Showing 149 open source projects for "you"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    imgp

    imgp

    Multi-core image resizer and rotator. Go crunch 'em!

    imgp is a command line image resizer and rotator for JPEG and PNG images. If you have tons of images you want to resize adaptively to a screen resolution or rotate by an angle using a single command, imgp is the utility for you. It can save a lot on storage too. Powered by multiprocessing, an intelligent adaptive algorithm, recursive operations, shell completion scripts, EXIF preservation (and more), imgp is a very flexible utility with well-documented easy to use options. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    DDoS/Dos Attack Simulator

    DDoS/Dos Attack Simulator

    Distributed Denial of Service Attack Simulator

    ... [ 2 ] Increase in Optimization. [ 3 ] DoS Attacks. Note: The following program is intended for educational purposes only. I ( Muhammad Sami Furqan ) am not responsible for any damage you do by utilizing this software. Read the License Agreement for more info about the Redistribution and Copyright of this Open-Source Program. Additionally, I strongly advise that you read the documentation thoroughly before attempting to use this program. Use this program at your own risk.
    Leader badge
    Downloads: 30 This Week
    Last Update:
    See Project
  • 3
    EG ClamNet Antivirus

    EG ClamNet Antivirus

    A simple antivirus that provide a graphical interface for ClamAV

    ...It also protects from MS Office macro viruses, mobile malware, other threats (including known ransomware). 2) Cleaner: EG ClamNet Antivirus has an additional feature of effective cleaning of junk files. With this feature you can optimize your system, increase memory space and system speed by cleaning junk files. Cleaning such junk files improves your system's security and speed-up your system.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 4
    ArkID

    ArkID

    Enterprise IDaaS/IAM platform system

    ...Easy integration into all your applications. Unified identity, certification, and authority management system. Extendable bottom application architecture based on Plug-in interpolation. You can flexibly and quickly add new functions to the main program without changing the main program. Achieve centralized and safe storage of corporate organizational structure and identity information of massive personnel. Establish a correspondence in multiple dimensions and securely integrate enterprise identity data sources. To achieve efficient and unified management of enterprise personnel, organizational structure, and application of information on a platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    dirsearch

    dirsearch

    Web path scanner

    ...For wordlists without %EXT% (like SecLists), -f | --force-extensions switch is required to append extensions to every word in wordlist, as well as the /. To use multiple wordlists, you can separate your wordlists with commas. Example: wordlist1.txt,wordlist2.txt. Default values for dirsearch flags can be edited in the configuration file: default.conf. The thread number (-t | --threads) reflects the number of separated brute force processes. And so the bigger the thread number is, the faster dirsearch runs. By default, the number of threads is 30, but you can increase it if you want to speed up the progress.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 6
    codecat

    codecat

    static code analysis, to find/track sinks and bugs

    CodeCat is a open source tool to help you in static code analysis, to find/track sinks and bugs, this points follow regex rules...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    SharPyShell

    SharPyShell

    Tiny and obfuscated ASP.NET webshell for C# web applications

    ...The main aim of this framework is to provide the penetration tester with a series of tools to ease the post-exploitation phase once exploitation has been successful against an IIS webserver. This tool is not intended as a replacement for the frameworks for C2 Server (i.e. Meterpreter, Empire, etc..) but this should be used when you land on a fully restricted server where inbound and outbound connections are very limited. In this framework, you will have all the tools needed to privesc, net discovery, and lateral movement as you are typing behind the cmd of the target server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    protepad

    Small GUI to encrypt/decrypt texts

    The tool is useful when you want to encrypt and decrypt texts with password. Encrypted text can be posted online, and can only be decrypted back when correct password is entered.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    KaHaShEr

    KaHaShEr

    File checksum generator and verifier.

    ...Designed to be smart and easy to use, it includes a feature that can detect a hexadecimal value in the clipboard and automatically perform the verification while notifying you with a very expressive sound of the outcome of this verification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 10
    KeyRandomizer is a simple yet customizable random key generator that can either generate a single key or multiple keys at once. KeyRandomizer also allow you to customize the generation parameters such as how long the key should be and what characters to generate (you can even put your own characters).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    pyWhat

    pyWhat

    Identify emails, IP addresses, and more

    ...Given inputs such as hex strings, URLs, email addresses, IP addresses, credit card numbers, cryptocurrency wallets, or entire .pcap capture files, it scans for structured patterns and tells you what it finds. The tool is recursive: it can traverse files and directories to extract meaningful entities, which is useful when analyzing malware samples, network captures, or code repositories at scale. It offers powerful filters called “tags” and distributions that let you narrow results to specific categories like bug bounties, cryptocurrencies, or AWS-related artifacts. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    GUI File Encrypter

    Just A Few Clicks To Encrypt Your File

    ...How To Run The Program: - Windows: Just run GUI File Encrypter.py - Mac / Linux: Open Terminal, navigate to folder with the program files & type "python3 GUI\ File\ Encrypter.py" without the quotes If you need to rename the file you can just make sure the extension stays ".py"
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    HashApp

    python software for cracking and creating SHA and MD5 hashes

    ...If you want to use a txt dictionary stored in your computer, then, well, nothing. Unless the word search fails with the online dictionary, you can't use a txt dictionary. But don't worry; you just have to store your txt on github (like the default dictionary above).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Ciphey

    Ciphey

    Decrypt encryptions without knowing the key or cipher

    Fully automated decryption/decoding/cracking tool using natural language processing & artificial intelligence, along with some common sense. You don't know, you just know it's possibly encrypted. Ciphey will figure it out for you. Ciphey can solve most things in 3 seconds or less. Ciphey aims to be a tool to automate a lot of decryptions & decodings such as multiple base encodings, classical ciphers, hashes or more advanced cryptography. If you don't know much about cryptography, or you want to quickly check the ciphertext before working on it yourself, Ciphey is for you. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 15
    PyExfil

    PyExfil

    A Python Package for Data Exfiltration

    ...The purpose of PyExfil is to set as many exfiltrations, and now also communication, techniques that CAN be used by various threat actors/malware around to bypass various detection and mitigation tools and techniques. You can track changes at the official GitHub page. Putting it simply, it’s meant to be used as a testing tool rather than an actual Red Teaming tool. Although most techniques and methods should be easily ported and compiled to various operating systems, some stable some experimental, the transmission mechanism should be stable on all techniques. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Keylogger

    A simple keylogger for Windows, Linux and Mac

    ...A keystroke logger or keylogger is basically a program that records keystrokes and saves them in a log file on your local computer. This keylogger is simple and bare bones, but works wonderfully and is useful for a number of things. You can use it to track key movements and make sure no one is using your computer while you’re away, or use it for self-analysis. In businesses and offices it can be used to monitor employee activity; in schools it can track keystrokes and log banned words.
    Downloads: 60 This Week
    Last Update:
    See Project
  • 17
    KeexyBox

    KeexyBox

    The box to keep the Internet under your control

    ...It thus intercepts all connections to the Internet to carry out website filtering or to activate browsing via the Tor anonymity network according to connection profiles which you have configured.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18
    NH Folder Hider and Locker

    NH Folder Hider and Locker

    NH Folder Hider and Locker 1.0 is a powerful application which provide

    ...It has a well-organized and very interactive interface which provides you the modernized and visually attractive design. It manages almost all the major actions in a side panel and provides you all the necessary tools.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 19
    KeyGen

    KeyGen

    Cards based password storer

    Forgot your password or want to create new one that can never be guessed? That's KeyGen is for: make you not to remember all these passwords for countless amount of services. KeyGen provides cards based interface which makes the app easy to deal with.
    Downloads: 53 This Week
    Last Update:
    See Project
  • 20
    mongoaudit

    mongoaudit

    A powerful MongoDB auditing and pentesting tool

    ...This fact, combined with abundant lazy system administrators and developers, has led to what the press has called the MongoDB apocalypse. mongoaudit not only detects misconfigurations, known vulnerabilities and bugs but also gives you advice on how to fix them, recommends best practices and teaches you how to DevOp like a pro! MongoDB listens on a port different to default one. Server only accepts connections from whitelisted hosts / networks. MongoDB HTTP status interface is not accessible on port 28017. MongoDB is not exposing its version number. MongoDB version is newer than 2.4. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Password Generator

    Password Generator

    An easy, simple, secure program that helps you generate secure passwor

    A program made with Python, consists of generating passwords of the characters that you request, it can generate passwords from 1 character to X, the one that you put to him. It is a secure program, created personally by me, the passwords are not stored in any place, only YOU have them. I hope you like it, I will release new versions as time goes by. The next version will add new features.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Terminal File Encrypter

    Command Line File Encrypter / Decrypter, Using AES256-CBC Cryptography

    ...Type "pip3 install Setup.py" without quotes. Read Syntax (Readme).txt file for instructions on use. To Uninstall - Open CMD / Terminal window, first type "pip3 list" without quotes. You Should See Terminal File Encrypter listed. Please Note pip3 may list the name differently for example it may have underscores, etc in the name. If so to uninstall you will need to type in the way it shows in the list. Type "pip3 uninstall Terminal File Encrypter" without quotes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    mssqlproxy

    mssqlproxy

    Toolkit aimed to perform lateral movement in restricted environments

    mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse. The client requires impacket and sysadmin privileges on the SQL server. The first step is to execute code in the SQL Server process context. As extended stored procedures are going to be deprecated in future versions of MSSQL, we pay attention to Microsoft recommendations and thus, use CLR assemblies instead.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    WhatWaf?

    WhatWaf?

    Detect and bypass web application firewalls and protection systems

    WhatWaf is an advanced firewall detection tool who's goal is to give you the idea of "There's a WAF?". WhatWaf works by detecting a firewall on a web application and attempting to detect a bypass (or two) for said firewall, on the specified target.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    BLESS

    BLESS

    An SSH Certificate Authority that runs as an AWS Lambda function

    ...Because BLESS needs access to a private key that is trusted by your hosts, an isolated AWS account helps restrict who can access that private key, or modify the BLESS code you are running. AWS Lambda functions can use an AWS IAM Policy to limit which IAM Roles can invoke the Lambda Function. If properly configured, you can restrict which IAM Roles can request SSH Certificates.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB