Showing 119 open source projects for "mpv-1.dll"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    mitmproxy

    mitmproxy

    A free and open source interactive HTTPS proxy

    mitmproxy is an open source, interactive SSL/TLS-capable intercepting HTTP proxy, with a console interface fit for HTTP/1, HTTP/2, and WebSockets. It's the ideal tool for penetration testers and software developers, able to debug, test, and make privacy measurements. It can intercept, inspect, modify and replay web traffic, and can even prettify and decode a variety of message types. Its web-based interface mitmweb gives you a similar experience as Chrome's DevTools, with the addition of features like request interception and replay. ...
    Downloads: 19 This Week
    Last Update:
    See Project
  • 2
    holehe

    holehe

    Check if the mail is used on different sites

    holehe is a Python-based OSINT utility designed to determine whether a specific email address is registered across a wide range of online services. The tool works by leveraging password-reset mechanisms and other public account-existence checks to infer whether an email is associated with accounts on major platforms. It supports more than a hundred websites and is commonly used during reconnaissance, digital investigations, and account exposure assessments. holehe is designed to operate...
    Downloads: 20 This Week
    Last Update:
    See Project
  • 3
    WAFW00F

    WAFW00F

    WAFW00F allows one to identify and fingerprint Web App Firewall

    The Web Application Firewall Fingerprinting Tool. Sends a normal HTTP request and analyses the response; this identifies a number of WAF solutions. If that is not successful, it sends a number of (potentially malicious) HTTP requests and uses simple logic to deduce which WAF it is. If that is also not successful, it analyses the responses previously returned and uses another simple algorithm to guess if a WAF or security solution is actively responding to our attacks. For further details,...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    Xteam

    Xteam

    All-in-one command-line toolkit for security testing and OSINT tools

    Xteam is a command-line security toolkit designed to provide multiple penetration testing and information-gathering utilities in a single interface. It combines several modules and external tools to help users perform security research tasks related to mobile devices, wireless networks, and online services. It acts as a centralized launcher that integrates scripts and third-party tools, allowing users to access different testing functions through a menu-based command line workflow. Xteam...
    Downloads: 9 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    GHunt

    GHunt

    Offensive Google framework

    ...It's currently focused on OSINT, but any use related with Google is possible. It will automatically use venvs to avoid dependency conflicts with other projects. First, launch the listener by doing ghunt login and choose between 1 of the 2 first methods. Put GHunt on listening mode (currently not compatible with docker) Paste base64-encoded cookies. Enter manually all cookies. The development of this extension has followed Firefox guidelines to use the Promise-based WebExtension/BrowserExt API being standardized by the W3 Browser Extensions group, and is using webextension-polyfill to provide cross-browser compatibility with no changes.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    Argus

    Argus

    Python toolkit for OSINT and reconnaissance with 135+ modules

    ...Its interactive CLI allows users to browse available modules, configure targets, run scans, and review results from within a unified interface. The project aims to reduce the complexity of using multiple separate reconnaissance tools by bringing them together in one streamlined platform. Argus also supports integrations with external intelligence services.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    BBOT

    BBOT

    The recursive internet scanner for hackers

    ...BBOT is particularly valuable for security researchers and red teamers who need to automate multi-stage discovery processes across complex infrastructures. Its architecture supports chaining multiple reconnaissance techniques together, enabling continuous discovery rather than one-off scans. The tool balances power and usability by providing sensible defaults while still exposing deep configuration options for advanced users.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    sqlmap

    sqlmap

    Automatic SQL injection and database takeover tool

    sqlmap is a powerful, feature-filled, open source penetration testing tool. It makes detecting and exploiting SQL injection flaws and taking over the database servers an automated process. sqlmap comes with a great range of features that along with its powerful detection engine make it the ultimate penetration tester. It offers full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, and many other database management systems. It also...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 9
    discover

    discover

    Automation framework for reconnaissance and penetration testing tasks

    ...Discover also integrates with well-known security tools like Metasploit to generate malicious payloads and manage listeners for exploitation tasks. By organizing multiple security utilities and scripts into one environment, the project reduces repetitive manual steps and standardizes penetration testing workflows. The tool is commonly used in Kali Linux environments.
    Downloads: 1 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 10
    OAuthLib

    OAuthLib

    A generic, spec-compliant, thorough implementation of the OAuth

    A generic, spec-compliant, thorough implementation of the OAuth request-signing logic for Python 3.8+. OAuthLib is a framework which implements the logic of OAuth1 or OAuth2 without assuming a specific HTTP request object or web framework. Use it to graft OAuth client support onto your favorite HTTP library, or provide support onto your favourite web framework. If you're a maintainer of such a library, write a thin veneer on top of OAuthLib and get OAuth support for very little effort.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    GRR

    GRR

    GRR Rapid Response, remote live forensics for incident response

    ...The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. “Work” means running a specific action, downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers, fleetspeak) and provides a web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    BleachBit

    BleachBit

    deletes junk files to free disk space and improve privacy

    BleachBit frees disk space and maintains privacy. Cleans cache, Internet history, temporary files, logs, cookies, Firefox, Google Chrome, Flash, Windows, Linux, and more. Downloads are at www.bleachbit.org and source code is at GitHub.
    Leader badge
    Downloads: 1,941 This Week
    Last Update:
    See Project
  • 13
    Robolinux

    Robolinux

    Announcing Robolinux Cinnamon 14.1

    Announcing The New Robolinux Series 14 Mate LTS - 2034 Robolinux is very pleased to announce a completely new 14.1 Mate privacy centered 1inux operating system you can download freely while also offering our users an optional 14+ advanced upgrade which comes with our Untracker and FAAST Boot along with one click popular privacy software installers like Tor and I2p, Wireshark and Bleachbit plus many more for a fair and reasonable price. Robolinux14.1-Mate is ideal for beginners and advanced users. We are proud that it comes with Enoch AI which is TOTALLY 100% PRIVATE, FREE, HONEST & UNCENSORED built into Robolinux Cinnamon 14.1 The Robolinux 14.1 version with rock solid Long Term Support through 2034! ...
    Leader badge
    Downloads: 126 This Week
    Last Update:
    See Project
  • 14
    key-elf

    key-elf

    Forensic tool to recover lost BTC private keys.

    ...If you accidentally deleted your Bitcoin Core wallet or formatted your disk, this tool can help. It bypasses the file system and scans the raw data directly, looking for the unique "fingerprint" (ASN.1 signature) of Bitcoin private keys to recover them from the digital wreckage.The Graphical User Interface (GUI) is the advanced/premium version. If needed, please visit: https://gitlab.com/8891689/key-elf
    Leader badge
    Downloads: 36 This Week
    Last Update:
    See Project
  • 15
    Archive Extractor
    ...Please note that if you only have 7z installed, you will not be able to extract .rar files, but only .zip or .7z files. This tool is primarily designed to extract files from password-protected Rar/Zip/7z archives, although it also works on unprotected archives. You can extract one or more archives of different types at a time. It is important to note that the passwords must be known; this is NOT a "cracking software" or "password recovery tool."
    Downloads: 5 This Week
    Last Update:
    See Project
  • 16
    BT Auto Locker

    BT Auto Locker

    A Bluetooth-based proximity locking tool for Windows

    ...BT Auto Locker is an intelligent utility for Windows that automatically locks your computer whenever a trusted Bluetooth device (such as your phone, headphones, or watch) moves beyond the specified range, ensuring your system remains secure. BT Auto Locker v1.0.4 Release Date: August 1, 2025 -Fixed an issue where the "Check for Updates" feature was non-functional. -Corrected the "Contact Support" email link in the Help menu. Source Code (Github): https://github.com/BT-Auto-Locker/BT-Auto-Locker Official Release (Microsoft Store): https://apps.microsoft.com/detail/9ntznn3dbp2s?hl=en-US
    Downloads: 7 This Week
    Last Update:
    See Project
  • 17
    Secure Password Manager

    Secure Password Manager

    Application to generate, store, and manage passwords with encryption

    ...Password Export: Export your passwords in Excel format for backup or transfer. Comprehensive Management: Easily manage passwords for accounts, applications, and servers in one place.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18
    OnionSearch

    OnionSearch

    Search multiple Tor .onion engines at once and collect hidden links.

    OnionSearch is a Python-based command-line tool designed to collect and aggregate links from multiple search engines on the Tor network. The script works by scraping results from a variety of .onion search services, allowing users to perform a single query while gathering results from many sources at once. This approach helps researchers and investigators locate hidden services more efficiently without manually querying each individual search engine. It is primarily intended for educational...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 19
    PTBC

    PTBC

    irreversible encryption with time self-destruction

    ...Key features: AES-CFB encryption with per-file IV Argon2id key derivation with 256MB RAM resistance TTL (time to live) built directly into the encrypted file HMAC-SHA512 integrity verification Self-deleting mode (--autowipe) and one-time access marking (--onetime) No file metadata, no recovery, no password resets Philosophy: If you lose the password - it’s over. If time expires - it’s gone. PTBC doesn’t forgive, doesn’t forget, and doesn’t leak. https://github.com/01alekseev/PTBC
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Midbar Firebase Edition

    Midbar Firebase Edition

    Midbar Firebase Edition stores data in the cloud, keeps keys on device

    ...It comes with the firmware for the hardware IoT data vault and the desktop app that's synced with the vault via the Google Firebase. A vault and an app can be used without one another. The GitHub repository is available at github.com/Northstrix/Midbar-Firebase-Edition Tutorial for V1 https://www.instructables.com/DIY-IoT-Data-Vault-With-Google-Firebase/ Tutorial for V2 https://medium.com/@Northstrix/syncing-mcu-password-vault-with-desktop-app-using-google-firebase-28963e060444 Tutorial for V3 https://www.instructables.com/DIY-Advanced-IoT-Password-Vault-Synced-With-Deskto/ GitHub Repository: https://github.com/Northstrix/Midbar-Firebase-Edition
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Electronic Shelf Label  Firebase Edition

    Electronic Shelf Label Firebase Edition

    An electronic shelf label is a type of price tag

    ...For more information please visit https://github.com/Northstrix/Electronic-Shelf-Label-Firebase-Edition You can find the tutorial on V2.0: https://www.instructables.com/DIY-IoT-Electronic-Shelf-Label-With-Google-Firebas-1/ V1.0: https://www.instructables.com/DIY-IoT-Electronic-Shelf-Label-With-Google-Firebas/ The desktop app is made with the help of the ChatGPT.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Portfolio Secure 22 [I.S.A]

    Portfolio Secure 22 [I.S.A]

    Portfolio Secure 22 [Improved.Simplified.Alternative]

    'Portfolio Secure' is an desktop application developed using python 3.6.8 and other add-on libaries. Can secure files or folders by encrypting into a unreadable file (.enc) . Portfilio secure has two parts: 1) Folder Guardian - converts folders into unreadable file (.enc) 2) File Guardian - converts files into unreable file (.enc) Compatible only for windows OS.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Wemake Django Template

    Wemake Django Template

    Bleeding edge django template focused on code quality and security

    ...The main idea of this project is to provide a fully configured template for django projects, where code quality, testing, documentation, security, and scalability are number one priorities. This template is a result of implementing our processes, it should not be considered as an independent part. When developing this template we had several goals in mind. Development environment should be bootstrapped easily, so we use docker-compose for that. Development should be consistent, so we use strict quality and style checks. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    DDoS/Dos Attack Simulator

    DDoS/Dos Attack Simulator

    Distributed Denial of Service Attack Simulator

    ...A server that does not have protection against it can experience extremely slow performance due to all of the traffic it sends. Extensive features will be added! Mega Feature - > DoS Tool. [ 1 ] Bugs Fixes. [ 2 ] Increase in Optimization. [ 3 ] DoS Attacks. Note: The following program is intended for educational purposes only. I ( Muhammad Sami Furqan ) am not responsible for any damage you do by utilizing this software. Read the License Agreement for more info about the Redistribution and Copyright of this Open-Source Program. ...
    Downloads: 29 This Week
    Last Update:
    See Project
  • 25
    EG ClamNet Antivirus

    EG ClamNet Antivirus

    A simple antivirus that provide a graphical interface for ClamAV

    ...EG ClamNet antivirus is simple and user friendly antivirus (currently for Windows OS ) that uses ClamAV as an internal scanning engine to detect trojans, viruses, malware and other known malicious threats. It can be installed on the existing default windows antivirus (Windows Defender) and compatible with it as extra protection. 1) Antivirus & Internet Security: EG ClamNet Antivirus is powered by ClamAV which has fast scanning, detects over 9 millions viruses, malware, worms and trozens. It also protects from MS Office macro viruses, mobile malware, other threats (including known ransomware). 2) Cleaner: EG ClamNet Antivirus has an additional feature of effective cleaning of junk files. ...
    Downloads: 18 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB