Showing 147 open source projects for "exploit"

View related business solutions
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1
    Luminance HDR

    Luminance HDR

    Complete solution for HDR photography

    Luminance HDR is a complete suite for HDR imaging workflow. It provides a wide range of functionalities, during both the fusion stage and the tonemapping stage. Its graphical user interface, based on Qt5, runs on a variety of platforms, such as Microsoft Windows, Mac OS X 10.9 and later and several Unix flavors (Linux, FreeBSD and others). Input images can be supplied in multiple formats, from JPEG to RAW files. In the same way, output can be saved in many different formats as well, from...
    Leader badge
    Downloads: 278 This Week
    Last Update:
    See Project
  • 2
    pico

    pico

    A Git-driven task runner built to facilitate GitOps and Infrastructure

    ...The modern browser is very much like an operating system, both in terms of complexity and code size. Only massive corporations can build and maintain it. Further, the web breeds platforms that exploit your reward and learning centers in order to increase "engagement." We have no issue with the commercialization of the web -- that's how useful services exist. However, we are more aligned with products and services that promote human communication and collaboration in its purest forms. Many of our services don't require a password, but still offer many familiar features like content management.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Accelerate

    Accelerate

    Embedded language for high-performance array computations

    ...Accelerate is a free, general-purpose, open-source library that simplifies the process of developing software that targets massively parallel architectures including multicore CPUs and GPUs. Embedded in the advanced functional programming language Haskell, Accelerate programs are declarative, statically-typed, pure, functional, and ready to exploit all of the performance of modern parallel hardware. The combination of a strong type system, high-level code, and interactive development environment, allows you to develop code quickly with the confidence that it is correct.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Hackingtool

    Hackingtool

    ALL IN ONE Hacking Tool For Hackers

    ...Includes many individual tools, often wrappers or aggregations of existing well-known tools (e.g. port scanners, web attack tools, steganography, hash cracking etc.). A menu interface offering categories: reconnaissance, payload creation, wireless attacks, reverse engineering, exploit frameworks, etc. Users can pick which tool to run. It is intended more for “ethical / lab / educational” hacking contexts rather than production or stealth scenarios. It depends a lot on external tools, grants, and root privileges in many cases.
    Downloads: 23 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 5
    idevicerestore

    idevicerestore

    Restore/upgrade firmware of iOS devices

    A command-line application to restore firmware files to iOS devices. The iDevice restore application is a full reimplementation of all granular steps which are performed during the restore of firmware to a device. In general, upgrades and downgrades are possible, however subject to the availability of SHSH blobs from Apple for signing the firmware files. idevicerestore requires a properly installed usbmuxd for the restore procedure. Please make sure that it is either running or configured to...
    Downloads: 72 This Week
    Last Update:
    See Project
  • 6

    Dosage form optimizer

    Optimize dosage form based on R models (ANN, GP, FL)

    Software delivers the possibility of automatic dosage form optimization based on R models. Up to now, 4 different modules are available and allow user to exploit R models created with monmlp, neuralnet, rgp, and fugeR tools.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Odysseasons

    Odysseasons

    Fun platformer game

    ...It also connects the concept of seasons with passage of time and growth. As the main character goes through the seasons, so it grows and gains new abilities, and levels are designed in that way to challenge the player to exploit these new abilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Sploitware

    Sploitware

    Vulnerability analytics

    Sploitware is a curated repository that maps the world of exploit development, offensive security, and binary exploitation into organized learning material. It brings together links to tutorials, tools, writeups, and CTF resources so that security learners don’t have to hunt across the internet for a coherent path. The focus is on practical exploitation skills: understanding memory corruption, reverse engineering, shellcode, privilege escalation, and platform specifics.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    WebSploit Framework

    WebSploit Framework

    WebSploit is a high level MITM Framework

    WebSploit Advanced MITM Framework [+]Autopwn - Used From Metasploit For Scan and Exploit Target Service [+]wmap - Scan,Crawler Target Used From Metasploit wmap plugin [+]format infector - inject reverse & bind payload into file format [+]phpmyadmin Scanner [+]CloudFlare resolver [+]LFI Bypasser [+]Apache Users Scanner [+]Dir Bruter [+]admin finder [+]MLITM Attack - Man Left In The Middle, XSS Phishing Attacks [+]MITM - Man In The Middle Attack [+]Java Applet Attack [+]MFOD Attack Vector [+]ARP Dos Attack [+]Web Killer Attack [+]Fake Update Attack [+]Fake Access point Attack [+]Wifi Honeypot [+]Wifi Jammer [+]Wifi Dos [+]Wifi Mass De-Authentication Attack [+]Bluetooth POD Attack Project In Github : https://github.com/websploit
    Downloads: 8 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10
    PPIXpress

    PPIXpress

    specific protein interaction networks from transcript expression

    ...Since a simple reduction of the networks to the subset of expressed genes only scratches the surface of higher organisms’ regulatory capabilities, we propose the advanced method PPIXpress that allows to exploit expression data at the transcript-level and is thus able to also reveal alterations in protein connectivity caused by alternative splicing. The original publication can be found on https://bioinformatics.oxfordjournals.org/content/32/4/571 .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    pued

    pued

    PUed - PlantUML Editor

    PUed is a PlantUML script editor able to generate UML diagram images by means of the PlantUML capabilities. In order to exploit all PlantUML features the Graphviz platform shall be installed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Taringa! sin Perdidas

    Taringa! sin Perdidas

    last version: 1.7.8 (10/01/2019)

    Taringa! sin perdidas es un complemento diseñado para devolver parte de la vieja y nostalgica taringa v5 (CASI). Para mas info ver acrhivo cambios.txt Google Chrome http://sourceforge.net/projects/taringasinperdidas/files/copilado/Taringa_sin_Perdidas_1.5.21.crx/download Opera Next https://addons.opera.com/es/extensions/details/taringa-sin-perdidas-2 Mozilla Firefox https://addons.mozilla.org/es/firefox/addon/taringa-sin-perdidas
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    httpshell is an interactive https command exploit to test the perimeter security of your network. This is a customized HTTPS encrypted reverse shell. It illustrates how easy to bypass any perimiter firewall and IPS by simply encrypting the data. To list all connecting clients: sulod -l To interact with existing client sessions: sulod -i <number> by Nelson Maligro
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Andspoilt

    Andspoilt

    Run interactive android exploits in linux.

    Andspoilt is a command line user interface designed to easily exploit android devices. Run interactive android exploits in linux by giving the users easy interface to exploit android devices Uses an intergration with Metaspoilt Framework by giving the user an easy interface to create payloads and launch android exploits. Current Additional feature is a simple web server for file distribution.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 15
    BlockSparse

    BlockSparse

    Efficient GPU kernels for block-sparse matrix multiplication

    The blocksparse repository provides efficient GPU kernels (TensorFlow custom ops) for block-sparse matrix multiplication and convolution operations. The idea is to exploit block-level sparsity — i.e. treat matrices or weight tensors as composed of blocks, many of which may be zero or unused — to save compute and memory when sparsity patterns are structured. This is particularly useful in models like Sparse Transformers, where attention matrices or intermediate layers may adopt block-sparse patterns to scale better. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The...
    Leader badge
    Downloads: 41 This Week
    Last Update:
    See Project
  • 17

    dns2blackhole

    Malware Prevention through Domain Blocking (Black Hole)

    dns2blackhole is a set of FreeBSD Bourne Shell csh scripts that fetch host files from public host file providers that contain the FQDN [ Fully Qualified Domain Names ] of sites that fall into the following categories, adware, malware, exploit, hijackers, harvesters, tracking, phishing, fake news, fraud, spam, sex, porn, gambling, advertisements, misleading marketing, illegal pharmacy, warez/piracy and others. The output of the dns2blackhole scripts is fed directly into the ports/package versions of unbound, named, and dnsmask DNS servers to block those FQDN thus protecting user devices from being compromised or bothered seeing things of no interest. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18

    Track -1-Generator-2017

    Generate track 1 from track 2

    ...Tags: CVV , Python , fullz , SSN , prv8 , MMN , DOB , Track1 , C++ , Track2 , carding , POS , fraud , zeus , citadel , banking , Perl , spyeye , dumps , Alina , cardable , paypal , PHP , Vskimmer , java exploit , Dexeter , blackpos , carding forum , ASM , skimmer , fake antivirus , android , ICQ , symlink , flash exploit , root , deface , hack , backtrack , apache , TDS , litespeed , linux , windows , asp , aspx , C# , python , localroot , OTR , shell , SSH , security , hacking , SQLi , XSS , CSRF , 0day , exploit , VBV , trojan , HTTP , virus , worm , DDOS , Scan , eth0 , RDP , PR , botnet , carding , centos , plesk , FUD , redhat , carding, cc checker, dump checker, cc shop, dump shop, free cvv, free dumps
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    StakePoint

    StakePoint

    Project and Portfolio Management

    ...Break down tasks and optimise resource requirements to build competitive budgets. Multi-project and multi-user, StakePoint allows your team members to get organised to keep up with deadlines and objectives. Reduce lost time, exploit resources better and anticipate your working capital requirements. Created for Mac & Windows: StakePoint runs identically on OSX and MS-Windows. Developed for Project Managers: StakePoint always shows critical paths and introduces matrix type navigation to improve visibility across engagements, progress curves and workloads. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    d13 - strategy browser game engine

    d13 - strategy browser game engine

    online 4X browser game engine

    d13 is a free browser game engine that allows you to build your own multiplayer online strategy game. suited for tick based empire building games that follow the 4X concept: eXplore, eXpand, eXploit and eXterminate. Despite its oldschool look and feel, d13 comes as a fully OOP, MVC web-application that features a responsive design as well as great flexibility. You can easily add troops, buildings and technologies and create templates and skins for the project as well. Live Demo: http://www.critical-hit.biz/d13 Documentation: http://www.critical-hit.biz NOTE: This is a DEV release. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    GPU3SNP

    Exhaustive search for third order epistatic interactions using CUDA

    GPU3SNP is a multi-GPU tool that exhaustively analyzes case-control datasets looking for 3-SNP combinations that present epistatic interaction. It provides a list with the combinations that have higher Mutual Information, which is used as measure for interaction. It is parallelized using CUDA and can exploit several GPUs in the same node/system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    PBSuite

    PBSuite

    Software for Long-Read Sequencing Data from PacBio

    .... ----- PBHoney ----- Read The Paper http://www.biomedcentral.com/1471-2105/15/180/abstract PBHoney is an implementation of two variant-identification approaches designed to exploit the high mappability of long reads (i.e., greater than 10,000 bp). PBHoney considers both intra-read discordance and soft-clipped tails of long reads to identify structural variants.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Malwarebytes
    ...Malwarebytes 3.0 is the next-gen security program that protects you from the most advanced (zero-day) threats, making antivirus obsolete. Malwarebytes 3.0 combines all of our malware-fighting technology - anti-malware, anti-ransomware, anti-exploit, and malicious website protection into one program that scans 4x faster than previous versions of Malwarebytes Anti-Malware Premium. Benefits: Protects you from advanced (zero-day) threats, including ransomware, so you can surf the Web without worry Removes all traces of malware for complete safety Removes potentially unwanted programs (PUPs) that make your computer run poorly Scans fast so you don't have to sit around and wait for your security to finish working Easy to use, just set it and forget it Can replace antivirus or run alongside other antivirus programs.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    Dunge-O-Plunge

    Dunge-O-Plunge

    A snarky 2D management game about building and running a dungeon.

    A snarky, top-down 2D management/city-builder game about building, running and managing a dungeon to maim and exploit courageous heroes. Built on top of the Godot game engine, which is multiplatform. Right now, Dunge-O-Plunge is in a closed pre-alpha state. The source code is available as per the terms of the GNU GPL but the program should be considered unreleased. Thank you for your interest in the project!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A webapp hacking game, where players must locate and exploit vulnerabilities to progress through the story. Think WebGoat but with a plot and a focus on realism&difficulty. Contains XSS, CSRF, SQLi, ReDoS, DOR, command injection, etc
    Downloads: 16 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB