Showing 39 open source projects for "remote command"

View related business solutions
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 1
    gost

    gost

    GO Simple Tunnel, a simple tunnel written in golang

    ...In addition to configuring services directly from the command line, parameters can also be set by specifying the external configuration file with the -C parameter.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 2
    go-mitmproxy

    go-mitmproxy

    mitmproxy implemented with golang

    go-mitmproxy is a Golang implementation of mitmproxy that supports man-in-the-middle attacks and parsing, monitoring, and tampering with HTTP/HTTPS traffic. Parses HTTP/HTTPS traffic and displays traffic details via a web interface. Supports a plugin mechanism for easily extending functionality. Various event hooks can be found in the examples directory. HTTPS certificate handling is compatible with mitmproxy and stored in the ~/.mitmproxy folder. If the root certificate is already trusted...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    thc-hydra

    thc-hydra

    Shows how easy it would be to gain unauthorized access to a system

    ...Via the command line options you specify which logins to try, which passwords, if SSL should be used, how many parallel tasks to use for attacking, etc. PROTOCOL is the protocol you want to use for attacking, e.g. ftp, smtp, http-get or many others are available.
    Downloads: 70 This Week
    Last Update:
    See Project
  • 4
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located on a remote cloud storage, by only reading/fetching the necessary data to perform the operation. ...
    Leader badge
    Downloads: 291 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    Anti-Spam SMTP Proxy Server

    Anti-Spam SMTP Proxy Server

    Anti-Spam SMTP Proxy Server implements multiple spam filters

    The Anti-Spam SMTP Proxy (ASSP) Server project aims to create an open source platform-independent SMTP Proxy server which implements auto-whitelists, self learning Hidden-Markov-Model and/or Bayesian, Greylisting, DNSBL, DNSWL, URIBL, SPF, SRS, Backscatter, Virus scanning, attachment blocking, Senderbase and multiple other filter methods. Click 'Files' to download the professional version 2.8.1 build 24261. A linux(ubuntu 20.04 LTS) and a freeBSD 12.2 based ready to run OVA of ASSP V2 are...
    Leader badge
    Downloads: 41,675 This Week
    Last Update:
    See Project
  • 6
    Endian Firewall Community
    Endian Firewall Community (EFW) is a "turn-key" linux security distribution that makes your system a full featured security appliance with Unified Threat Management (UTM) functionalities. The software has been designed for the best usability: very easy to install, use and manage and still greatly flexible. The feature suite includes stateful packet inspection firewall, application-level proxies for various protocols (HTTP, FTP, POP3, SMTP) with antivirus support, virus and spam-filtering...
    Leader badge
    Downloads: 326 This Week
    Last Update:
    See Project
  • 7
    Shennina

    Shennina

    Automating Host Exploitation with AI

    ...The AI engine is initially trained against live targets to learn reliable exploits against remote services. Shennina also supports a "Heuristics" mode for identfying recommended exploits.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    FireCX

    Open source OWASP penetration testing tool written in Python 3

    FireCX is an open source OWASP penetration testing tool written in Python 3, that can speed up the the process of finding common PHP vulnerabilities in PHP code, i.e. command injection, local/remote file inclusion and SQL injection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    phpsploit

    phpsploit

    Full-featured C2 framework which silently persists on webserver

    Full-featured C2 framework which silently persists on webserver via polymorphic PHP oneliner. The obfuscated communication is accomplished using HTTP headers under standard client requests and web server's relative responses, tunneled through a tiny polymorphic backdoor. Detailed help for any option (help command) Cross-platform on both client and server. CLI supports auto-completion & multi-command. Session saving/loading feature & persistent history. Multi-request support for large...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 10
    Invoke-TheHash

    Invoke-TheHash

    PowerShell Pass The Hash Utils

    ...The module supports both local accounts and domain accounts (via domain parameter), and it accepts either LM:NTLM or pure NTLM format hashes. For command execution, it can create services on remote hosts (SMBExec style) or use WMI class methods. Since it works over network protocols rather than relying on built-in Windows clients, it can bypass some limitations or restrictions in constrained environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    rlink

    ssh-tunnel instead vpn in one exe

    Create ssh-tunnel, run another programm and store settings in self. It is easier than to create a vpn and write instructions for the users.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    Piens
    Piens is a multifunctional batch-based Program. You can do many useful things with it. Its not a malware. Its just get detected because a batch file which was convertet to exe. (CMLINE.exe)
    Downloads: 10 This Week
    Last Update:
    See Project
  • 13
    Nishang

    Nishang

    Offensive PowerShell for red team and penetration testing

    ...The scrripts on a target are meant to be used in memory which is very easy to do with PowerShell. Two basic methods to execute PowerShell scripts in memory. Use the in-memory dowload and execute: Use below command to execute a PowerShell script from a remote shell, meterpreter native shell, a web shell etc. and the function exported by it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    AirGap

    Locks backup files disallowing malware (cryptolockers) to alter them

    This application is intended to make a better protection for the backup files. Modern cryptolockers can encrypt even remote files. AirGap is a Windows service that keeps specified files locked for writing, thus disallowing malware to alter them. 31/04/2017 - First idea. 7/05/2017 - 1.0 Release. Usage: On the backup storage machine install AirGap as a service from elevated command prompt: sc create "AirGap" binPath= "C:\Program Files\AirGap\AirGap.exe" In [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AirGap\Parameters] key define folders where files you want to lock and include/exclude masks: "Folder0001"="D:\\Backup\\Daily" "Include0001"="*.vbk; *.vbi" "Exclude0001"="*.tmp; *.temp" And finally start AirGap service: sc start AirGap When you need to remove old (or update) backup files - stop AirGap service, remove files and start service again.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    LockyMonitorConsole

    Console app to check if files has been changed by crypto ransomware

    ...If files has been changed it send a email and shutdown or disable the network interfaces of the host. It runs under the user account and monitor drives which are connected to a server share. Works with remote to local Symlinks on a server share. Can map and monitor drives by using the subst or net use command. Can monitor multiple folders or drives. It communicates with a Windows LockyDisconnectService to disable all physical Network Interfaces (NICs). Use the commandline Parameter: -q to hide the console -i to add the console to windows autorun and install LockyDisconnectService c# source is included in the zip file It uses the FileSystemMonitor class. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Web Application Protection

    Web Application Protection

    Tool to detect and correct vulnerabilities in PHP web applications

    WAP automatic detects and corrects input validation vulnerabilities in web applications written in PHP Language (version 4.0 or higher) and with a low rate of false positives. WAP detects the following vulnerabilities: - SQL injection using MySQL, PostgreSQL and DB2 DBMS - Reflected cross-site scripting (XSS) - Stored XSS - Remote file inclusion - Local file inclusion - Directory traversal - Source code disclosure - OS command injection - PHP code injection WAP is a static analysis tool that performs taint analysis to detect vulnerabilities, tracking malicious users inputs and checking if they reach calls of sensitive functions. It has a low rate of false positives because has implemented a data mining module to predict false positives when detects vulnerabilities. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    GlobalPlatformPro

    GlobalPlatformPro

    Easy to use GlobalPlatform tool (and a Java library)

    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    bWAPP

    an extremely buggy web app !

    bWAPP, or a buggy web application, is a free and open source deliberately insecure web application. bWAPP helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities. bWAPP prepares one to conduct successful penetration testing and ethical hacking projects. What makes bWAPP so unique? Well, it has over 100 web bugs! It covers all major known web vulnerabilities, including all risks from the OWASP Top 10 project. The focus is not just on one specific...
    Leader badge
    Downloads: 1,880 This Week
    Last Update:
    See Project
  • 19
    Bandwidth measuring tool that works by pinging remote hosts much like plain old ping command.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20

    innocence-java

    Replace text with POS equivalent text, in a reversible fashion.

    Program takes (currently) english text sentences, and replaces each word in a given sentence with another word having the same Part of Speach (POS) tag. This creates a new sentence containing none of the original words. This new sentence can then be transmitted to a remote user, and using the same software, "de-crypted" into yielding the original sentence. The software relies on having a known "seed" value for the random number generator, which is known only by the sender and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Hydrocon IRC Bot

    irc bot multi-threaded, ddos, code execution, and more

    Hydrocon IRC bot public 1.7 this is a IRC bot that is compiled with codeblocks and the mingw32 compiler. It is fully multi-threaded melts on execution, runs on start up. it has great stability and efficiency . also has the ability to execute remote code and and execute cmd commands along with ddos and more, 16 option's in total. updates coming soon.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    SauceWalk Proxy Helper

    Enumeration and automation of file discovery for your sec tools.

    SauceWalk is a freeware(.exe)/Open Source(.py) tool for aiding in the enumeration of web application structure. It consists of 2 parts a local executable (walk.exe) and a remote agent. Walk.exe iterates through the local files and folders of your target web application (for example a local copy of Wordpress) and generates requests via your favourite proxy (for example burp suite) against a given target url. The remote agent can be used to identify target files and folders on a live...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    w3af
    w3af, is a Web Application Attack and Audit Framework. The w3af core and it's plugins are fully written in python. The project has more than 130 plugins, which check for SQL injection, cross site scripting (xss), local and remote file inclusion and much more. This project has been migrated to github! See details in our project site: http://w3af.org/
    Downloads: 6 This Week
    Last Update:
    See Project
  • 24

    AHT (Ashiyane Hack Tools Ver) 1.1

    Perl Hacking Tools (BackTrack)

    ...It is For BackTrack This Script Contains This tools : Local File Disclource (LFD) Checker Scanning the whole netmask and returning IP and MAC BackConnect Tools Proxy Checker Reverse IP Add a User With Admin Access (Windows) Add a User With r00t Access (Unix) Grab Cpanel Users Remote Port Scanning With NetCat SQL Injection Scanner MD5 Hash Cracker (Online) Admin Page Finder Make Uploader With Echo Method (Linux Servers) Service Scanning BruteForce Services With Medusa And Hydra (Backtrack) Test Lfi With php:// Bypass Method Cms Analyzer (Beta Version) Server Scanning With Nmap Remote Command Execution Console Fck Editor Scanner
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    dynipdrop

    Drop specified IP n seconds remotely, auto-undrop it when timeout.

    It's a IDS-receiver and written in C. Sometimes I want to drop remote IP xx seconds, and Undrop it when timeout; Sometimes my sniffer-server find a hack-action and I want to tell another server/server-group "Drop xxx.xxx.xxx.xxx IP xx seconds". So I written this program -- dynipdrop("dynipdrop" daemon and "ipdrop_local" to send a drop-msg from localhost, and "ipdrop_udp" to send a drop-msg to another server(installed the dynipdrop daemon). And I think: "Maybe I can make a client...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next