Showing 61 open source projects for "eidors-help"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    Electronic Shelf Label  Firebase Edition

    Electronic Shelf Label Firebase Edition

    An electronic shelf label is a type of price tag

    ...For more information please visit https://github.com/Northstrix/Electronic-Shelf-Label-Firebase-Edition You can find the tutorial on V2.0: https://www.instructables.com/DIY-IoT-Electronic-Shelf-Label-With-Google-Firebas-1/ V1.0: https://www.instructables.com/DIY-IoT-Electronic-Shelf-Label-With-Google-Firebas/ The desktop app is made with the help of the ChatGPT.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Yark

    Yark

    Simple OSINT tool for archiving and browsing YouTube channels offline

    Yark is an open source command-line tool designed to simplify the process of archiving YouTube channels for research, analysis, or personal preservation. The project focuses on OSINT (Open Source Intelligence) workflows by allowing users to collect and store videos, metadata, and thumbnails from a YouTube channel in a structured local archive. Instead of simply downloading individual videos, Yark creates a self-contained archive directory that includes metadata files and organized folders...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Python script to get the last 5 minutes of accepted traffic logs via the trendmicro email security API and send them to a syslog server Script Python para obtener los ultimos 5 minutos de logs de trafico aceptado por medio de la API de trendmicro email security y enviarlos a un servidor de syslog Crontab */5 * * * * /usr/local/bin/python3.9 /home/user/tmes-syslog_0.02.py 2>&1 > /home/user/errores.txt ------------ # API documentation # Getting Started with Trend Micro Email Security APIs # https://docs.trendmicro.com/en-us/enterprise/trend-micro-email-security-rest-api-online-help/getting-started-with.aspx # Obtaining the API Key # https://docs.trendmicro.com/en-us/enterprise/trend-micro-email-security-rest-api-online-help/getting-started-with/obtaining-the-api-ke.aspx # List Mail Tracking Logs # https://docs.trendmicro.com/en-us/enterprise/trend-micro-email-security-rest-api-online-help/supported-apis/logs/list-mail-tracking-l.aspx
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Pentest-Tools

    Pentest-Tools

    A collection of custom security tools for quick needs.

    Pentest-Tools is a collection of penetration testing scripts and utilities designed to help security professionals and ethical hackers perform vulnerability assessments. It includes a wide range of tools for tasks like web scraping, reconnaissance, data extraction, and network analysis. The suite is modular, allowing users to choose the tools that best fit their specific pentesting needs, from web application analysis to network penetration testing.
    Downloads: 6 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5
    Moriarty Project

    Moriarty Project

    Web-based OSINT tool for investigating phone number information

    ...Users can select specific investigation features to run individually or execute all available checks at once depending on their needs. Moriarty Project operates through a browser-based interface and includes multithreading improvements that help speed up the investigation process. Moriarty Project focuses strictly on OSINT-style information gathering and does not provide tracking, hacking, or harmful capabilities against phone number owners. It is fully open source, allowing users to inspect the code and understand how the data collection mechanisms work.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    codecat

    codecat

    static code analysis, to find/track sinks and bugs

    CodeCat is a open source tool to help you in static code analysis, to find/track sinks and bugs, this points follow regex rules...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    OneForAll

    OneForAll

    OneForAll is a powerful subdomain collection tool

    ...The tool is particularly notable for incorporating many Chinese data sources that are often missed by Western-focused recon tools, increasing discovery coverage. It supports brute-force subdomain discovery, recursive scanning, and takeover detection to help identify potential attack surfaces. OneForAll also performs validation and enrichment of discovered domains, producing structured outputs for further analysis. Overall, it is a powerful asset discovery platform designed to maximize subdomain visibility during security assessments.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    email2phonenumber

    email2phonenumber

    OSINT tool to discover phone numbers using an email address

    email2phonenumber is an open source OSINT (Open Source Intelligence) tool designed to help researchers identify a target’s phone number using only an email address. The project was created as a proof-of-concept during research into new OSINT methodologies for extracting personal information from publicly accessible sources and account recovery mechanisms. The tool works by automating interactions with password reset processes on various online services, which may reveal masked phone number digits associated with an account. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    yesitsme

    yesitsme

    Simple OSINT script to find Instagram profiles by name

    ...The tool requires an Instagram session cookie to operate and includes configurable timeout controls to help avoid detection or rate limiting during searches. Its minimal codebase and straightforward command-line interface make it accessible for researchers, security analysts, and digital investigators performing social media intelligence work.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 10

    Passlock-Windows

    AES-Encrypted Password manager

    ...PassLock also generates a 40-bit long password consisting of lowercase, uppercase letters, numbers, and symbols Passlock's 220bit AES encryption and infinitely long password generator make your passwords nearly impossible to break and Its Console Based User Interface will definitely help to enhance your experience.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Kubestriker

    Kubestriker

    A Blazing fast Security Auditing tool for Kubernetes

    Kubestriker is a platform-agnostic tool designed to tackle Kubernetes cluster security issues due to misconfigurations and will help strengthen the overall IT infrastructure of any organization. It performs numerous in-depth checks on a range of services and open ports well across more than one platform such as self-hosted kubernetes, Amazon EKS, Azure AKS, Google GKE etc., to identify any misconfigurations which make organizations an easy target for attackers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Phishing Catcher

    Phishing Catcher

    Real-time phishing domain detection via Certificate Transparency logs

    phishing_catcher is a security monitoring tool designed to detect potential phishing domains in near real time by analyzing TLS certificate issuance events. It listens to Certificate Transparency (CT) logs through the CertStream API and evaluates newly issued certificates as they appear. Each certificate often contains one or more domain names, which the tool analyzes to determine whether they resemble suspicious or phishing-related domains. phishing_catcher applies a configurable scoring...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    phpsploit

    phpsploit

    Full-featured C2 framework which silently persists on webserver

    ...The obfuscated communication is accomplished using HTTP headers under standard client requests and web server's relative responses, tunneled through a tiny polymorphic backdoor. Detailed help for any option (help command) Cross-platform on both client and server. CLI supports auto-completion & multi-command. Session saving/loading feature & persistent history. Multi-request support for large payloads (such as uploads) Provides a powerful, highly configurable settings engine. Each setting, such as user-agent has a polymorphic mode. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    FavFreak

    FavFreak

    Favicon hash–based reconnaissance tool for security research

    FavFreak is an open source reconnaissance tool designed to assist security researchers, bug bounty hunters, and penetration testers in identifying web technologies using favicon hashes. It works by taking one or more URLs as input and automatically retrieving the favicon.ico file associated with each target website. After fetching the favicon, it calculates a hash value and organizes the scanned domains, subdomains, or IP addresses according to these hashes. FavFreak then compares the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    DNSGen

    DNSGen

    Intelligent DNS permutation tool for subdomain discovery

    ...It analyzes existing domain names and generates numerous intelligent variations that may represent valid subdomains within an organization’s infrastructure. These generated permutations help identify hidden or unlisted services that may not appear in standard DNS queries or public records. DNSGen applies multiple permutation techniques to create realistic domain combinations based on modern infrastructure naming patterns, including cloud environments, DevOps tools, and microservice architectures. It can also extract meaningful keywords from existing domain names and incorporate them into newly generated permutations. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    VulnX

    VulnX

    Intelligent Bot, Shell can achieve automatic injection

    vulnx, an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities in CMS systems. It can perform a quick CMS security detection, information collection (including sub-domain name, IP address, country information, organizational information and time zone, etc.), and vulnerability scanning. Vulnx is An Intelligent Bot Auto Shell Injector that detects vulnerabilities in multiple types of Cms, fast cms detection, information gathering, and vulnerability scanning of the target like subdomains, IP addresses, country, org, timezone, region, and more. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    tinfoleak

    tinfoleak

    OSINT tool for extracting and analyzing Twitter intelligence data

    ...Once the data is gathered, tinfoleak organizes it into structured information that can support intelligence analysis and investigative research. tinfoleak is capable of analyzing user activity, relationships, and behavioral patterns to reveal insights about accounts and their interactions on the platform. It also processes content such as hashtags, mentions, media files, and metadata to identify trends and relevant connections. Additional analysis features help uncover geolocation information, visited places, and user movement patterns when location data is available.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18
    FoxNuke

    FoxNuke

    A Proffesional Stress-Testing(ddos) tool for pentesters

    ...The FoxNuke Program is still underdevelopment as of 8/24/17, full release is set to come out sometime during 2017-2018. If you would like to participate in the TESTING of this program and would like to help report bugs, etc. then please email leyvarosnel@gmail.com for further inquiries. Please note that Beta distributions will be limited. This whole project is being done open-source and for free as a hobby, so if I abandon this project it's just because I don't feel like working on it anymore.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Password Guessing Framework

    Password Guessing Framework

    A Framework for Comparing Password Guessing Strategies

    The Password Guessing Framework is an open source tool to provide an automated and reliable way to compare password guessers. It can help to identify individual strengths and weaknesses of a guesser, its modes of operation or even the underlying guessing strategies. Therefor, it gathers information about how many passwords from an input file (password leak) have been cracked in relation to the amount of generated guesses. Subsequent to the guessing process an analysis of the cracked passwords is performed. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    nogotofail

    nogotofail

    An on-path blackbox network traffic security testing tool

    nogotofail is a network security testing tool developed by Google to help developers and researchers identify weaknesses in TLS/SSL implementations and detect unencrypted traffic that could compromise sensitive data. The tool functions as an on-path man-in-the-middle (MiTM) testing system, allowing users to inspect and evaluate how applications and devices handle encrypted connections under real-world conditions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    netool toolkit 4.6

    netool toolkit 4.6

    MitM pentesting opensource toolkit

    Operative Systems Suported are: Linux-ubuntu, kali-linux, backtack-linux (un-continued), freeBSD, Mac osx (un-continued) Netool its a toolkit written using 'bash, python, ruby' that allows you to automate frameworks like Nmap, Driftnet, Sslstrip, Metasploit and Ettercap MitM attacks. this toolkit makes it easy tasks such as SNIFFING tcp/udp traffic, Man-In-The-Middle attacks, SSL-sniff, DNS-spoofing, D0S attacks in wan/lan networks, TCP/UDP packet manipulation using etter-filters, and...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    privacyidea

    privacyidea

    two factor authentication management system

    privacyIDEA is a management and authentication system for two factor authentication. You can use OTP tokens, OTP cards, SMS, Smartphone Apps to incorparte the second factor. It can even manage SSH keys and supports Offline OTP. The latest version can manage and enroll user certificates. Its modular design makes it easily enhancable. It runs on Linux. Applications and workflows can be connected to privacyIDEA hence enabling two factor authentication in your system logon, web...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    ODS3 Virtual Machine Challenge

    ODS3 Virtual Machine Challenge

    Virtual Machine Image To Test Penetration Skills

    The ODS3 Virtual Machine Challenge are downloadable images that can be run as VMWare or VirtualBox instances. The Idea behind the challenge is to test and exercise web application penetration testing in a controlled environment. These images are great for cyber security students, penetration testers and hobbyist. Care should be taken if installed on an Internet access host as the application are purposely vulnerable to attack and exploitation.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    CRYpter

    CRYpter

    An encrypter/decrypter written on the weekends

    A simple encrypter/decrypter written in C with a graphical user interface written in Python. This tool was written to help forums' users to have their credits for the files they uploaded by putting their usernames from each forum they are active. *This encypting software generates a symetric key based in the password. The lenght of the key is variable. The rule for the length is: (Num_Of_Chars_In_Passwrd)^2 bytes .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    RAWR - Rapid Assessment of Web Resources

    A web interface enumeration tool for simplifying red team reporting.

    Introducing RAWR (Rapid Assessment of Web Resources). There's a lot packed in this tool that will help you get a better grasp of the threat landscape that is your client's web resources. It has been tested from extremely large network environments, down to 5 node networks. It has been fine-tuned to promote fast, accurate, and applicable results in usable formats. RAWR will make the mapping phase of your next web assessment efficient and get you producing positive results faster!
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB