Showing 3171 open source projects for "vx-linux"

View related business solutions
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • Compliant and Reliable File Transfers Backed by Top Security Certifications Icon
    Compliant and Reliable File Transfers Backed by Top Security Certifications

    Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.

    Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
    Start Free Trial
  • 1
    mod_csrf

    mod_csrf

    Apache module to prevent cross-site request forgery.

    mod_csrf is a module for the Apache Web server. It prevents cross-site request forgery attacks to vulnerable HTML forms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Cardano SL

    Cardano SL

    Cryptographic currency implementing Ouroboros PoS protocol

    Cryptographic currency implementing Ouroboros PoS protocol. The cardano-node is the top level for the node and aggregates the other components from other packages: consensus, ledger and networking, with configuration, CLI, logging and monitoring. The node no longer incorporates wallet or explorer functionality. The wallet backend and explorer backend are separate components that run in separate external processes that communicate with the node via local IPC. The new Cardano implementation...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    WebSploit Framework

    WebSploit Framework

    WebSploit is a high level MITM Framework

    WebSploit Advanced MITM Framework [+]Autopwn - Used From Metasploit For Scan and Exploit Target Service [+]wmap - Scan,Crawler Target Used From Metasploit wmap plugin [+]format infector - inject reverse & bind payload into file format [+]phpmyadmin Scanner [+]CloudFlare resolver [+]LFI Bypasser [+]Apache Users Scanner [+]Dir Bruter [+]admin finder [+]MLITM Attack - Man Left In The Middle, XSS Phishing Attacks [+]MITM - Man In The Middle Attack [+]Java Applet Attack [+]MFOD...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    Fav-up

    Fav-up

    Look up IP addresses using favicon hashes via Shodan

    fav-up is an open source reconnaissance utility designed to identify servers and websites by analyzing favicon hashes and querying the Shodan search engine. It calculates the hash of a favicon image and then uses that value to search Shodan for other hosts that use the same icon. This technique is commonly used in security research and OSINT investigations to discover related infrastructure or services that may belong to the same organization. fav-up can retrieve favicon data from several...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 5
    MozDef

    MozDef

    MozDef: Mozilla Enterprise Defense Platform

    MozDef aims to bring real-time incident response and investigation to the defensive toolkits of security operations groups in the same way that Metasploit, LAIR, and Armitage have revolutionized the capabilities of attackers. We use MozDef to ingest security events, alert us to security issues, investigate suspicious activities, handle security incidents, and visualize and categorize threat actors. The real-time capabilities allow our security personnel all over the world to work...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    lua-resty-auto-ssl

    lua-resty-auto-ssl

    On the fly (and free) SSL registration and renewal inside OpenResty

    On the fly (and free) SSL registration and renewal inside OpenResty/nginx with Let's Encrypt. This OpenResty plugin automatically and transparently issues SSL certificates from Let's Encrypt (a free certificate authority) as requests are received. By default, resty-auto-ssl will not perform any SSL registrations until you define the allow_domain function. You may return true to handle all possible domains, but be aware that bogus SNI hostnames can then be used to trigger an indefinite number...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    BlockCheck

    BlockCheck

    Russian ISP blocking type checker

    BlockCheck is a Russian ISP blocking-type checker created to identify how websites from Russia’s prohibited-information registry were being blocked by internet providers. The tool was designed for a specific network environment and is explicitly not useful outside Russia. It runs tests that help distinguish different blocking methods, such as DNS manipulation, IP blocking, HTTP blocking, TCP reset behavior, and deeper filtering patterns. The repository is now archived and marked as not...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    vulscan

    vulscan

    Advanced vulnerability scanning with Nmap NSE

    Vulscan is a module that enhances nmap to a vulnerability scanner. The nmap option -sV enables version detection per service which is used to determine potential flaws according to the identified product. The data is looked up in an offline version of VulDB.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    PC/SC Tracker

    PC/SC Tracker

    Smart card events and smart cards information tracker

    A multi-platform tool for tracking PC/SC events and smart cards states and information. Under Windows, it uses Winscard for PC/SC along with CryptoAPI for retrieving smart card information. Under Linux/MacOSX, it uses pcsc-lite for tracking PC/SC events and it retrieves smart card information by using the file smartcard_list.txt bundled inside the tool and that is provided by the pcsc-tools project.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 10
    MimiPenguin

    MimiPenguin

    A tool to dump the login password from the current linux user

    A tool to dump the login password from the current linux desktop user. Adapted from the idea behind the popular Windows tool mimikatz. Takes advantage of cleartext credentials in memory by dumping the process and extracting lines that have a high probability of containing passwords. Will attempt to calculate each word's probability by checking hashes in memory, and regex searches. 2.0 introduces a clean port that aims to increase the speed of execution and portability
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SSH MITM

    SSH MITM

    SSH man-in-the-middle tool

    This penetration testing tool allows an auditor to intercept SSH connections. A patch applied to the OpenSSH v7.5p1 source code causes it to act as a proxy between the victim and their intended SSH server; all plaintext passwords and sessions are logged to disk. Of course, the victim's SSH client will complain that the server's key has changed. But because 99.99999% of the time this is caused by a legitimate action (OS re-install, configuration change, etc), many/most users will disregard...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Trousseau

    Trousseau

    File based encrypted key-value store

    Trousseau is an encrypted key-value store designed to be a simple, safe and trustworthy place for your data. It stores data in a single encrypted file. It supports both asymetric encryption using OpenPGP, and symmetric encryption using AES256. It can be easily synced across devices using Dropbox, OneDrive. It can be exported and imported to/from multiple remote storages using integrated S3, ssh, and gist support. If used with OpenPGP encryption, it is able to restrict access to the data...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Buster

    Buster

    OSINT tool for discovering information linked to email addresses

    Buster is an open source OSINT tool designed for email reconnaissance and information gathering. It helps investigators, security researchers, and penetration testers discover publicly available information related to email addresses and usernames. It can analyze an email address to identify associated social media accounts, references across the web, and potential data breaches linked to that email. It also performs reverse WHOIS lookups to discover domains that may have been registered...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14

    RSA Encryption Tool

    RSA algorithm based encryption tool.

    A simple program written in C# utilizing .NET 4.6 to demonstrate RSA encryption in action. User can select a text file or input any text to encrypt.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15

    KeePass Custom Icon Dashboarder

    KeePass Plugin to download and manage custom icons

    Provides some statistics and management features for custom icons in KeePass. THIS PROJECT HAS MOVED TO https://github.com/incognito1234/Keepass-Custom-Icon-Dashboarder High definition of custom icon can be uploaded. URLs of associated entries are used to retrived the highest definition of icons. For each custom icon, the following information is available: - Number and list of entries that use it - Number and list of groups that use it Mass update features are: -...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16

    PyPWD

    A Python3 Password Manager, with encryption and without connection

    https://www.garanet.net/it-blog/python-password-manager/ A Python3 Password Manager, with encryption and without an Internet connection. How it Works: First Run: PyPWD > Creates Master Key with your master username and password (Do not forget it or modify the config file, otherwise you'll be not able to open your password manager anymore). PyPWD > Saves a DataFrame as an encrypted CVS and all passwords are encrypted too, with key and the master password. Login: PyPWD >...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Metasploitable

    Metasploitable is an intentionally vulnerable Linux virtual machine

    This is Metasploitable2 (Linux) Metasploitable is an intentionally vulnerable Linux virtual machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques. The default login and password is msfadmin:msfadmin. Never expose this VM to an untrusted network (use NAT or Host-only mode if you have any questions what that means).
    Leader badge
    Downloads: 13,742 This Week
    Last Update:
    See Project
  • 18
    Kamus

    Kamus

    An open source, git-ops, zero-trust secret encryption and decryption

    An open source, GitOps, zero-trust secrets encryption and decryption solution for Kubernetes applications. Kamus enables users to easily encrypt secrets that can be decrypted only by the application running on Kubernetes. The encryption is done using strong encryption providers (currently supported: Azure KeyVault, Google Cloud KMS, Amazon Web Services KMS, and AES).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    IP-Chat

    IP-Chat

    UDP based desktop chatting app which supports AES-256 bit encryption.

    Simple Encrypted chat application built with Java. It uses AES-256 bit block cipher algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Helper for GitHub notifications in Gmail

    Helper for GitHub notifications in Gmail

    Open GitHub notifications with shortcuts in Gmail

    A web extension for Chrome and Firefox which adds keyboard shortcuts for opening and muting GitHub notification emails. Mute thread in mail view. It will open a background window to load the mute thread URL, and close itself when done. This only works if you have an active GitHub session. ctrl + return to trigger one the action button when an email is selected using gmail key navigation (when the blue bar appears). Load the extension manually and modify the code accordingly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    SSHTOOLS

    SSHTOOLS

    Java SSH API

    This project now hosts the third-generation of Java SSH API, Maverick Synergy. This API builds on the Maverick Legacy commercial APIs and delivers a new API in a unified client/server framework. This API is available to the community under the LGPL open source license. This update includes ed25519 support, support for the new OpenSSH private key file format and stronger key exchange algorithms. The project continues to host both the original API and legacy applications created around...
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • 22

    chords-malware-analyzer

    Chords is binary file strings extractor, with many formats supported.

    Chords is strings on steroids. Is able to extract strings from files just like strings, but it also supports windows wide string, base64 and hexadecimal strings (with decoding support) and automatic recognition of Indicators of Compromise (IOCs). It has been developed to support the malware analysis process, but is a general purpose tool.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Secret File

    Secret File

    File Encryption/Decryption using password

    Secret File is a free and easy to use encryption/decryption app that can encrypt nearly any kind of file format using passwords. Files can be stored as personal or sent over the internet as confidential as the data of files are securely encrypted at the binary level itself and can be decrypted at any time and anywhere. You can also use multi-level protection for more secureness.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 24
    AQUATONE

    AQUATONE

    A tool for domain flyovers

    Aquatone is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based attack surface. Aquatone is designed to be as easy to use as possible and to integrate with your existing toolset with no or minimal glue. Aquatone is started by piping output of a command into the tool. It doesn't really care how the piped data looks as URLs, domains, and IP addresses will be extracted with regular expression pattern matching....
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    Security Datasets

    Security Datasets

    Re-play Security Events

    Security‑Datasets is a community-driven repository maintained by the Open Threat Research Forge (OTRF) that curates publicly available malicious and benign datasets for threat-hunting, machine learning, event analysis, and cybersecurity research. Datasets include Windows events, logs, alerts, and simulated attack data to support detection engineering and academic research.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB