Showing 44 open source projects for "security"

View related business solutions
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 1
    gost

    gost

    GO Simple Tunnel, a simple tunnel written in golang

    A simple security tunnel written in Golang. Listening on multiple ports, multi-level forward proxies - proxy chain, standard HTTP/HTTPS/HTTP2/SOCKS4(A)/SOCKS5 proxy protocols support. Probing resistance support for web proxy, TLS encryption via negotiation support for SOCKS5 proxy. Support multiple tunnel types, tunnel UDP over TCP. Local/remote TCP/UDP port forwarding, TCP/UDP Transparent proxy, Shadowsocks Protocol (TCP/UDP), and SNI Proxy.
    Downloads: 22 This Week
    Last Update:
    See Project
  • 2
    nebula

    nebula

    Overlay networking tool with a focus on performance and simplicity

    Nebula is a scalable overlay networking tool with a focus on performance, simplicity and security. It lets you seamlessly connect computers anywhere in the world. Nebula is portable, and runs on Linux, OSX, Windows, iOS, and Android. It can be used to connect a small number of computers, but is also able to connect tens of thousands of computers. Nebula incorporates a number of existing concepts like encryption, security groups, certificates, and tunneling, and each of those individual pieces existed before Nebula in various forms. ...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 3
    EMAGNET

    EMAGNET

    Automated hacking tool to find leaked databases with 97.1% accuracy

    Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password. Before using Emagnet, please remember that with great power comes great responsibility. Pastebin patched the vulnerability I previously used in order to get recent uploads, so at the moment it is not possible to get recently uploaded files, you are now limited to all syntaxes exempt the default one (95% get's uploaded as 'text' and this is removed from all recent upload lists). Bruteforce...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    Ligolo-ng

    Ligolo-ng

    An advanced, yet simple, tunneling/pivoting tool

    Ligolo-ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection using a tun interface (without the need of SOCKS). When running the relay/proxy server, a tun interface is used, packets sent to this interface are translated and then transmitted to the agent's remote network. You need to download the Wintun driver (used by WireGuard) and place the wintun.dll in the same folder as Ligolo. You can listen to ports on the agent and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    Stowaway

    Stowaway

    Multi-hop Proxy Tool for pentesters

    Stowaway is a Go-based multi-hop proxy tool created for authorized penetration testing, red-team labs, and security training environments. It uses an admin-and-agent model that allows operators to build a chain of connected nodes across segmented networks. The tool supports active and passive connection modes, making it adaptable to different network layouts. It can route traffic through SOCKS5 and HTTP proxy settings, and it also supports TCP, HTTP-style, and WebSocket-style upstream or downstream transport modes. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Wiretap

    Wiretap

    Wiretap is a transparent, VPN-like proxy server that tunnels traffic

    ...Its documentation describes an end-to-end encryption model where packets are forwarded through Wiretap nodes until they reach the intended server, which then sends traffic to the real network destination. Wiretap is useful for research, security labs, and controlled environments where users want WireGuard-style tunneling with proxy-like behavior. It is best understood as a specialized networking tool rather than a general consumer VPN client.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Seeker

    Seeker

    Accurately Locate Smartphones using Social Engineering

    ...It can capture latitude, longitude, accuracy, altitude, direction, and even speed, with results displayed in a terminal. The project supports both manual deployment and tunneling services like Ngrok for external access. While primarily intended as an educational resource on security awareness, it highlights the risks of exposing geolocation data online. Its simplicity and effectiveness have made it a popular project in cybersecurity learning circles.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 8
    Pingtunnel

    Pingtunnel

    Pingtunnel is a tool that send TCP/UDP traffic over ICMP

    ...Because the tunnel traffic is not inherently presented as encrypted, sensitive usage should rely on secure protocols layered above it. pingtunnel is best understood as a specialized transport experiment for moving traffic through ICMP rather than a full privacy or security solution.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Cake

    Cake

    Distributed LLM and StableDiffusion inference

    Cake is a compact, powerful toolkit that combines a flexible TCP/UDP proxy, port forwarding system, and connection manager designed for both development and penetration testing scenarios. It enables users to create complex networking flows where traffic can be proxied, relayed, and manipulated between endpoints — useful for debugging networked applications, inspecting protocols, or tunneling traffic through different hops. The tool is designed to work with multiple protocols and supports...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Secure File Transfer for Windows with Cerberus by Redwood Icon
    Secure File Transfer for Windows with Cerberus by Redwood

    Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.

    Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
    Try for Free
  • 10
    Network Flight Simulator

    Network Flight Simulator

    A utility to safely generate malicious network traffic patterns

    flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility. The tool performs tests to simulate DNS tunneling, DGA traffic, requests to known active C2 destinations, and other suspicious traffic patterns.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11
    Cntlm is an NTLM / NTLMv2 authenticating HTTP/1.1 proxy. It caches auth'd connections for reuse, offers TCP/IP tunneling (port forwarding) thru parent proxy and much much more. It's in C, very fast and resource-efficient. Go to http://cntlm.sf.net/
    Leader badge
    Downloads: 376 This Week
    Last Update:
    See Project
  • 12
    tls SNI injector + Psiphon Free Server

    tls SNI injector + Psiphon Free Server

    Value Added VPN 4G ssl/tls sni Psiphon CN/RU/JP/UK..

    Sibling project https://sourceforge.net/projects/tls-sni-injector-cloudflare/ TCP Over SSL Tunnel TCP Over SSL Tunnel is a free SSL tool with SNI Host (Spoof Host) support ( SSL Injector ). 🔧 Máy chủ Psiphon3 miễn phí có hỗ trợ SNI tùy chỉnh và meek proxy ✅ Dùng để vượt tường lửa, kiểm duyệt mạng ⚙️ Cấu hình chuyên nghiệp, phù hợp với kỹ thuật viên và người yêu công nghệ 📡 Không cần root, không quảng cáo, hoạt động ổn định. 🚀 Free Psiphon3 + SNI Customization and meek proxy 🛡️...
    Downloads: 81 This Week
    Last Update:
    See Project
  • 13
    tls SNI injector + VPNGate Free Server

    tls SNI injector + VPNGate Free Server

    Value Added VPN 4G ssl/tls sni VPNGate CN/RU/JP/UK..

    Sibling project https://sourceforge.net/projects/tls-sni-injector-cloudflare/ TCP Over SSL Tunnel TCP Over SSL Tunnel is a free SSL tool with SNI Host (Spoof Host) support ( SSL Injector ). VPN client 4G ssl/tls sni + SoftEther + VPNGate CN/RU/JP/UK.. 🚀 Free VPNGate + SNI Customization 🛡️ One of the most powerful censorship bypass tools ever shared 🌍 Works globally — optimized for Vietnam, Iran, and more 💡 Try it today and experience real freedom! This VPNGate server setup...
    Downloads: 54 This Week
    Last Update:
    See Project
  • 14
    powercat

    powercat

    Netshell features all in version 2 powershell

    PowerCat is a compact PowerShell implementation of netcat-style networking utilities that makes it easy to create TCP/UDP clients and listeners, forward ports, and move data between sockets and files. It provides both interactive shells and single-command execution modes so operators can create bind shells, reverse shells, or simple file upload/download endpoints using only PowerShell. The tool supports encrypted connections (SSL/TLS) and can act as a basic SOCKS proxy or relay, enabling...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    OpenVPN

    OpenVPN

    Robust and flexible VPN network tunnelling

    OpenVPN is a robust and highly flexible tunneling application that uses all of the encryption, authentication, and certification features of the OpenSSL library to securely tunnel IP networks over a single TCP/UDP port. Discussion forums and project wiki can be found here: https://forums.openvpn.net/ http://community.openvpn.net/openvpn
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    tls SNI injector iOS  Public Free Server
    TCP Over SSL Tunnel TCP Over SSL Tunnel is a free SSL tool with SNI Host (Spoof Host) support ( SSL Injector ). ## License This project includes some open-source components. This software is sold as a proprietary product. A license to use this software is granted only to those who have completed the payment process. For full license terms, please refer to the [Proprietary-License](./LICENSE) file.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    Zphisher

    Zphisher

    An automated phishing tool with 30+ templates

    ...It provides a simple interface for launching phishing attacks by cloning login pages of popular websites. Built in Bash, Zphisher automates server deployment using tunneling services like Ngrok, Localhost.run, and others. It is intended for ethical hacking and security research to demonstrate how phishing attacks work and how to defend against them.
    Downloads: 226 This Week
    Last Update:
    See Project
  • 18
    WireGuard for iOS and macOS

    WireGuard for iOS and macOS

    An application for iOS and for macOs

    ...It offers a polished graphical interface that allows users to create, import, and manage WireGuard configurations while maintaining the protocol’s emphasis on simplicity and modern cryptography. The software is designed to work seamlessly within Apple’s ecosystem, supporting keychain storage, system networking controls, and platform security features. Because WireGuard is known for its lean architecture, the Apple client maintains efficient resource usage while delivering fast connection speeds. Overall, wireguard-apple is intended for Apple device users and organizations that require a secure, modern VPN solution fully aligned with the Apple networking stack.
    Downloads: 192 This Week
    Last Update:
    See Project
  • 19
    Privaxy

    Privaxy

    Privaxy is the next generation tracker and advertisement blocker

    Next generation tracker and advertisement blocker. Privaxy is a MITM HTTP(s) proxy that sits in between HTTP(s) talking applications, such as a web browser and HTTP servers, such as those serving websites. By establishing a two-way tunnel between both ends, Privaxy is able to block network requests based on URL patterns and to inject scripts as well as styles into HTML documents. Operating at a lower level, Privaxy is both more efficient as well as more streamlined than browser add-on-based...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Verigio - DNS Proxywall / DNS Firewall

    Verigio - DNS Proxywall / DNS Firewall

    One of the most advanced DNS Proxy and DNS Firewall in one product.

    It is a versatile DNS Proxy server with DNS firewall which filters DNS traffic between local computer and DNS servers with flexible rules, supports blocking by IP geography, caching, import/export rules into XML. With a click of a button acts as a DNS proxy (or DNS server), supports multiple client authentication methods, calculates statistics for DNS servers and proxy clients, supports load balancing between multiple upstream DNS servers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    DNS2SOCKS

    DNS to SOCKS or HTTP proxy

    This is a command line utility to resolve DNS requests via a SOCKS tunnel like Tor or a HTTP proxy.
    Leader badge
    Downloads: 4,482 This Week
    Last Update:
    See Project
  • 22
    OnionFruit Connect

    OnionFruit Connect

    OnionFruit Connect is a Tor proxy, allowing you to use tor anywhere

    OnionFruit Connect is a different way to access the tor network. Instead of downloading a different browser, you can use whatever one you already use. This app starts the tor service, and then modifies your proxy settings to route most of your apps through the tunnel made by tor. When you see the page saying you're connected, All your internet data passing through the tunnel is encrypted. Every site you visit is routed through a different set of servers, making it 'impossible' to track...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Venom

    Venom

    A Multi-hop Proxy for Penetration Testers

    ...It supports several connection and forwarding behaviors, giving testers flexibility when working with different network paths. Because of its security-testing focus, it should only be used in environments where the user has explicit permission.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    PivotSuite

    PivotSuite

    Network Pivoting Toolkit

    PivotSuite is a portable, platform-independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to move around inside a network. It is a Standalone Utility, Which can use as a Server or as a Client. If the compromised host is directly accessible (Forward Connection) from Our pentest machine, Then we can run pivotsuite as a server on the compromised machine and access the different subnet hosts from our pentest machine, Which was...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Whonix

    Whonix

    Whonix is an Anonymous Operating System.

    ...Please go to: https://www.whonix.org/ (This is only Whonix's sourceforge must-have project page.) Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB