Showing 12 open source projects for "remote host"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    Anti-Spam SMTP Proxy Server

    Anti-Spam SMTP Proxy Server

    Anti-Spam SMTP Proxy Server implements multiple spam filters

    The Anti-Spam SMTP Proxy (ASSP) Server project aims to create an open source platform-independent SMTP Proxy server which implements auto-whitelists, self learning Hidden-Markov-Model and/or Bayesian, Greylisting, DNSBL, DNSWL, URIBL, SPF, SRS, Backscatter, Virus scanning, attachment blocking, Senderbase and multiple other filter methods. Click 'Files' to download the professional version 2.8.1 build 24261. A linux(ubuntu 20.04 LTS) and a freeBSD 12.2 based ready to run OVA of ASSP V2 are...
    Leader badge
    Downloads: 41,856 This Week
    Last Update:
    See Project
  • 2
    Shennina

    Shennina

    Automating Host Exploitation with AI

    ...If the attack succeeds, Shennina proceeds with the post-exploitation phase. The AI engine is initially trained against live targets to learn reliable exploits against remote services. Shennina also supports a "Heuristics" mode for identfying recommended exploits.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    VENOM C2 shellcode

    VENOM C2 shellcode

    C2 shellcode generator/compiler/handler

    The script will use msfvenom (metasploit) to generate shellcode in different formats ( C# | python | ruby | dll | msi | hta-psh | doc | apk | macho | elf | deb | mp4 | etc ) injects the shellcode generated into one template (example: python) "the python function will execute the shellcode into ram" and uses compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file. It also starts a handler to receive the remote connection (shell or meterpreter) venom 1.0.11 (malicious_server) was build to take advantage of apache2 webserver to deliver payloads (LAN) using a fake webpage writen in html to be hable to trigger payload downloads, the user just needs to send the link provided to target host.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Hystrix

    Hystrix

    Latency and Fault Tolerance for Distributed Systems

    Defend your app with Hystrix, a latency and fault tolerance library developed by the Netflix API team. It works by isolating points of access to remote systems, services and 3rd party libraries, thereby stopping cascading failure and providing fallback options, and making complex distributed systems more resilient in cases where failure is inevitable. In a distributed environment, failure is simply inevitable for some service dependencies. With Hystrix you can control the interactions between these distributed services and protect your host application. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Reach Your Audience with Rise Vision, the #1 Cloud Digital Signage Software Solution Icon
    Reach Your Audience with Rise Vision, the #1 Cloud Digital Signage Software Solution

    K-12 Schools, Higher Education, Businesses, Restaurants

    Rise Vision is the #1 digital signage company, offering easy-to-use cloud digital signage software compatible with any player across multiple screens. Forget about static displays. Save time and boost sales with 500+ customizable content templates for your screens. If you ever need help, get free training and exceptionally fast support.
    Learn More
  • 5

    LockyMonitorConsole

    Console app to check if files has been changed by crypto ransomware

    ...Don't use it in productive environments to prevent data loss! The Software comes without any warranty. If files has been changed it send a email and shutdown or disable the network interfaces of the host. It runs under the user account and monitor drives which are connected to a server share. Works with remote to local Symlinks on a server share. Can map and monitor drives by using the subst or net use command. Can monitor multiple folders or drives. It communicates with a Windows LockyDisconnectService to disable all physical Network Interfaces (NICs). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    bWAPP

    an extremely buggy web app !

    bWAPP, or a buggy web application, is a free and open source deliberately insecure web application. bWAPP helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities. bWAPP prepares one to conduct successful penetration testing and ethical hacking projects. What makes bWAPP so unique? Well, it has over 100 web bugs! It covers all major known web vulnerabilities, including all risks from the OWASP Top 10 project. The focus is not just on one specific...
    Leader badge
    Downloads: 1,495 This Week
    Last Update:
    See Project
  • 7
    enviroHash

    enviroHash

    A network utility to MD5 hash and catalog a running file system.

    enviroHash is a network utility designed to be executed standalone or through remote management software. It uses fsum by Slavasoft to hash all accessible files within a scope that is defined through command line arguments. Uppon completion enviroHash will generate a .txt output file that contains a "hash","filename" pair delimited by commas. This file can then be imported into the enviroHashBrowser so that System Administrators can search a host or all hosts for particular filename or hash value, and compare one host to another to view similarities/differences. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Amnesia.
    Amnesia is a design-rich 'host-proof' web application that encrypts and remembers all sorts of personal information from passwords to private notes. Project now hosted at Google Code: https://code.google.com/p/amnesia-app/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A web application penetration testing tool that can extract data from SQL Server, MySQL, DB2, Oracle, Sybase, Informix, and Postgres. Further, it can crawl a website as a vulnerability scanner looking for sql injection vulnerabilities.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 10
    SuperPing is Windows utility writtein C# that allows you to customize your ping requests to a remote host.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    NetSentry Gofer is a personal software firewall which secures your personal computer from unauthorized access through a remote host, such as the Internet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The X Supervisor Extension is a patch for the popular XFree86 X server to make X11 forwarding with openSSH safer when the remote host can not be trusted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next