Showing 14 open source projects for "visual-cfd"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    Flowsint

    Flowsint

    Graph-based OSINT investigation platform w visual relationship mapping

    Flowsint is an open source OSINT investigation platform designed to help analysts explore and understand relationships between digital entities through a visual graph interface. The platform focuses on reconnaissance and open source intelligence workflows, enabling investigators to map connections between domains, IP addresses, organizations, individuals, and other data points. By presenting these relationships in an interactive graph, Flowsint allows users to quickly identify patterns, associations, and investigative leads that might be difficult to detect through traditional data analysis methods. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    dnstwist

    dnstwist

    Detects phishing and lookalike domains using DNS fuzzing techniques

    ...Security teams can use the tool to discover potential threats where attackers attempt to deceive users with lookalike domains. dnstwist also helps detect phishing activity by comparing web page content and visual similarity between domains using fuzzy hashing and perceptual hashing techniques. By automating DNS fuzzing and analysis, it provides organizations with an additional source of targeted threat intelligence. The tool can output results in structured formats, making it easier to integrate with security workflows or further analyze suspicious domains.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    ufonet

    ufonet

    UFONet - Denial of Service Toolkit

    UFONet - Is a set of hacktivist tools that allow launching coordinated DDoS and DoS attacks and combine both in a single offensive. It also works as an encrypted DarkNET to publish and receive content by creating a global client/server network based on a direct-connect P2P architecture. + FAQ: https://ufonet.03c8.net/FAQ.html -------------------------------------------- -> UFONet-v1.8 [DPh] "DarK-PhAnT0m!" (.zip) -> md5 = [ c8ab016f6370c8391e2e6f9a7cbe990a ] -> UFONet-v1.8...
    Downloads: 17 This Week
    Last Update:
    See Project
  • 4
    HostHunter

    HostHunter

    OSINT reconnaissance tool for discovering hostnames from IP addresses

    HostHunter is an open source reconnaissance tool designed to discover and extract hostnames associated with a large set of IPv4 or IPv6 addresses. It helps security professionals map IP addresses to virtual hostnames using a combination of OSINT data sources and active reconnaissance techniques. This approach enables users to identify hidden or additional services that may be hosted behind a single IP address. By correlating hostname information from certificates, APIs, HTTP headers, and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Streamline Azure Security with Palo Alto Networks VM-Series Icon
    Streamline Azure Security with Palo Alto Networks VM-Series

    Centrally manage physical and virtualized firewalls with Panorama

    Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
    Learn more
  • 5
    NH Folder Hider and Locker

    NH Folder Hider and Locker

    NH Folder Hider and Locker 1.0 is a powerful application which provide

    NH Folder Hider and Locker 1.0 is a powerful application which provides you the means to protect your PC files from the unauthorized access. As we all know that nowadays every computer is connected with the Internet so there is always a threat for your personal data to be accessed. There is always danger if you are having the confidential files in your PC so this software offers that extra sense of security. It has a well-organized and very interactive interface which provides you the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    AttackSurfaceMapper

    AttackSurfaceMapper

    Automated tool for mapping & expanding organization’s attack surface

    AttackSurfaceMapper (ASM) is a reconnaissance and attack surface discovery tool designed to automate the process of mapping potential targets within an organization's infrastructure. It combines open source intelligence (OSINT) with selective active reconnaissance techniques to expand and analyze a target’s external attack surface. Users can supply domains, subdomains, or IP addresses as input, and applies multiple discovery methods to identify additional related assets such as new...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    General software and open source projects
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    CamDesk

    CamDesk

    The Desktop Webcam Widget

    CamDesk is a free, open source, desktop webcam widget, that was created as home surveillance application. Although others have used it for demonstrations even with CamStudio, and QuickTime Player for screen casting.
    Downloads: 44 This Week
    Last Update:
    See Project
  • 9
    Cyberbit

    Cyberbit

    Visual Cryptography and Bit-Plane Complexity Segmentation in Python

    ...Cyberbit lets you transmit a secret message to an intended person in a new manner. The secret message is an 1-bit deep black & white image. The message can contain written text, a drawing, a secret code etc. Using Visual Cryptography the application splits the secret message into two "shadow images" called <<shares>>. Any of the two shares will be embedded into a "normal" image file called by tradition <<vessel>>. You can use a method of hand to send the two vessels to your correspondent. For instance you can post one vessel image on facebook. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10

    pylsb-toolkit

    a small and simple toolkit for LSB based steganalysis

    This is a small and simple toolkit that might be useful during steganalysis, it is currently composed by several general purpose command line tools. NOTE: this project has been moved to https://github.com/luca-m/lsb-toolkit
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Chi's Project

    The projects of ChiNvo Studio

    The projects of ChiNvo Studio
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    PyEvcs

    Extended Visual Cryptography Schemes in Python

    Visual Cryptography is a graphical form of information concealing. In a 2-out-of-2 Visual Cryptography Scheme a dealer will "split" a secret image into two shares, print the shares onto separate transparencies and hand them to the participants to the scheme. If the two participants come together, they'll be able to reveal the secret image without a computer, perfectly superimposing the transparencies they own.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    VDE2 OpenMoko Tunnel is a Python/GTK visual interface created for OpenMoko Freerunner. It is intended to build virtual ethernet tunnels to remote VDE switches. This program is released under the GPL v2 as part of the Virtualsquare project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Visual interface to graphically manage antiviruses. Multilingual!. Needs Python with Gtk libraries and, of course, the (free or non-free) antivirus-es to be managed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB