Showing 140 open source projects for "kali linux command"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    PacketFlow is a command line utility that processes an XML configuration to generate a set of firewall rules. It is intended to be installed and run directly on the firewall itself. PacketFlow was designed to deal with complex configurations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Themis is a new security scanner that search the network hosts for security problems and and present a report.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Polydish is a polymorphic Internet server capable of accepting pluggable protocols (written in Python or Ruby), and can thereby serve any type of content imaginable. The backend code is a fast, secure, C-based server, employing thread pools and OpenSSL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    deface-no-tnx is an anti-defacement system that monitors your Web files and notifies you about unallowed changes. It also replaces the defaced page with a standard "error" page,so that no offensive/joking content can be frauodolently added to your site
    Downloads: 0 This Week
    Last Update:
    See Project
  • Leverage AI to Automate Medical Coding Icon
    Leverage AI to Automate Medical Coding

    Medical Coding Solution

    As a healthcare provider, you should be paid promptly for the services you provide to patients. Slow, inefficient, and error-prone manual coding keeps you from the financial peace you deserve. XpertDox’s autonomous coding solution accelerates the revenue cycle so you can focus on providing great healthcare.
    Learn More
  • 5
    Automatically verifies md5 and sha1 checksums using either a user entered sum or by searching in a file that can be held locally or remotely via ftp or http.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A python binding for the iptables tools. The binding allows direction manipulation of the iptables through an object oriented and transaction based manner. The binding removes the need to call iptable on the command line in python applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    PassKool is a deterministic password generator in Python. From a given passphrase, a more or less pronouncable password is generated using a one-way function. If you happen to forget the password, you can still retrieve it using your passphrase.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Development area for GNU/Linux 2.6.x for the KS8695 ARM SoC. Covers kernel patches, drivers for serial, Ethernet, PCI, GPIO, watchdog subsystems, and drivers for optional PCI based devices such as USB, WiFi, WiMAX, IPSec, SSL, and RSA devices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Sherlock Roams is a Python-based password auditing tool for Un*x-based systems. It uses a brute force approach on the shadow file (or the regular password file if that fails) to determine which users on your system have obviously insecure passwords.
    Downloads: 0 This Week
    Last Update:
    See Project
  • BoldTrail Real Estate CRM Icon
    BoldTrail Real Estate CRM

    A first-of-its-kind homeownership solution that puts YOU at the center of the coveted lifetime consumer relationship.

    BoldTrail, the #1 rated real estate platform, is built to power your entire brokerage with next-generation technology your agents will use and love. Showcase your unique brand with customizable websites for your company, offices, and every agent. Maximize lead capture with a modern, portal-like consumer search experience and intelligent behavior tracking. Hyper-local area pages, home valuation pages and options for rich lifestyle data keep customers searching with your brokerage as the local experts. The most robust lead gen tools on the market help your brokerage, teams & agents effectively drive new business - no matter their budget. Empower your agents to generate free leads instantly with our simple to use landing pages & IDX squeeze pages. Drive more leads with higher quality and lower cost through in-house tools built within the platform. Diversify lead sources with our automated social media posting, integrated Google and Facebook advertising, custom text codes and more.
    Learn More
  • 10
    CryptoPy is a pure python implmentation of cryptographic algorithms and applications. The algorithms are developed for readability more than speed. The collection now includes IEEE 802.11i specific algorithms that generated the test vectors for 802.11i.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A command line utility for managing passwords and other login information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    tesse is Transparent Extensible Steganographic fileSystem with Encryption
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Web Security Assessment Tool (WSAT) is a tool that search for vulnerabilities in Web applications. It is in the very early phase of development
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A blind SQL injection tool inspired by sqlmap and written in the Python language.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    OpenSQLi-NG is the next generation open source sql injection tool. It silently test and exploit (on-demand) SQL injections conditions. Please refer to the project web site to have the complete description: http://opensqling.sourceforge.net/?page_id=8
    Downloads: 0 This Week
    Last Update:
    See Project