Showing 619 open source projects for "cc-attack"

View related business solutions
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • Shift, the browser that merges all of your web apps into one powerful window. Icon
    Shift, the browser that merges all of your web apps into one powerful window.

    Your power browser.

    Streamline everything you do online when you install Shift and access thousands of apps without leaving your browser. Connect all of your Gmail, Outlook, and Office 365 accounts and manage everything from one centralized window. Build out your Shift browser with apps that integrate seamlessly so you have ultra-fast access to all the tools you use to stream, shop, work, browse, and stay connected. Shift brings it all together.
    Try for Free
  • 1
    MTCore [32px texture pack]

    MTCore [32px texture pack]

    W.I.P. Texture pack based on default Minetest 0.4.13 game textures

    MTCore [W.I.P.] 32 pixel texture pack based on default Minetest 0.4.13 game textures License : Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0) see README.txt for original media authors and a list of currently supported mods
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    White Knight

    White Knight

    Machine Shutdown Security Tool

    Knock down your server into full disk encryption when a user attempts to physically attack your hardware via USB. This project seeks to provide a quick any easy low overhead solution that will shut your computer down to trigger your full disk encryption before an unsophisticated adversary has time to extract sensitive data. News: Alpha 0.04 Hotfix Update - Passwords now work! - Successfully tested against USB Rubber Ducky! This release I worked on building out a class that can...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 3
    OWASP Zed Attack Proxy

    OWASP Zed Attack Proxy

    Find web application vulnerabilities the easy way!

    The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. Note that this project is no longer used for hosting the ZAP downloads. You should download ZAP via https://github.com/zaproxy/zaproxy/wiki/Downloads Please see the homepage for more information about OWASP ZAP
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    tocan-tweezer

    tocan-tweezer

    This is a womans developement project to enshure ethical production

    Hardware We strive to develop the most useful and practical Tweezer for eyebrows, which is open for others to develop further. The basic hardware developement contains individualisation to any prefered needs and standardisation of the Tweezer under hygienic conditions. Results will finish in a leaflet under CC-BY-SA license. Developement and production have strictly follow ethical requirements and healthier procurement. Member states shall take appropriate easures to enshure...
    Downloads: 0 This Week
    Last Update:
    See Project
  • The #1 Embedded Analytics Solution for SaaS Teams. Icon
    The #1 Embedded Analytics Solution for SaaS Teams.

    Qrvey saves engineering teams time and money with a turnkey multi-tenant solution connecting your data warehouse to your SaaS application.

    Qrvey’s comprehensive embedded analytics software enables you to design more customizable analytics experiences for your end users.
    Try Developer Playground
  • 5
    Smash The Game (LD31)

    Smash The Game (LD31)

    A 2.5D Unity Local Multiplayer game

    Welcome to Smash the Game! This is a 2.5D local Multiplayer game. The goal is to knock the other boar out of the screen. As soon as one boar is not rendered anymore, it dies! First you try to increase the opponents multiplier, that way it will be easy to punch him out of the screen! Attacks: - Simple jabs: will increase the multiplier - Strong push: will NOT increase multiplier, but will push the enemy significantly - Special dash: very strong attack with a cooldown Items: - Swirl...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A Transport Stream analyser for the Brazilian D-TV system (SBTVD / ISDB-Tb). It shows in a GUI the SI/PSI structure of the stream in a tree-view, bitrate statistics for each ES, specific Closed Caption, EPG and DSMCC carroussel decoding plus more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    SeedBasedBicluster

    Seed-based biclustering of Gene Expression Data

    please cite: An J, Liew AW-C, Nelson CC (2012) Seed-Based Biclustering of Gene Expression Data. PLoS ONE 7(8): e42431.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    GitHub Training Kit

    GitHub Training Kit

    Open source courseware for Git and GitHub

    Open source courseware from the GitHub Professional Services team. This repository currently contains Git and GitHub cheat sheets. Site content is licensed under CC-BY-4.0. CC-BY-4.0 gives you permission to use the content for almost any purpose but does not grant you any trademark permissions, so long as you note the license and give credit. Code used to build and test the site as well as code samples on the site, if any, are licensed under CC0-1.0. CC0 waives all copyright restrictions...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    AdvGodOfMiniWars

    Old School Hex&Chit 2D Wargame

    The Game is an old style hex & Chit Turn-based war game with 5 types of ranged fire such as artillery . There are different types of units Skirmishers infantry cavalry etc... you move by using road hexes and then attack the enemy. the game allows you to let the computer move for you.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Red Hat Enterprise Linux on Microsoft Azure Icon
    Red Hat Enterprise Linux on Microsoft Azure

    Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

    Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
    Learn More
  • 10

    Intertac

    Software for teachers to create playlists and reflective questions

    A pylons based website with multimedia sharing of learning material in a repository. Multiple teachers can select a playlist of items for their students, with associated questions, comments, resources. The material selected in a course can then be used to generate scenario games with the scripting tools provided for Unity. This project was funded by the Office of Teaching and Learning, Australia, and is made available through Creative Commons CC BY 3.0 AU licence .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Triangular backgrounds

    Free triangular backgrounds

    Six free images for commercial use. Dimensions: 2800px x 1900px and 300 DPI CC Licence https://creativecommons.org/licenses/by/3.0/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    WS-Attacker is a modular framework for web services penetration testing. It is a free and easy to use software solution, which provides an all-in-one security checking interface with only a few clicks. WS-Attacker is developed by the Chair of Network and Datasecurity, Ruhr-University Bochum (http://nds.rub.de/) and the 3curity GmbH (http://3curity.de/).
    Downloads: 5 This Week
    Last Update:
    See Project
  • 13
    PentagonCrew DDoS Tool

    PentagonCrew DDoS Tool

    ## YOU NEED PYTHON 2.7 TO RUN THE SCRIPT ##

    https://www.python.org/download/releases/2.7/ A tool designed by members of PentagonCrew to help you easily take down websites. -Ethical uses only-
    Downloads: 11 This Week
    Last Update:
    See Project
  • 14
    CipherCrypt C++

    CipherCrypt C++

    A C++ program which packages Input/Output and block ciphers.

    CipherCrypt C++ is a college project created with the purpose of adding a layer of security to projects which save data to external files. The project uses basic block ciphers to scramble plain text fields. These block ciphers are by no means secure against attack, nor are they meant to be, CipherCrypt C++ is more about providing cipher functionality in a easy-to-use format for small scale projects. CipherCrypt C++ comes packaged with an SDL framework GUI which showcases the read/write...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15

    DdosAtaquer

    Attack IPs

    When you open the program, he opens 170 CMDs, and all tring to close a IP. Its not very strenght, but too is not too weak. (Sorry for bad english, im brazilian)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    cSploit

    cSploit - An Android network penetration suite.

    cSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assesments on a mobile device.Once cSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing (...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    JS/CC LALR(1) Parser Generator

    JS/CC LALR(1) Parser Generator

    A LALR(1) Parser Generator for JavaScript written in JavaScript

    JS/CC is a parser generator for JavaScript/ECMAScript, which is entirely written in ECMAScript itself. It produces LALR(1) parsers with integrated lexical analyzers. JS/CC can run as a website or be invoked from a console, and runs on several platforms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Sky Terror Air Raider

    A powerful denial of service attack tool.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    xxe

    Intentionally vulnerable web services exploitable with XXE

    An XML External Entity attack is a type of attack against an application that parses XML input. This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser. This attack may lead to the disclosure of confidential data, denial of service, port scanning from the perspective of the machine where the parser is located. This zipped Ubuntu VM is set up as a Capture the Flag with those that successfully exploit the XXE vulnerability...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Start Bootstrap

    Start Bootstrap

    A library of free and open source Bootstrap themes and templates

    Start Bootstrap creates free, open source, MIT license, Bootstrap themes, templates, and code snippets for you to use on any project, guides to help you learn more about designing and developing with the Bootstrap framework, and premium Bootstrap UI products. A library of open source, free to download, MIT licensed website themes and template based on Bootstrap. All of the templates and themes featured on Start Bootstrap are up to date for Bootstrap 4! A one page agency theme. A fully...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    LOIC

    A network stress testing application

    Low Orbit Ion Cannon. The project only keeps and maintains (bug fixing) the code written by the original author - Praetox, but is not associated or related to it. DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR...
    Downloads: 2,786 This Week
    Last Update:
    See Project
  • 22
    ODS3 Virtual Machine Challenge

    ODS3 Virtual Machine Challenge

    Virtual Machine Image To Test Penetration Skills

    The ODS3 Virtual Machine Challenge are downloadable images that can be run as VMWare or VirtualBox instances. The Idea behind the challenge is to test and exercise web application penetration testing in a controlled environment. These images are great for cyber security students, penetration testers and hobbyist. Care should be taken if installed on an Internet access host as the application are purposely vulnerable to attack and exploitation.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    Rinzler USB Cleaner

    Rinzler USB Cleaner

    V2.0-Unhides Folder/Files,removes malicious scripts from USB Drive

    V2.0 (30th Dec 2014). It is a USB Malware Cleaner. This is a small tool that removes malicious scripts created by virus or malware, unhides folder and files, deletes all shortcut from selected drive. Also disables autorun completely and provides option to enable registry, folder options and task manager. Visit the project website for more information.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 24
    wafep

    wafep

    Web Application Firewall Evaluation Project

    WAFEP is designed to assess the attack vector support of web application firewalls and application IDS/IPS modules. It operates through an "attacker website" with links, forms, browser controls and other request initiators which send a collection of malicious payloads through the WAF to a target application, which in turn, checks which payloads were blocked and which passed successfully. The WAFEP application serves as both the "attacker" website and the "target" website, and thus, should...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Anti SQL Inject

    Block SQL Injections as soon as their detected[Alpha]

    This PHP Library blocks common SQL injection attacks its as simple as calling some code, as a basic demo of what code shall be put in, require('antiinect.php'); //Import the library antiinject($parameter,true); //call the libraries primary function and true equals to block the attack more info on how to use the library can be found on the wiki Currently Supports(ALPHA 1.2): Apostrophe Based attacks(') union select based detection * order by * based detection example page(no SQL...
    Downloads: 0 This Week
    Last Update:
    See Project