Showing 12 open source projects for "attacks"

View related business solutions
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 1
    Slonik

    Slonik

    A Node.js PostgreSQL client with runtime and build time type safety

    Slonik is a PostgreSQL client for Node.js that ensures safe and efficient query execution by using tagged template literals, preventing SQL injection attacks and promoting better query structure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Session Desktop

    Session Desktop

    A Decentralized, Onion Routed, Private Messenger

    ...Built on the Session protocol and the Loki network, it routes messages through a distributed onion-routing network that hides metadata like sender, timing, and location so that conversations are resistant to surveillance and correlation attacks. The desktop client pairs seamlessly with Session mobile apps but can also be used independently to communicate with Session contacts in a familiar desktop interface that supports a full keyboard, global notifications, drag-and-drop media sharing, and local file access. Session emphasizes zero-knowledge privacy, meaning that only the participants in a conversation can read the messages.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 3
    OneKey

    OneKey

    Secure, open source and community driven crypto wallet

    ...Each user's assets are appropriately secured and stored locally. Hardware wallets take the security of digital assets to another level. From physically isolating hackers to preventing Trojan horses and software attacks. All transfers must be approved by the hardware wallet, so you don't have to worry about the loss or theft of your mobile phone. No matter what platform you prefer, iOS, Android, macOS, Windows, Linux or even ChromeOS, we support it all. Support for tokens on ETH, BSC and HECO chains. Open source and transparent, WYSIWYG.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 4
    Arcjet

    Arcjet

    Arcjet JS SDKs. Rate limiting, bot protection, email verification

    Arcjet helps developers protect their apps in just a few lines of code. Implement rate limiting, bot protection, email verification, and defense against common attacks. Native security for Bun, Next.js, Node.js, SvelteKit, Vercel, Netlify, Fly.io, and other modern platforms. Customizable protection for signup forms, login pages, API routes, and your whole app. Test security rules locally. Protection that works in every environment. No agent is required.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 5
    RedAmon

    RedAmon

    AI-powered framework for automated penetration testing and red teaming

    ...RedAmon then uses an AI agent orchestrator to analyze this data, select appropriate tools, and perform exploitation steps such as credential brute forcing or CVE-based attacks. All discovered assets, relationships, and vulnerabilities are stored in a Neo4j knowledge graph, allowing the system to reason about the environment and make informed decisions during the attack process.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    apk-mitm

    apk-mitm

    Application that automatically prepares Android APK files for HTTPS

    Inspecting a mobile app's HTTPS traffic using a proxy is probably the easiest way to figure out how it works. However, with the Network Security Configuration introduced in Android 7 and app developers trying to prevent MITM attacks using certificate pinning, getting an app to work with an HTTPS proxy has become quite tedious.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 7
    Rebuff

    Rebuff

    LLM Prompt Injection Detector

    A self-hardening prompt injection detector. Rebuff is designed to protect AI applications from prompt injection (PI) attacks through a multi-layered defense. Rebuff is still a prototype and cannot provide 100% protection against prompt injection attacks. Add canary tokens to prompts to detect leakages, allowing the framework to store embeddings about the incoming prompt in the vector database and prevent future attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    SANTETIN

    SANTETIN

    Santetin is a website stress test and DDOS simulation tool

    Santetin is a powerful desktop application built with Electron to perform website stress tests, penetration testing simulations, DDOS attacks, and traffic jingling for testing and educational purposes. ⚠️ Disclaimer: This tool is intended for educational and testing purposes only. Do not use it against any website without explicit permission from the owner.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 9
    Metlo

    Metlo

    Metlo is an open-source API security platform

    Metlo is an open source API security tool you can set up in < 15 minutes that inventories your endpoints, detects bad actors, and blocks malicious traffic in real time. Metlo passively listens to your API traffic and tags every malicous request. Our models are built on patterns of malicous requests to detect bad actors and API attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 10
    Ultra NPM

    Ultra NPM

    JavaScript package manager

    Ultra is a modern, high-performance package manager designed as an alternative to npm, Yarn, and pnpm. It focuses on speed, efficiency, and security while improving dependency management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    shrinkpack

    shrinkpack

    Fast, resilient, reproducible builds with npm install

    shrinkpack is a tool that helps npm and Yarn projects reduce external dependency risks by storing package tarballs inside the repository. This allows developers to have full control over dependencies, avoiding issues with disappearing or compromised packages.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Injectify

    Injectify

    Perform advanced MiTM attacks on websites with ease

    Perform advanced MiTM attacks on websites with ease. Injectify is a modern web based MiTM tool, similiar to BeEF (although completely unrelated in terms of source code). It features cross-platform clients (Web, Desktop, Browser extension). Create a reverse Javascript shell between the victim and the attacker. Records keystrokes and logs them to a database.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB