Showing 26 open source projects for "security"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    nebula

    nebula

    Overlay networking tool with a focus on performance and simplicity

    Nebula is a scalable overlay networking tool with a focus on performance, simplicity and security. It lets you seamlessly connect computers anywhere in the world. Nebula is portable, and runs on Linux, OSX, Windows, iOS, and Android. It can be used to connect a small number of computers, but is also able to connect tens of thousands of computers. Nebula incorporates a number of existing concepts like encryption, security groups, certificates, and tunneling, and each of those individual pieces existed before Nebula in various forms. ...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 2
    EMAGNET

    EMAGNET

    Automated hacking tool to find leaked databases with 97.1% accuracy

    Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password. Before using Emagnet, please remember that with great power comes great responsibility. Pastebin patched the vulnerability I previously used in order to get recent uploads, so at the moment it is not possible to get recently uploaded files, you are now limited to all syntaxes exempt the default one (95% get's uploaded as 'text' and this is removed from all recent upload lists). Bruteforce...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    Ligolo-ng

    Ligolo-ng

    An advanced, yet simple, tunneling/pivoting tool

    Ligolo-ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection using a tun interface (without the need of SOCKS). When running the relay/proxy server, a tun interface is used, packets sent to this interface are translated and then transmitted to the agent's remote network. You need to download the Wintun driver (used by WireGuard) and place the wintun.dll in the same folder as Ligolo. You can listen to ports on the agent and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Stowaway

    Stowaway

    Multi-hop Proxy Tool for pentesters

    Stowaway is a Go-based multi-hop proxy tool created for authorized penetration testing, red-team labs, and security training environments. It uses an admin-and-agent model that allows operators to build a chain of connected nodes across segmented networks. The tool supports active and passive connection modes, making it adaptable to different network layouts. It can route traffic through SOCKS5 and HTTP proxy settings, and it also supports TCP, HTTP-style, and WebSocket-style upstream or downstream transport modes. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    Wiretap

    Wiretap

    Wiretap is a transparent, VPN-like proxy server that tunnels traffic

    ...Its documentation describes an end-to-end encryption model where packets are forwarded through Wiretap nodes until they reach the intended server, which then sends traffic to the real network destination. Wiretap is useful for research, security labs, and controlled environments where users want WireGuard-style tunneling with proxy-like behavior. It is best understood as a specialized networking tool rather than a general consumer VPN client.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Seeker

    Seeker

    Accurately Locate Smartphones using Social Engineering

    ...It can capture latitude, longitude, accuracy, altitude, direction, and even speed, with results displayed in a terminal. The project supports both manual deployment and tunneling services like Ngrok for external access. While primarily intended as an educational resource on security awareness, it highlights the risks of exposing geolocation data online. Its simplicity and effectiveness have made it a popular project in cybersecurity learning circles.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 7
    Pingtunnel

    Pingtunnel

    Pingtunnel is a tool that send TCP/UDP traffic over ICMP

    ...Because the tunnel traffic is not inherently presented as encrypted, sensitive usage should rely on secure protocols layered above it. pingtunnel is best understood as a specialized transport experiment for moving traffic through ICMP rather than a full privacy or security solution.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Cake

    Cake

    Distributed LLM and StableDiffusion inference

    Cake is a compact, powerful toolkit that combines a flexible TCP/UDP proxy, port forwarding system, and connection manager designed for both development and penetration testing scenarios. It enables users to create complex networking flows where traffic can be proxied, relayed, and manipulated between endpoints — useful for debugging networked applications, inspecting protocols, or tunneling traffic through different hops. The tool is designed to work with multiple protocols and supports...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Network Flight Simulator

    Network Flight Simulator

    A utility to safely generate malicious network traffic patterns

    flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility. The tool performs tests to simulate DNS tunneling, DGA traffic, requests to known active C2 destinations, and other suspicious traffic patterns.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Secure File Transfer for Windows with Cerberus by Redwood Icon
    Secure File Transfer for Windows with Cerberus by Redwood

    Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.

    Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
    Try for Free
  • 10
    OpenVPN

    OpenVPN

    Robust and flexible VPN network tunnelling

    OpenVPN is a robust and highly flexible tunneling application that uses all of the encryption, authentication, and certification features of the OpenSSL library to securely tunnel IP networks over a single TCP/UDP port. Discussion forums and project wiki can be found here: https://forums.openvpn.net/ http://community.openvpn.net/openvpn
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Zphisher

    Zphisher

    An automated phishing tool with 30+ templates

    ...It provides a simple interface for launching phishing attacks by cloning login pages of popular websites. Built in Bash, Zphisher automates server deployment using tunneling services like Ngrok, Localhost.run, and others. It is intended for ethical hacking and security research to demonstrate how phishing attacks work and how to defend against them.
    Downloads: 226 This Week
    Last Update:
    See Project
  • 12
    WireGuard for iOS and macOS

    WireGuard for iOS and macOS

    An application for iOS and for macOs

    ...It offers a polished graphical interface that allows users to create, import, and manage WireGuard configurations while maintaining the protocol’s emphasis on simplicity and modern cryptography. The software is designed to work seamlessly within Apple’s ecosystem, supporting keychain storage, system networking controls, and platform security features. Because WireGuard is known for its lean architecture, the Apple client maintains efficient resource usage while delivering fast connection speeds. Overall, wireguard-apple is intended for Apple device users and organizations that require a secure, modern VPN solution fully aligned with the Apple networking stack.
    Downloads: 192 This Week
    Last Update:
    See Project
  • 13
    Privaxy

    Privaxy

    Privaxy is the next generation tracker and advertisement blocker

    Next generation tracker and advertisement blocker. Privaxy is a MITM HTTP(s) proxy that sits in between HTTP(s) talking applications, such as a web browser and HTTP servers, such as those serving websites. By establishing a two-way tunnel between both ends, Privaxy is able to block network requests based on URL patterns and to inject scripts as well as styles into HTML documents. Operating at a lower level, Privaxy is both more efficient as well as more streamlined than browser add-on-based...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    DNS2SOCKS

    DNS to SOCKS or HTTP proxy

    This is a command line utility to resolve DNS requests via a SOCKS tunnel like Tor or a HTTP proxy.
    Leader badge
    Downloads: 4,482 This Week
    Last Update:
    See Project
  • 15
    Venom

    Venom

    A Multi-hop Proxy for Penetration Testers

    ...It supports several connection and forwarding behaviors, giving testers flexibility when working with different network paths. Because of its security-testing focus, it should only be used in environments where the user has explicit permission.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    PivotSuite

    PivotSuite

    Network Pivoting Toolkit

    PivotSuite is a portable, platform-independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to move around inside a network. It is a Standalone Utility, Which can use as a Server or as a Client. If the compromised host is directly accessible (Forward Connection) from Our pentest machine, Then we can run pivotsuite as a server on the compromised machine and access the different subnet hosts from our pentest machine, Which was...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Whonix

    Whonix

    Whonix is an Anonymous Operating System.

    ...Please go to: https://www.whonix.org/ (This is only Whonix's sourceforge must-have project page.) Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Go HTTP tunnel

    Go HTTP tunnel

    Fast and secure tunnels over HTTP/2

    ...The server is publicly available and proxies incoming connections to the client. Then the connection is further proxied in the client's network. The tunnel is based on HTTP/2 for speed and security. There is a single TCP connection between the client and server and all the proxied connections are multiplexed using HTTP/2.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    TorVM

    A VM for using Tor

    Preconfigured Debian Virtual Machine for use with Tor. Features: - Newest available tor version. - Iptables-script for tunneling all traffic through Tor. - Preconfigured MATE desktop environment.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20

    Handy TCP/IP Server/Client Tools

    Various TCP/IP servers, clients and network management tools

    IPtools is an all in one package that includes various TCP/IP tools. Server: - FTP - TFTP - Syslog - Web - Remote Command - General UDP server - Multicast server Client utilities: - Multicast client - TFTP client Starting on version 0.2.0, a powerful network connection tools UBridge is added, it can bridge: - VXLAN (newly released) - UDP sessions - NIC card of the PC - Connections to Cisco Router Simulator "GNS3/dynamips" and H3C Router Simulator...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 21
    In many times we want to help our friends and family, they are under some kind of censorship or blocked by firewall, they just want to get some true news.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    BHS Debian (Hades Update)

    BHS Debian (Hades Update)

    BHS debian (testing) jessie/sid

    BHS (Debian) New BHS release Based on Debian jessie/sid Kermel 3.12 KDE 4.11 Debian style and look Custom scripts!! Defcon tools!! New wifi scripts Multiarch support Top tools username: root password: BHS note: Don't forget to run the script located on the desktop to install the missing tools,because without to run it the menu will not be functional,if you not see it just download from here in the file section..sorry for the delay the upload stack for 2...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23
    PortFusion

    PortFusion

    Distributed reverse / forward proxy and tunneling solution for TCP.

    PortFusion is a minimalistic, cross-platform, transport-layer distributed reverse / forward proxy for TCP written in Haskell + LLVM and released under GPLv3. A single package that makes the most of each platform by tapping into their unique capabilities, combining this power with an intuitive interface, beautiful design and Haskell's excellent support for unprecedented levels of concurrency and parallelism. It strives for the smallest source code size (< 500 lines) while delivering...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 24
    ANts P2P
    ANts P2P realizes a third generation P2P net. It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 25
    Telnet over HTTP proxy. Allows users behind firewalls to tunnel Telnet sessions over a HTTP connection. Server uses Java servlets with a Java or C# client.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB