Search Results for "source testing unit testing" - Page 14

Showing 361 open source projects for "source testing unit testing"

View related business solutions
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1
    A java application for creating, playing and solving SuDoku puzzles of various types. Features both a Swing GUI and command-line operation. The automatic solving of puzzles uses "smart" techniques rather than a brute force search of every possibility.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    DES Cracker is a small perl script that cracks DES encrypted passwords.Currently there is only a brute force implementation where phrases are generated. Later version will have a possibility to use word lists for cracking.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Adapdev.NET is an enterprise framework that builds on the Microsoft.NET framework, providing enhanced components for object caching, database access and querying, code generation, unit testing and encryption, among others.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Network Threat Simulation Tool (NTST) will be able to effectively simulate any network security threat including worms, Trojans, spywares, & exploits. It will help in testing the effectiveness of network security devices like IDS/IPS/Firewall.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 5
    RevolvingProxy is a cross platform HTTP Proxy application that is designed to be installed on a server that has been assigned multiple IP addresses. Each connecting client is assigned a different IP address for security testing or other purposes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This package is a suite of tools meant to allow for the low-level manipulation of Java classes and Java Archive (JAR) files in a hostile environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    LeakTrack provides memory leak tracking and out-of-range access checks for acquired memory blocks for you C/C++ applications on each platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    InsecureWebApp is a web app that includes common web application vulnerabilities including SQL&Html Injection- see owasp.org. It is a target for automated and manual penetration testing, source code analysis, vulnerability assessments and threat modeling.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    DNScat is a "swiss-army knife" tool to tunnel traffic through DNS servers. It is a small, yet powerfull tool, similar to netcat. In conjunction with PPP server, it allows to build a VPN using DNS packets. DNScat is a useful tool for penetration testing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 10
    Pure-Java cryptographic calculator, featuring basic arithmetic operators, cryptographic operations, multiple key file formats and edition of ASN.1 object files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    CryptoHelper is a Java program designed to aid in the decryption of classical ciphers, ie pre WWII ciphers. It brings together tools like frequency analysis, friedman tests, enciphering/deciphering for several clasical ciphers, and brute force algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Windows Hijacker is a tool for hijacking tcp connections on Windows OS. WinHijacker include ARP Poisoner for Man In The Middle (MITM) and a small tcp/ip stack. For any problem go to 'Forums' section. The documentation is in 'Docs' section.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    This project provides a 'brute-force' search for optimum assembler fragments for Microchip Technology Inc's mid-range PIC processor range.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    GPP is a General Purpose Proxy Java graphical application intended mainly for packet inspection and modification. It's main idea is to be a little user-friendly portable man-in-the-middle tool for security analysis. Later, some protocols should be added
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A shell script which determines by brute force the best compression format (bzip2, gzip, Z, zip, etc.) and which compression level to use in order to archive a file the smallest possible.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Sherlock Roams is a Python-based password auditing tool for Un*x-based systems. It uses a brute force approach on the shadow file (or the regular password file if that fails) to determine which users on your system have obviously insecure passwords.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    An extensible, plugin-based HTTP proxy server suitable for penetration testing, development testing, protocol analysis and security assessment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Junto is a Java-based peer-to-peer framework which allows using, simulating, and testing different trust management models which can be employed in peer-to-peer networks. Junto is available for free under the terms of the GPL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Enables a user to view & alter all aspects of comunications with a web site via a proxy. Primarily used for security based penetration testing of web sites, it can also be used for debugging during development. Seen as part of a hacker toolkit.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Strength in numbers. Existing products we're involved in include port to Linux of Tony Forbes' MFAC for brute-force factorization of MM61 for relatively small factors, and further development and improvement of Tim Charron's ECMnet distributed computing f
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    Disk Optimizer selects files to be placed on any disk medium that will maximize the space used. It is very efficient in finding an optimum file set since it uses a Genetic Algorithm instead of brute force.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    Utilities for measuring characteristics of cryptographic hash functions: avalanche property, (partial) collision search, Maurer's universal statistical test, Filiol's Mobius ANF statistical analisys. EdonC, EdonR, MD5 and SHA-1 hash-plugins included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    The John Darm project aims at developping a software that can tests a brute force attack on weak UNIX passwords. It s a multi-client application that dispatches the calculations between the different clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Generic clustering/load-balancing platform (over a LAN or internet) using java based P2P Aorta workers that execute java "tasklets". Various tasklets can be implemented to solve fractals, process images, render webpages, crack RSA "brute force".
    Downloads: 2 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB