Showing 147 open source projects for "exploit"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 1
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Falcon Attacker

    Interesting multithreaded, customizable, simple denial of service tool

    Falcon Atttacker DoS Tool. Features: Choosable DNS/IP, PORT, Page, Server Timeout, Threads, Time Between Headers. POST attacks, GET attacks, TCP flood, ICMP flood, modem hangup ping exploit flood, DNS-to-IP option for less bandwidth, speeds, other stuff, Multithreaded, Simple question/answer style attack control, comprehensive attack options. BTC: 1LGJhVQeJZ1RQXjkm3VWdJxE4Gz88tk2Y2
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Capture the flag

    Capture-the-flag style security wargames on a Live CD

    Remaster Linux Live CD images for the purpose of creating ready to use security wargames with pre-installed vulnerabilities to exploit.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    gdtranslator

    gdtranslator

    A MS office document translator using google language translation

    ...But the constraint is, the translated document will be shown as a web-page and you can not get the translated document in your original binary format. This backlog prompts us to develop a desktop application which will exploit Google's translation power to translate a document, right from your desktop.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5

    Interactive Space SDK

    Prototyping multitouch interaction on and above the desktop.

    ...Using a depth camera and projector it allows any physical tabletop to become an interactive surface, enabling interaction on and above the surface and with paper documents. The framework provides an SDK that allows developers to exploit any GUI framework that supports the TUIO protocol2. A semi-automatic calibration mechanism ensures easy setup and aids portability.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    SQLSentinel

    SQLSentinel

    OpenSource tool for sql injection security testing

    SQLSentinel is an opensource tool that automates the process of finding the sql injection on a website. SQLSentinel includes a spider web and sql errors finder. You give in input a site and SQLSentinel crawls and try to exploit parameters validation error for you. When job is finished, it can generate a pdf report which contains the url vuln found and the url crawled. Please remember that SQLSentinel is not an exploiting tool. It can only finds url Vulnerabilities SQLSentinel official site: http://www.sqlsentinel.org
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A google-based desktop search utility. Written in PyQt4. To be used in conjunction with google exploit db
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Common Utilities

    Common Utilities

    A module/framework that brings to XOOPS new capabilities and features

    ...With Common Utilities will experience a power injection in XOOPS interface with themes for the GUI and a great versatility for handling graphical elements. What's more, the modules developed for XOOPS and Common Utilities exploit in a more efficiently and modern way the overall system capabilities to allow better web sites. With plugins for Common Utilities, designed to add functionality and improve existing features, performs specific operations to enhance the appearance, performance or other aspects of XOOPS and Common Utilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Exploit tools for windows
    Downloads: 1 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10

    r00t 4 LFI | Toolkit | by KedAns-Dz

    Exec root command with use this script/tool and LFI Exploit

    Exec root command with use this script/tool and LFI Exploit --- If you'r Target can show/read => /proc/self/environ File ! you'r Can Exec some Command in system like (wget,id,...) etc... Make by KedAns-Dz
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    KonEncriptación

    KonEncriptación

    Encryption tool for Dropbox

    ...Encrypt and securely share your files with other KonEncriptación users via Dropbox. KonEncriptación is fully integrated with Dropbox and is easy to use, thus allowing you to exploit all its features from the start.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    OrthoInspector is a new software system for orthology/paralogy analysis. Its purpose is to facilitate the installation and the maintenance of a database describing orthology/inparalogy relations and to provide tools to exploit these data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Python based tool to assess grid computing security. It supports to enumerate headnode, crack certificate authority, guess gridsphere portal login, and exploit trusteeship between headnode.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Algorithms that can exploit of vector architecture.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This project is a Neural Network Training Library implemented on CUDA. It's compatible with the most used libraries but allows to exploit the full power of NVIDIA graphic cards. Experimental results show speed ups over 100 times against CPU libraries
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Stack Flowers is a program that create pattern at the buffer, calculate pattern offset, write pattern buffer into specific variable name & programming language. Used for stack overflow exploit development.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Klava (Klaim in Java) is a Java package for implementing distributed applications that can exploit mobile code and run over a heterogeneous network environment. Klava is based on the KLAIM (Kernel Language for Agent Interaction and Mobility)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    "Project JEDI" is an international community of Delphi developers with a mission to exploit our pooled efforts, experiences and resources to make Delphi -- the greatest Windows application development tool -- even greater.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    JCCD
    The Java Code Clone Detection API (JCCD) allows to implement individual code clone detectors. These code clone detectors can be easily integrated into other Java applications. JCCD is based on a pipeline architecture which allows to replace whole par
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A mod of the Civilization 4 DLL (SDK) with the goals of improved AI and ability to load saves from plain BTS. Gameplay (rules) are unaltered. Where possible, speed is improved.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    CrystalGPU is an execution framework that transparently enables applications to exploit a number of high-level GPU capabilities such as overlapping communication and computation, short lived buffer reuse, and harnessing multi-GPU systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    PHPCentaur
    PHPCentaur is a PHP5 driven exploit scanner for webservers. Scope of the project: -SQL exploits, Cros site scripting vulnerabilities, Remote code injection, Encoding vulnerabilities, Session based attacks. And more...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A unique natural-language processing software, called Discovery, created on the CA Visual Objects/Vulcan.NET environment, which also has potential for effective "shallow approach" machine translation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A PHP based auto Local Exploit trigger. It detects kernel version ,gcc and auto pwn it for specific vulnerabilities. A standard proof of concept.This PHP based script, when allows to upload on vulnerable server .
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB