Showing 33 open source projects for "security"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 1
    gost

    gost

    GO Simple Tunnel, a simple tunnel written in golang

    A simple security tunnel written in Golang. Listening on multiple ports, multi-level forward proxies - proxy chain, standard HTTP/HTTPS/HTTP2/SOCKS4(A)/SOCKS5 proxy protocols support. Probing resistance support for web proxy, TLS encryption via negotiation support for SOCKS5 proxy. Support multiple tunnel types, tunnel UDP over TCP. Local/remote TCP/UDP port forwarding, TCP/UDP Transparent proxy, Shadowsocks Protocol (TCP/UDP), and SNI Proxy.
    Downloads: 22 This Week
    Last Update:
    See Project
  • 2
    nebula

    nebula

    Overlay networking tool with a focus on performance and simplicity

    Nebula is a scalable overlay networking tool with a focus on performance, simplicity and security. It lets you seamlessly connect computers anywhere in the world. Nebula is portable, and runs on Linux, OSX, Windows, iOS, and Android. It can be used to connect a small number of computers, but is also able to connect tens of thousands of computers. Nebula incorporates a number of existing concepts like encryption, security groups, certificates, and tunneling, and each of those individual pieces existed before Nebula in various forms. ...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 3
    EMAGNET

    EMAGNET

    Automated hacking tool to find leaked databases with 97.1% accuracy

    Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password. Before using Emagnet, please remember that with great power comes great responsibility. Pastebin patched the vulnerability I previously used in order to get recent uploads, so at the moment it is not possible to get recently uploaded files, you are now limited to all syntaxes exempt the default one (95% get's uploaded as 'text' and this is removed from all recent upload lists). Bruteforce...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    Ligolo-ng

    Ligolo-ng

    An advanced, yet simple, tunneling/pivoting tool

    Ligolo-ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection using a tun interface (without the need of SOCKS). When running the relay/proxy server, a tun interface is used, packets sent to this interface are translated and then transmitted to the agent's remote network. You need to download the Wintun driver (used by WireGuard) and place the wintun.dll in the same folder as Ligolo. You can listen to ports on the agent and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    Stowaway

    Stowaway

    Multi-hop Proxy Tool for pentesters

    Stowaway is a Go-based multi-hop proxy tool created for authorized penetration testing, red-team labs, and security training environments. It uses an admin-and-agent model that allows operators to build a chain of connected nodes across segmented networks. The tool supports active and passive connection modes, making it adaptable to different network layouts. It can route traffic through SOCKS5 and HTTP proxy settings, and it also supports TCP, HTTP-style, and WebSocket-style upstream or downstream transport modes. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Wiretap

    Wiretap

    Wiretap is a transparent, VPN-like proxy server that tunnels traffic

    ...Its documentation describes an end-to-end encryption model where packets are forwarded through Wiretap nodes until they reach the intended server, which then sends traffic to the real network destination. Wiretap is useful for research, security labs, and controlled environments where users want WireGuard-style tunneling with proxy-like behavior. It is best understood as a specialized networking tool rather than a general consumer VPN client.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Seeker

    Seeker

    Accurately Locate Smartphones using Social Engineering

    ...It can capture latitude, longitude, accuracy, altitude, direction, and even speed, with results displayed in a terminal. The project supports both manual deployment and tunneling services like Ngrok for external access. While primarily intended as an educational resource on security awareness, it highlights the risks of exposing geolocation data online. Its simplicity and effectiveness have made it a popular project in cybersecurity learning circles.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 8
    Pingtunnel

    Pingtunnel

    Pingtunnel is a tool that send TCP/UDP traffic over ICMP

    ...Because the tunnel traffic is not inherently presented as encrypted, sensitive usage should rely on secure protocols layered above it. pingtunnel is best understood as a specialized transport experiment for moving traffic through ICMP rather than a full privacy or security solution.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Cake

    Cake

    Distributed LLM and StableDiffusion inference

    Cake is a compact, powerful toolkit that combines a flexible TCP/UDP proxy, port forwarding system, and connection manager designed for both development and penetration testing scenarios. It enables users to create complex networking flows where traffic can be proxied, relayed, and manipulated between endpoints — useful for debugging networked applications, inspecting protocols, or tunneling traffic through different hops. The tool is designed to work with multiple protocols and supports...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    Network Flight Simulator

    Network Flight Simulator

    A utility to safely generate malicious network traffic patterns

    flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility. The tool performs tests to simulate DNS tunneling, DGA traffic, requests to known active C2 destinations, and other suspicious traffic patterns.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11
    Cntlm is an NTLM / NTLMv2 authenticating HTTP/1.1 proxy. It caches auth'd connections for reuse, offers TCP/IP tunneling (port forwarding) thru parent proxy and much much more. It's in C, very fast and resource-efficient. Go to http://cntlm.sf.net/
    Leader badge
    Downloads: 376 This Week
    Last Update:
    See Project
  • 12
    OpenVPN

    OpenVPN

    Robust and flexible VPN network tunnelling

    OpenVPN is a robust and highly flexible tunneling application that uses all of the encryption, authentication, and certification features of the OpenSSL library to securely tunnel IP networks over a single TCP/UDP port. Discussion forums and project wiki can be found here: https://forums.openvpn.net/ http://community.openvpn.net/openvpn
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Zphisher

    Zphisher

    An automated phishing tool with 30+ templates

    ...It provides a simple interface for launching phishing attacks by cloning login pages of popular websites. Built in Bash, Zphisher automates server deployment using tunneling services like Ngrok, Localhost.run, and others. It is intended for ethical hacking and security research to demonstrate how phishing attacks work and how to defend against them.
    Downloads: 226 This Week
    Last Update:
    See Project
  • 14
    Privaxy

    Privaxy

    Privaxy is the next generation tracker and advertisement blocker

    Next generation tracker and advertisement blocker. Privaxy is a MITM HTTP(s) proxy that sits in between HTTP(s) talking applications, such as a web browser and HTTP servers, such as those serving websites. By establishing a two-way tunnel between both ends, Privaxy is able to block network requests based on URL patterns and to inject scripts as well as styles into HTML documents. Operating at a lower level, Privaxy is both more efficient as well as more streamlined than browser add-on-based...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    DNS2SOCKS

    DNS to SOCKS or HTTP proxy

    This is a command line utility to resolve DNS requests via a SOCKS tunnel like Tor or a HTTP proxy.
    Leader badge
    Downloads: 4,482 This Week
    Last Update:
    See Project
  • 16
    Venom

    Venom

    A Multi-hop Proxy for Penetration Testers

    ...It supports several connection and forwarding behaviors, giving testers flexibility when working with different network paths. Because of its security-testing focus, it should only be used in environments where the user has explicit permission.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    PivotSuite

    PivotSuite

    Network Pivoting Toolkit

    PivotSuite is a portable, platform-independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to move around inside a network. It is a Standalone Utility, Which can use as a Server or as a Client. If the compromised host is directly accessible (Forward Connection) from Our pentest machine, Then we can run pivotsuite as a server on the compromised machine and access the different subnet hosts from our pentest machine, Which was...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Whonix

    Whonix

    Whonix is an Anonymous Operating System.

    ...Please go to: https://www.whonix.org/ (This is only Whonix's sourceforge must-have project page.) Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Go HTTP tunnel

    Go HTTP tunnel

    Fast and secure tunnels over HTTP/2

    ...The server is publicly available and proxies incoming connections to the client. Then the connection is further proxied in the client's network. The tunnel is based on HTTP/2 for speed and security. There is a single TCP connection between the client and server and all the proxied connections are multiplexed using HTTP/2.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    TorVM

    A VM for using Tor

    Preconfigured Debian Virtual Machine for use with Tor. Features: - Newest available tor version. - Iptables-script for tunneling all traffic through Tor. - Preconfigured MATE desktop environment.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21

    Handy TCP/IP Server/Client Tools

    Various TCP/IP servers, clients and network management tools

    IPtools is an all in one package that includes various TCP/IP tools. Server: - FTP - TFTP - Syslog - Web - Remote Command - General UDP server - Multicast server Client utilities: - Multicast client - TFTP client Starting on version 0.2.0, a powerful network connection tools UBridge is added, it can bridge: - VXLAN (newly released) - UDP sessions - NIC card of the PC - Connections to Cisco Router Simulator "GNS3/dynamips" and H3C Router Simulator...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 22

    oSKY

    Framework implementing SS7 over IP & SIGTRAN interworking and trunking

    ...In contrast with PSTN (Public Switched Telephony Network), oSKY intends to implement an open paradigm in the internet domain, gaining more than 100 years of experience from traditional telephone network. oSKY goals: -enhanced security (SSL, SCTP) -embedded NAT tunneling -Global title discovering on Internet style -Peer2Peer mode and Gateway mode -more to come ... oSKY project drivers: - drastically reduce bandwidth usage by performing smart lookup of enum numbering space. avoiding PSTN outbound trunking when not necessary and linking IPPABXs in the internet domain with failover capabilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    In many times we want to help our friends and family, they are under some kind of censorship or blocked by firewall, they just want to get some true news.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    BHS Debian (Hades Update)

    BHS Debian (Hades Update)

    BHS debian (testing) jessie/sid

    BHS (Debian) New BHS release Based on Debian jessie/sid Kermel 3.12 KDE 4.11 Debian style and look Custom scripts!! Defcon tools!! New wifi scripts Multiarch support Top tools username: root password: BHS note: Don't forget to run the script located on the desktop to install the missing tools,because without to run it the menu will not be functional,if you not see it just download from here in the file section..sorry for the delay the upload stack for 2...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 25
    Campagnol is a decentralized VPN over UDP tunneling. It uses UDP hole punching to open connections through NAT/firewall and OpenSSL's DTLSv1 implementation for mutual authentication and encryption.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB