations. It is a distribution designed for security enthusiasts and professionals, can also be used normally as your default OS. It's Matriux VM, for ISO, please visit https://sourceforge.net/projects/matriux/
    Downloads: 4 This Week
    Last Update:
    See Project
  • 15

    Reactor Breeder

    A Genetic Algorithm for Reactors in StarMade

    This software uses a genetic algorithm to "evolve" reactor designs for Schema's space-simulation game, Star-Made (http://star-made.org/). One of the more unique aspects of the game is that ship power management is not as simple as filling a cube with power generation blocks. This mechanism leads to difficulties in getting maximal power generation out of such reactors. This program rectifies this issue by using a self-organizing variant of brute force search. Much of the search space is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    FileEncoderDecoder

    File Encoder And Decoder

    Encoder.jar utility enrypts any file (containing text like .txt, .rtf, .html, .htm, .msg, .xml, etc.) and generates an encoded file. This encoded file may then be transferred via email or other medium from the source machine and can be decoded back to original on the target machine. The target machine should have Decoder.jar in order to reproduce it back to the original form. Decoder.jar decrypts an encoded file and regenerates the original file. Use : java -jar Encoder.jar java -jar...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Tsukuba-GAMA provides user and credential management, using the Grid Security Infrastructure (GSI) based on Public Key Infrastructure (PKI), X.509 certificate, proxy certificate, and the concept of Virtual Organization (VO).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Foi comprovado que senhas como: datas de nascimento, números de telefone, numero de cartões de crédito... são fáceis de serem descobertas (hackeadas), por isso existe o Password Generator, para gerar senhas que são difíceis de descobrir. O Sistema funciona como um gerador RANDOM, que cria instantaneamente uma série de possibilidades de combinações que o sistema julga ser mais difícil para programas e hackers descobrirem.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    SuStorID is an advanced Intrusion Detection System (IDS) for web services, based on machine learning. Its name comes from the term “Su Stori”, which in Sardinian language means “The Falcon”. It’s version is experimental, but demonstrates a number of interesting features, that can be readily exploited to detect and act against web attacks. SuStorID can be coupled with modsecurity, the well known web application firewall, to gather training data and provide for real-time counteractions. So,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    ViBoard jest to wirtualna klawiatura, napisana w JavaScript, która pomaga podnieść poziom bezpieczeństwa na stronach internetowych. Dzięki użyciu jej np. przy logowaniu, żaden program nie przechwyci wpisywanych przez niego znaków
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    raw2vmdk is an OS independent Java utility that allows you to mount raw disk images, like images created by "dd", using VMware, VirtualBox or any other virtualization platform supporting the VMDK disk format.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 22
    Vsam
    Vsam (Vulnerabillity, Scanning, Analysis and Management) is a project dedicated to the release of a virtual appliance for the management and analysis of vulnerability scan data. The main goals are ease of use and stability of the application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Q Disassembler is a flexible disassembly engine that aims to provide precise information about machine instructions while maintaining OS-independence and performance.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    This is an automated host name discovery tool written in Ruby. It is designed to discover as much as possible DNS names and application level host names related to a IP address. It's purpose is to enumerate all host names, aliases and virtual hosts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    An open-source configurable virtual testbed (based on the Eucalyptus cloud platform) for Intrusion Detection System Evaluation.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB