Showing 40 open source projects for "bypass"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 1
    ABTestingGateway

    ABTestingGateway

    Identify and bypass network-level A/B testing and gateway behavior

    ABTestingGateway is a tool developed by China's National Security Research Institute (CNSRE) to identify and bypass network-level A/B testing and gateway behavior often used in censorship systems. It performs dynamic analysis and comparison of network paths to detect content filtering and manipulation strategies employed by intermediate network devices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Vulnerawa
    Vulnerawa stands for vulnerable web application, though I think it should be renamed Vulnerable website. Unlike other vulnerable web apps, this application strives to be close to reality as possible. To know more about Vulnerawa, go here https://www.hackercoolmagazine.com/vulnerawa-vulnerable-web-app-for-practice/ See how to setup Vulnerawa in Wamp server. https://www.hackercoolmagazine.com/how-to-setup-vulnerawa-in-wamp-server/ To see how to set up a web app pen testing lab with...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    MITMf

    MITMf

    Framework for Man-In-The-Middle attacks

    ...The framework contains a built-in SMB, HTTP and DNS server that can be controlled and used by the various plugins, it also contains a modified version of the SSLStrip proxy that allows for HTTP modification and a partial HSTS bypass. As of version 0.9.8, MITMf supports active packet filtering and manipulation (basically what better filters did, only better), allowing users to modify any type of traffic or protocol. The configuration file can be edited on-the-fly while MITMf is running, the changes will be passed down through the framework.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 4

    xorlisp

    Bit level lambda continuations and nothing else - Queue automata

    Not working yet. To deal with the Halting Problem, computing and data are navigated using debugger ops: linearForward and treeForward, which navigate an astronomically large bit string where 1 is ( and 0 is ). All pairs are derived from (). For example, true is represented as ((()())()), and false is (()(()())). It appears related to the church encoding of lambda where T chooses first parameter and F chooses second, of a pair. Continuations are nearly finished code and are represented as a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 5
    myAuxiliary.rb

    myAuxiliary.rb

    msf post-exploitation auxiliary module

    This auxiliary module needs [metasploit] framework installed.. This module its a metasploit post-exploitation (after the targets get's exploited) auxiliary script, so we need to exploit a target first in order to use it. Affected platforms: Windows OS (all versions above windows vista) Read my WIKI for further info: https://sourceforge.net/p/myauxiliarymete/wiki/Home/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    AntiLVL Reloaded

    AntiLVL Reloaded

    AntiLVL Android LVL Hack Remove License verification of Android

    AntiLVL Reloaded. Major update to AntiLVL antilvl 1.4.0.How to Remove License verification of Android Apps AntiLVL's purpose is to subvert standard license protection methods such as the Android License Verification Library (LVL), Amazon Appstore DRM and Verizon DRM. It also disables many anti-cracking and anti-tampering protection methods. Because every implementation of the LVL is potentially (and often is) quite different, it's not possible to automate patching in every case. It will not...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Shadowsocks-Nodejs

    Shadowsocks-Nodejs

    Node.js port of Shadowsocks

    Shadowsocks-Nodejs is a Node.js implementation of the Shadowsocks proxy protocol, providing server and client components that let users create an encrypted proxy tunnel to bypass network filtering and protect traffic in transit. The project reimplements the lightweight, stream-oriented Shadowsocks protocol in JavaScript so operators can run servers and clients using Node.js environments rather than native binaries or Python ports. It exposes typical Shadowsocks features such as configurable ciphers, listening ports, and worker process models that let operators tune performance for their deployment. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    imgCool Tunnelier

    imgCool Tunnelier

    Start Tunneling for Anonymous People

    ...You don't have to install this software because this is running with portable system. By using imgCool Tunnelier 2.7, you can do: 1. Multi Connection Server 2. Filtering Connection 3. Manipulate IP Address 4. Bypass Block DNS Server 5. Browsing with Direct Proxy Tunnel (Only IE and Google Chrome) 6. Tunneling via HTTP Proxy, Socks4 and Socks5 7. Add Route IP, Delete IP, route print and other IP Configuration 8. Play Game Online via Proxy Server 9. Connection with TOR Server 10. Support Modem GSM, Internet Cable, LAN and Wifi 11. Auto Create Dial Up with DNS Google 12. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    webtoprog_chung
    webtoprog chung is a simple example of communication from a web javascript program to a local desktop application program (written in freebasic ) using screen pixels test. No special autorisation or security bypass, just type a text in the web page and it will be displayed in the application's window .
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 10
    Ninja Phishing Framework
    it’s a free and open source phishing framework that helps the social-engineers in phishing attacks. and it’s includes alot of phishing pages and more stuff that helps you in phishing. the application is coded in PHP,XHTML,CSS,and Javascript.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Hexjector is an Opensource,Cross Platform PHP script to automate Site Pentest for SQL Injection Vulnerabilties.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    OpenEXT is a non-fork of ExtJS. This project will release patches on top of ExtJS 2.0.2 rather than redistributing full modified versions. This is to bypass any legal issues in face of conflicting license claims by ExtJS vendor.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A simple CVS client that bypass any firewall blocking port 2401 used by cvs. It relies on the ViewCVS web interface to the repository to work. To use when all other solutions (SSH...) fail
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    PrivateAccessor is a special Java class that bypass the Java modifiers security to provide access to private fields and members in java classes. Used with JUnit allows you to test private fields and methods.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Mobile Robotics is a java project developing wireless communication using bluetooth between a hand-held (palm, cellular phone) to a Lego Mindstorm device. We intend to bypass the limitations of the IR tower creating a truly wireless mindstorm.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB