Showing 19 open source projects for "reverse"

View related business solutions
  • $300 in Free Credit for Your Google Cloud Projects Icon
    $300 in Free Credit for Your Google Cloud Projects

    Build, test, and explore on Google Cloud with $300 in free credit. No hidden charges. No surprise bills.

    Launch your next project with $300 in free Google Cloud credit—no hidden charges. Test, build, and deploy without risk. Use your credit across the Google Cloud platform to find what works best for your needs. After your credits are used, continue building with free monthly usage products. Only pay when you're ready to scale. Sign up in minutes and start exploring.
    Start Free Trial
  • Deploy Apps in Seconds with Cloud Run Icon
    Deploy Apps in Seconds with Cloud Run

    Host and run your applications without the need to manage infrastructure. Scales up from and down to zero automatically.

    Cloud Run is the fastest way to deploy containerized apps. Push your code in Go, Python, Node.js, Java, or any language and Cloud Run builds and deploys it automatically. Get fast autoscaling, pay only when your code runs, and skip the infrastructure headaches. Two million requests free per month. And new customers get $300 in free credit.
    Try Cloud Run Free
  • 1
    PlexGuide.com

    PlexGuide.com

    Rapidly deploy multiple-hasty Docker containers

    ...Deploy PlexGuide on a remote machine, local machine, VPS, or virtual machine. Deploy PlexGuide utilizing Google's GSuite for unlimited space or through the solo or multiple HD editions. Deploys a Reverse Proxy (Traefik) so you can obtain https certificates on all your containers. Backup and Restore data through your Google Drive. Aligns data and ports for efficiency. Deploys with a simple installer and a GUI-like interface (commands do not have to be typed out).
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    BinExport

    BinExport

    Export disassemblies into Protocol Buffers

    BinExport is a disassembly export plugin developed by Google as part of the BinDiff ecosystem, designed for reverse engineering and binary analysis. It works with popular disassemblers including IDA Pro, Binary Ninja, and Ghidra, enabling the export of disassembly data into a structured Protocol Buffer format. This exported data can then be used for binary comparison, diffing, and advanced analysis tasks through BinDiff or other compatible tools.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    NGINX Admin’s Handbook

    NGINX Admin’s Handbook

    How to improve NGINX performance, security, and other important things

    ...It distills years of research, notes, and field experience into a single handbook that complements the official docs with concrete rules, explanations, and curated external references. The handbook spans fundamentals and advanced topics alike, from HTTP and SSL/TLS basics to reverse proxy patterns, performance tuning, debugging workflows, and hardening strategies. A centerpiece is its prioritized checklist of 79 rules, grouped by criticality, helping readers focus on what most impacts security, reliability, and speed. Instead of copy-paste snippets in isolation, it emphasizes understanding trade-offs, avoiding common pitfalls, and balancing security with usability. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    Pure

    Pure

    Pretty, minimal and fast ZSH prompt

    ...Username and host only displayed when in an SSH session or a container. Shows the current path in the title and the current folder & command when a process is running. Support VI-mode indication by reverse prompt symbol (Zsh 5.3+). Makes an excellent starting point for your own custom prompt.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 99.99% Uptime for MySQL and PostgreSQL on Google Cloud Icon
    99.99% Uptime for MySQL and PostgreSQL on Google Cloud

    Enterprise Plus edition delivers sub-second maintenance downtime and 2x read/write performance. Built for critical apps.

    Cloud SQL Enterprise Plus gives you a 99.99% availability SLA with near-zero downtime maintenance—typically under 10 seconds. Get 2x better read/write performance, intelligent data caching, and 35 days of point-in-time recovery. Supports MySQL, PostgreSQL, and SQL Server with built-in vector search for gen AI apps. New customers get $300 in free credit.
    Try Cloud SQL Free
  • 5
    Jenkins Docker

    Jenkins Docker

    Docker jenkins repo

    The Jenkins Continuous Integration and Delivery server available on Docker Hub. The leading open source automation server, Jenkins provides hundreds of plugins to support building, deploying and automating any project. If you bind mount in a volume, you can simply back up that directory (which is jenkins_home) at any time. This is highly recommended. Treat the jenkins_home directory as you would a database, in Docker you would generally put a database on a volume. If your volume is inside a...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    vDDoS-Protection

    vDDoS-Protection

    Welcome to vDDoS, a HTTP(S) DDoS Protection Reverse Proxy!

    Welcome to vDDoS, a HTTP(S) DDoS Protection Reverse Proxy. Thank you for using! -Homepage: http://vddos.voduy.com -How to Download & Install vDDoS Protection: https://sourceforge.net/p/vddos-protection/github/
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    CacheGuard Gateway

    CacheGuard Gateway

    CacheGuard Gateway is a UTM, a WAF, and a QoS management appliance.

    ...It’s that simple and completely free. The UTM includes a firewall, web antivirus, VPN server, and a URL-filtering and SSL-inspection web proxy. The WAF operates in conjunction with a reverse proxy, web application load balancer, and SSL offloader, and is capable of blocking malicious requests as well as traffic from IP addresses with poor reputations. The QoS manager enables traffic shaping to prioritize critical network flows, load balance multiple WAN links, and cache web traffic.
    Leader badge
    Downloads: 95 This Week
    Last Update:
    See Project
  • 8
    BerserkArch

    BerserkArch

    A bleeding-edge, security-centric Arch-based Linux distribution.

    ...As an Arch-based distribution, it benefits from the rolling release model, providing users with the latest software versions and kernel updates. BerserkArch is a dist "designed to make you powerful" for specific use cases like reverse-engineering binaries and automating exploits, rather than being an easy-to-use distribution for general beginners.
    Leader badge
    Downloads: 74 This Week
    Last Update:
    See Project
  • 9
    OWASP Mobile Security Testing Guide

    OWASP Mobile Security Testing Guide

    Manual for mobile app security development and testing

    We are writing a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results. The MSTG is a comprehensive manual for mobile app security testing and reverse engineering for iOS and Android mobile security testers. The OWASP Mobile Application Security Verification Standard (MASVS) is, as the name implies, a standard for mobile app security. It can be used by mobile software architects and developers seeking to develop secure mobile applications, as well as security testers to ensure completeness and consistency of test results. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • Cut Cloud Costs with Google Compute Engine Icon
    Cut Cloud Costs with Google Compute Engine

    Save up to 91% with Spot VMs and get automatic sustained-use discounts. One free VM per month, plus $300 in credits.

    Save on compute costs with Compute Engine. Reduce your batch jobs and workload bill 60-91% with Spot VMs. Compute Engine's committed use offers customers up to 70% savings through sustained use discounts. Plus, you get one free e2-micro VM monthly and $300 credit to start.
    Try Compute Engine
  • 10
    DNSzoneView

    DNSzoneView

    This application is intended to provide an overview of a site's own au

    This application is intended to provide an overview of a site's own authoritative named (DNS) server's "zone" files. Note that it does NOT create or modify any files - so don't expect to use this application to "set up" a DNS server. There are three parts to the DNSzoneView document: a) brief numerical summary of zone RR counts b) scatter plot of zone files relative to number of RR records and last-modified date-time of a zone file c) a listing of configured "local" zone files and the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    ADB Sync

    ADB Sync

    Synchronize files between a PC and Android device using ADB

    ...By comparing file states between the host and the device, adb-sync efficiently updates only changed files, reducing transfer time and bandwidth usage. The tool also supports reverse synchronization, allowing users to copy data from an Android device back to their PC. While this project has been deprecated in favor of better-adb-sync, it remains a lightweight and effective option for managing file transfers and backups over USB debugging connections.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 12
    IPNS-Link-gateway

    IPNS-Link-gateway

    Access http-servers (web-apps) exposed using IPNS-Link

    Powering the next generation of content hosted on the IPFS network. NAT traversal and decentralized relays allow your services to be reached from nearly anywhere, even if they're behind NATs with dynamic addresses. IPNS-Link Gateways act like a CDN and will resolve IPFS and IPNS URLs, offloading work from you to the IPFS network. Your ip-addresses are hidden from third-parties behind encryption, only IPNS-Link Gateways you decide to trust can access your service.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    serio

    Convert date and time to a serial alpha numeric value, and vice versa

    Use date and time, converted in an adaptative base which keeps all datas, to generate serials. Perform the reverse operation
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    DracOS GNU/Linux Remastered
    ...This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering. Use a GUI-based tools-tools the software using the CLI (command line interface) and GUI (graphical user interface) to perform its operations. Now Dracos currently already up to version 3.1.5 with the code name "KUNTILANAK WITH REMASTERED".
    Downloads: 51 This Week
    Last Update:
    See Project
  • 15
    sWAF

    sWAF

    A simple Web Application Firewall docker image

    sWAF is a simple Web Application Firewall docker image, pre-configured to be easily used within your web services architecture. It runs NGINX as a dedicated reverse proxy embedding powerful WAF engines: ModSecurity 3, using OWASP® ModSecurity Core Rule Set (CRS) rules, and NAXSI. It uses acme.sh for Let's Encrypt and other free CA support. A lot of people are self-hosting their own cloud infrastructure (using Nextcloud, Synology, QNAP, a cloud lease server or home-made solutions...), but we can never be too much paranoid about web security for a lot of good reasons. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16

    cxmon

    Access the Phocos CX/CXN-10/20/40 solar charge controller's logger.

    ...It has been tested with CXN-40 operating in 12 V mode. The documentation can be found at the top of the executables. The tool is licensed under GPLv2. The protocol has been reverse-engineered on the author's own free time. The author is not associated with Phocos in any way. The advantages of the CXN-40 are: built-in logger, no RF noise (except for USB interface at HF frequencies while the port is open), good configurability, low self-consumption. The disadvantages are: low current measurement accuracy (including fixed and variable offsets), high current and charge granularity, low voltage and temperature accuracy (-0.6% and -3 °C on author's unit); no daily logs after 1 week, too fast-acting overload fuse.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Mpge

    Mpge

    Mpge

    ...With Mpge is possible make trojan horse files for Microsoft Windows, Linux and Mac OS X 10.3 Panther, OS X 10.4 Tiger, OS X 10.5 Leopard and OS X Montain Lion 10.8.1 for all Mac OS X is possible make a trojan horse files contains a reverse shell into files .pkg and files .app. I used three real Mac OS X: Attacker: MacBook with Snow Leopard 10.6.8 Target: Mac iBook PowerPC G4 with Mac OS X10.3.5 Panther and after MacBook and iMac Mac OS X Mountain Lion 10.8.1. All Mac OS X were connected on intranet lan of an italian ISP. The attacker MacBook is in listening and expected the reverse shell from the target Mac iBook PowerPC G4 that receive a package and when user click on file .pkg and insert the user password, the attacker receive a reverse shell of target. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    venom - shellcode generator

    venom - shellcode generator

    msfvenom shellcode generator/compiler/listenner

    The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( c | python | ruby | dll | msi | hta-psh ), injects the shellcode generated into one funtion (example: python) "the python funtion will execute the shellcode in ram" and uses compilers like: gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file, also starts a multi-handler to recibe the remote connection (reverse shell or meterpreter session). -- 'shellcode generator' tool reproduces some of the technics used by Veil-Evasion framework, unicorn.py, powersploit, etc,etc,etc.."P.S. some payloads are undetectable by AV soluctions yes!!!" one of the reazons for that its the use of a funtion to execute the 2º stage of shell/meterpreter directly into targets ram.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Turm

    Turm

    The *nix remote manager

    Web-GUI and user-extensible command library for managing applications and services remotely. The primary goal is to create a system that can manage: - LXC Containers - Libvirt virtual networks - OpenVPN networks - Reverse proxies for IPv4 - IPv6 networking - Web-Hosting applications - Content Management System's - Simple configuration commands and routines The end game is an administrator tool that can manage even a complex cloud-computing-like system as a hybrid virtual and real server farm. Turm can run from any LAMP system, (Linux Apache MySql PHP), and control any SSH-accessible client. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB
Gen AI apps are built with MongoDB Atlas
Atlas offers built-in vector search and global availability across 125+ regions. Start building AI apps faster, all in one place.
Try Free →