Showing 105 open source projects for "quick"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    Laravel Wallet

    Laravel Wallet

    Easy work with virtual wallet

    laravel-wallet - Easy to work with virtual wallet.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    Mitaka

    Mitaka

    Browser extension for fast OSINT searches and IOC investigation

    Mitaka is a browser extension designed to streamline Open Source Intelligence (OSINT) investigations by enabling quick searches and scans directly from the browser. It allows security researchers, analysts, and investigators to easily examine various indicators of compromise (IoCs) such as IP addresses, domains, URLs, hashes, email addresses, and more. Instead of manually copying and pasting suspicious indicators into multiple intelligence platforms, users can simply highlight a value on any webpage and access multiple OSINT services through a context menu. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Mullvad VPN desktop and mobile app

    Mullvad VPN desktop and mobile app

    The Mullvad VPN client app for desktop and mobile

    ...We do not keep activity logs or ask for personal information, and we even encourage anonymous payments using cash or any of the accepted cryptocurrencies. Your IP address will be replaced with one of ours, ensuring that device activity and location are not linked to your user. Using Mullvad is quick and easy - just download and install the app. Don't spend time on complicated setup and multi-step registration processes. We designed Mullvad to be easy to use. Privacy is essential in a well-functioning society, as it allows norms, ethics and laws to be safely debated and challenged. Without privacy, a free and open society cannot flourish or exist.
    Downloads: 56 This Week
    Last Update:
    See Project
  • 4
    Is Website Vulnerable

    Is Website Vulnerable

    Finds publicly known security vulnerabilities in a website's frontend

    A command-line tool that scans websites for known security vulnerabilities in their frontend dependencies by checking against the Snyk vulnerability database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    K9s

    K9s

    Kubernetes CLI To Manage Your Clusters In Style!

    ...K9s continually watches Kubernetes for changes and offers subsequent commands to interact with your observed resources. Provides standard cluster management commands such as logs, scaling, port-forwards, restarts. Define your own command shortcuts for quick navigation via command aliases and hotkeys. Plugin support to extend K9s to create your very own cluster commands. Powerful filtering mode to allow user to drill down and view workload related resources. Supports for viewing RBAC rules such as cluster/roles and their associated bindings. Reverse lookup to asserts what a user/group or ServiceAccount can do on your clusters. ...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 6
    SELKS

    SELKS

    A Suricata based IDS/IPS/NSM distro

    ...The usage of Suricata data is further enhanced by Stamus' developed Scirius, a threat-hunting interface. The interface is specifically designed for Suricata events and combines a drill-down approach to pivot for quick exploration of alerts and NSM events. It includes predefined hunting filters and enhanced contextual views.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    Domain Digger

    Domain Digger

    Domain analysis toolkit for DNS, IP, and WHOIS lookups

    ...This can be useful for developers, security researchers, system administrators, and anyone working with domain infrastructure. Domain Digger aims to streamline domain analysis workflows by offering quick lookups and consolidated data sources in one environment.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    OpenFGA
    ...OpenFGA is designed to make it easy for developers to model their application permissions and add and integrate fine-grained authorization into their applications. It allows in-memory data storage for quick development, as well as pluggable database modules. It currently supports PostgreSQL 14, MySQL 8, and SQLite (currently in beta). It offers an HTTP API and a gRPC API. It has SDKs for Java, Node.js/JavaScript, GoLang, Python, and .NET. Look in our Community section for third-party SDKs and tools. It can also be used as a library. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    EMAGNET

    EMAGNET

    Automated hacking tool to find leaked databases with 97.1% accuracy

    Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password. Before using Emagnet, please remember that with great power comes great responsibility. Pastebin patched the vulnerability I previously used in order to get recent uploads, so at the moment it is not possible to get recently uploaded files, you are now limited to all syntaxes exempt the default one (95% get's uploaded as 'text' and this is removed from all recent upload lists). Bruteforce...
    Downloads: 4 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 10
    Internal All The Things

    Internal All The Things

    Active Directory and Internal Pentest Cheatsheets

    Internal All The Things is a large, community-driven cheat-sheet and documentation repository focused on internal network penetration testing and Active Directory (AD) exploitation. It covers a broad range of topics; AD certificate services, Kerberos attacks, lateral movement, tooling, post-exploitation techniques, and networking. The content is designed to help both learners and experienced red-teamers fill gaps in their internal pentest knowledge, especially for environments where AD and...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Personal Security Checklist

    Personal Security Checklist

    A compiled checklist of 300+ tips for protecting digital security

    Personal Security Checklist is a comprehensive, plain-language checklist for improving personal digital security and privacy across devices, accounts, and everyday workflows. It’s organized so that complete beginners can make quick, high-impact changes, while advanced users can dig into deeper hardening steps. The guidance spans topics like passwords, 2FA, device encryption, browser hygiene, network safety, backups, and incident response planning. Each section breaks recommendations into actionable, bite-sized items with brief explanations, helping you understand the “why” as well as the “how.” ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    Personal Management System

    Personal Management System

    Your web application for managing personal data

    ...You can use tools to keep track of your goals progress or use the payments submodule to keep an eye of the money amount that you want to collect for something. Add any personal note to the desired category. Here, you can keep any small information that you need; it can be either quick notes from phone calls, a bunch of information collected all around different pages, or some links to things that you want to check somewhere later in the future.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    SIPVicious

    SIPVicious

    Security tools that can be used to audit SIP based VoIP systems

    SIPVicious OSS has been around since 2007 and is actively updated to help security teams, QA and developers test SIP-based VoIP systems and applications. Open-source security suite for auditing SIP based VoIP systems. Also known as friendly-scanner, it is freely available to help pentesters, security teams and developers quickly test their SIP systems. Download the latest source code from git or the latest release, send pull requests and open issues. Install the latest and greatest release...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Windows Super God Mode

    Windows Super God Mode

    Creates shortcuts to virtually every special location or action built

    ...It automates creation of “God Mode” folders and other control-panel shortcuts, removes the need to manually hunt through layers of Settings or the Registry, and often bundles helper scripts for common maintenance tasks. The intent is to put power-user features—tweaks for privacy, appearance, power management, and system behavior—within quick reach so administrators and enthusiasts can configure machines consistently. Because many of the actions touch system settings, the collection emphasizes clear instructions and reversible steps so users can roll back changes if needed. It’s valuable for technicians who want a reproducible baseline for customizing Windows installs, or for home users curious about otherwise-obscure controls.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    AzureAD Attack Defense

    AzureAD Attack Defense

    This publication is a collection of various common attack scenarios

    AzureAD-Attack-Defense is a community-maintained playbook that collects common attack scenarios against Microsoft Entra ID (formerly Azure Active Directory) together with detection and mitigation guidance. The repository is organized into focused chapters — for example: Password Spray, Consent Grant, Service Principals in Azure DevOps, Entra Connect Sync Service Account, Replay of Primary Refresh Token (PRT), Entra ID Security Config Analyzer, and Adversary-in-the-Middle — each written to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    fosite

    fosite

    Extensible security first OAuth 2.0 and OpenID Connect SDK for Go

    ...OpenID Connect is implemented according to OpenID Connect Core 1.0 incorporating errata set 1 and includes all flows: code, implicit, and hybrid. OAuth2 and OpenID Connect are difficult protocols. If you want quick wins, we strongly encourage you to look at Hydra. Hydra is a secure, high-performance, cloud native OAuth2 and OpenID Connect service that integrates with every authentication method imaginable and is built on top of Fosite.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    kcp Kubernetes

    kcp Kubernetes

    Kubernetes-like control planes for form-factors

    ...The goal is to be useful to cloud providers as well as enterprise IT departments offering APIs within their company. kcp takes full advantage of Kubernetes API conventions, the glue that binds the cloud-native technology ecosystem together and imbues Kubernetes popular end-user experience, but kcp has unbound it from Kubernetes workload orchestration and clusters. kcp implements fully-isolated workspaces, each acting as its own Kubernetes-like cluster, with its own URL, its own set of APIs (e.g. different CRDs), its own RBAC, but as cheap and quick as a namespace.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    AutoTypeSearch

    AutoType Quick Search plugin for KeePass

    This is a plugin to KeePass <http://www.KeePass.info> to provide a quick searching capability as an enhancement to the global auto-type system. If a global auto-type is requested, but no matching entry for the active window is found, this plugin will show a quick as-you-type search window which lets you to easily pick the entry to auto-type. It is also possible to open/edit, show, open the url for, or copy the password for the entry that is found.
    Leader badge
    Downloads: 106 This Week
    Last Update:
    See Project
  • 19
    Securepoint SSL VPN Client

    Securepoint SSL VPN Client

    SSL VPN Client for Windows (OpenVPN).

    SSL VPN Client for Windows (OpenVPN).
    Leader badge
    Downloads: 861 This Week
    Last Update:
    See Project
  • 20
    WinRAR

    WinRAR

    Compress, Encrypt, Package and Backup with only one utility

    WinRAR is a powerful file archiver and compression tool that supports multiple file formats, including RAR and ZIP. It is widely used for compressing large files into smaller, more manageable sizes and decompressing files into their original format. WinRAR offers advanced features for both personal and professional use, such as file encryption, password protection, and splitting large files into smaller parts for easier storage or transfer. Its intuitive interface makes it easy for users to...
    Downloads: 318 This Week
    Last Update:
    See Project
  • 21
    BleachBit

    BleachBit

    deletes junk files to free disk space and improve privacy

    BleachBit frees disk space and maintains privacy. Cleans cache, Internet history, temporary files, logs, cookies, Firefox, Google Chrome, Flash, Windows, Linux, and more. Downloads are at www.bleachbit.org and source code is at GitHub.
    Leader badge
    Downloads: 1,539 This Week
    Last Update:
    See Project
  • 22
    Slim Camera

    Slim Camera

    Slim Camera - Lightweight RTSP Video Player

    Slim Camera is a lightweight RTSP viewer for IP cameras. On first launch, it prompts for the stream URL (saved for future sessions) and runs in the system tray to avoid taskbar clutter. It remembers window position, size, and camera URL via an INI file for seamless reuse. The interface keeps distractions minimal - just the video stream in an auto-sizing window. Right-click the tray icon to change the camera URL, restart the stream, reset window position, or exit. Press F1 to quickly...
    Downloads: 84 This Week
    Last Update:
    See Project
  • 23
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located on a remote cloud storage, by only reading/fetching the necessary data to perform the operation. Dar saves *all* UNIX inode types, takes care of hard links, sparse files as well as Extended Attributes (MacOS X file forks, Linux ACL, SELinux tags, user attributes) and some Filesystem Specific Attributes (Linux ext2/3/4, Mac OS X HFS+) more details at: http://dar.linux.free.fr/doc/Features.html
    Leader badge
    Downloads: 474 This Week
    Last Update:
    See Project
  • 24
    WPAGen

    WPAGen

    Wifi Password Generator

    WPAGen is a wifi password generator written in Python. It runs in the terminal and has very few dependencies other than Python itself, and if you're using the compiled binary you don't even have to have Python installed. I digitally sign some files in my releases. If you'd like to verify those signatures, you can find my PGP/GPG keys at: https://marcusadams.me/keys.html If you'd like to donate there's several ways to do so: PayPal: https://paypal.me/gerowen Bitcoin (BTC):...
    Leader badge
    Downloads: 22 This Week
    Last Update:
    See Project
  • 25

    YoungerSibling

    YoungerSibling: Cross-platform OSINT tool for quick data gathering.

    YoungerSibling is a Python-based terminal utility script designed for educational purposes. It provides a set of useful tools to perform tasks like searching the web, performing lookups (Google search, IP lookup, username lookup, etc.), and extracting metadata from images, directly from the terminal. This project aims to help students, developers, and hobbyists learn about web scraping, API usage, and terminal interaction with Python.
    Downloads: 6 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB