Showing 9 open source projects for "host"

View related business solutions
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1
    XSIBackup-Classic

    XSIBackup-Classic

    Local and over IP backups for ©VMWare ©ESXi 5.1 to 6.7

    VMWare backup and replication for ESXi vSphere virtual machines to datastore or differential over IP. No agents, self capable, runs in the hypervisor host, ESXi 5.1, ESXi 5.5 & ESXi <=6.7 compatible, hot backups. Consists in a cron programmable service running in the hypervisor. Hot backups, fully functional, standalone, ideal for dedicated servers. Full version supports quiescing, differential backup, deduplication and much more... Download link: https://33hops.com/xsibackup-vmware-esxi-backup.html Free VMWare backup solution for the ESXi hypervisor. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Metasploitable

    Metasploitable is an intentionally vulnerable Linux virtual machine

    ...This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques. The default login and password is msfadmin:msfadmin. Never expose this VM to an untrusted network (use NAT or Host-only mode if you have any questions what that means). To contact the developers, please send email to msfdev@metasploit.com
    Leader badge
    Downloads: 13,437 This Week
    Last Update:
    See Project
  • 3
    VM Tweaker
    ...Short overview of features: Different VM EFI/BIOS Tweaks, Memory performance optimizations; VM state backup (VMWare Player Snapshot-like behaviour); Time/date sync between host and guest; VM Debugging config; MAC address tweaking; UUID keep switch(VM 5.x-like); Hardware compatibility switch(esx/hosted); Tweak amount of VGA RAM and more...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 4
    ODS3 Virtual Machine Challenge

    ODS3 Virtual Machine Challenge

    Virtual Machine Image To Test Penetration Skills

    ...The Idea behind the challenge is to test and exercise web application penetration testing in a controlled environment. These images are great for cyber security students, penetration testers and hobbyist. Care should be taken if installed on an Internet access host as the application are purposely vulnerable to attack and exploitation.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5

    bWAPP

    an extremely buggy web app !

    bWAPP, or a buggy web application, is a free and open source deliberately insecure web application. bWAPP helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities. bWAPP prepares one to conduct successful penetration testing and ethical hacking projects. What makes bWAPP so unique? Well, it has over 100 web bugs! It covers all major known web vulnerabilities, including all risks from the OWASP Top 10 project. The focus is not just on one specific...
    Leader badge
    Downloads: 1,322 This Week
    Last Update:
    See Project
  • 6
    MMORpgmaker
    A MMORPG Game Engine Writted in Monogame GL full C# Very easy to make a game. With simple Level Editor. Whit cross-plattform Server on .NET Core Tecnology Build your Cross-Platform Game whitout programming! Aviable for Xbox one, PS4, Android, iOS and more platform. Try Live Demo: http://www.makingitalia.net/MireWEB/ Project are migrated on Mire Engine. See Updated at: http://www.makingitalia.net/mire/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    This is a maven plugin that allows to start, stop, resume, revert to snapshot a Virtual Machine hosted by VMWare Server. It can be useful for test phase.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Vsam
    Vsam (Vulnerabillity, Scanning, Analysis and Management) is a project dedicated to the release of a virtual appliance for the management and analysis of vulnerability scan data. The main goals are ease of use and stability of the application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Final year project with dissertation. This will host my project for my final year dissertation. All of the features of SF will be used to the best of my ability. The tools provided by SF will assist greatly!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB