Showing 45 open source projects for "attacks"

View related business solutions
  • Earn up to 15% annual interest with Nexo. Icon
    Earn up to 15% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Earn up to 15% annual interest with Nexo. Icon
    Earn up to 15% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1
    Proton VPN for Android

    Proton VPN for Android

    ProtonVPN Android app

    ...The datat traveling between your device and the VPN server is encrypted. Secure Core protects your connection by routing your traffic through multiple servers before it leaves our network, defending you against advanced, network-based attacks.
    Downloads: 1,199 This Week
    Last Update:
    See Project
  • 2
    Druid

    Druid

    Database connection pool written in Java

    ...Druid provides a monitoring feature that can be implemented through filter-chain. It also comes with WallFilter, that is based on the SQL semantic analysis to protect from SQL injection attacks. Monitor connection leaks and connect to other databases, like Oracle database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Svix

    Svix

    The enterprise-ready webhooks service

    ...You need to monitor the deliverability of your webhooks to different endpoints, disable failing ones and notify your customers. Webhooks come with a myriad of security implications, such as SSRF, replay attacks and unauthenticated webhook events. You would need to build a UI for your users to add and remove endpoints, inspect logs and get ongoing reports. Offer your users a great developer experience, including the ability to test, inspect and replay their webhooks.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 4
    Spring Security

    Spring Security

    Authentication and access-control framework

    Spring Security is a powerful and highly customizable authentication and access-control framework. It is the de-facto standard for securing Spring-based applications. Spring Security is a framework that focuses on providing both authentication and authorization to Java applications. Like all Spring projects, the real power of Spring Security is found in how easily it can be extended to meet custom requirements. Spring Security uses a Gradle-based build system. In the instructions, ./gradlew...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • 5
    jsoup

    jsoup

    Java library for working with real-world HTML

    jsoup is a Java library for working with real-world HTML. It provides a very convenient API for fetching URLs and extracting and manipulating data, using the best of HTML5 DOM methods and CSS selectors. jsoup implements the WHATWG HTML5 specification, and parses HTML to the same DOM as modern browsers do. jsoup is designed to deal with all varieties of HTML found in the wild; from pristine and validating, to invalid tag-soup; jsoup will create a sensible parse tree. The parser will make...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    StrongKey FIDO Server (SKFS)

    StrongKey FIDO Server (SKFS)

    FIDO® Certified StrongKey FIDO Server (SKFS)

    An open source implementation of the FIDO2 protocol to support passwordless strong authentication using public-key cryptography. Supports registration, authentication (all platforms), and transaction authorization (for native Android apps).
    Downloads: 25 This Week
    Last Update:
    See Project
  • 7
    PWSLIB3

    PWSLIB3

    Password Safe encrypted databases, Java library

    Java module to create, read and write Password Safe V3 encrypted databases. The package is a mature offspring from project JPasswords and can be used with Java 1.8. There is an API document available.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Save The World

    Save The World

    Save The World (Hangman Alternative with Optional Custom Phrases)

    Earthling... You have been chosen to save the world from the alien forces that are trying to destroy our planet! To save our planet from the attacks, you must use your superior intellect to solve the word puzzles to fight off the alien invaders! If you guess correctly, the blank will be replaced with the letter. If you guess incorrectly, the alien invaders will be one step close to our planet! You are allowed five mistakes before the alien invaders destroy our world. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    codeZ

    A program to en/decrypt texts that are only crackable using bruteforce

    codeZ is a program that can encrypt/decrypt texts that are not crackable without using brute-force attacks. It supports loads of characters, including symbols like brackets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Create a personalized AI chatbot for each team in minutes Icon
    Create a personalized AI chatbot for each team in minutes

    Get better, faster answers for your whole team with an AI chatbot trained on your company documents.

    QueryPal is the lifeline your team needs. Our AI chatbot integrates seamlessly with your communication channels, using advanced language understanding to identify and auto-answer repetitive questions — in seconds.
    Learn More
  • 10
    SQLMate

    SQLMate

    Rapidly generate a DAO for SQLite

    Complete source code, usage example, & a code-generated test case are included in the .jar file. ( See main.java for the usage / code generation example )
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    nogotofail

    nogotofail

    An on-path blackbox network traffic security testing tool

    ...The tool functions as an on-path man-in-the-middle (MiTM) testing system, allowing users to inspect and evaluate how applications and devices handle encrypted connections under real-world conditions. It can detect a wide range of vulnerabilities, including improper SSL certificate validation, library misconfigurations, and downgrade or stripping attacks such as SSL and STARTTLS stripping. The system’s flexible architecture supports automated testing at scale, making it suitable for both single-device assessments and large network evaluations. Its modular structure also allows for customization and extension, enabling researchers to target specific network behaviors or encryption flaws.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    J-Syncker
    This application assists in generating pre-compositional material based on a computational interpretation of the 'Schillinger System of Musical Composition' (Schillinger 1946).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    WesWorkshop

    WesWorkshop

    Create units and attacks for Wesnoth!

    This utility provides a GUI to create unit files for the game "Battle for Wesnoth". The user sets the unit properties from the GUI of the utility. Once all the properties have been set, it is possible to export them into a .cfg which will be read by the game. Further details can be found in the project wiki: http://sourceforge.net/p/wesworkshop/wiki/. Version 1.1* released. Please go to the wiki page to see the changes. Note you will not be able to load your works developed with the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Cave Chess

    A Java chess engine using xboard protocol

    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Network Spoofer

    Network Spoofer

    Change websites on a Wifi network

    ...Please note that there is no intention for Network Spoofer to include any malicious features. This application is a fun demonstration of how vulnerable home networks are to simple attacks, with permission of the network owner - DO NOT attempt to use Network Spoofer on any corporate or other non-residential networks (eg. at school, university). It becomes very obvious when Network Spoofer is being used on a Network, and use of Network Spoofer will be considered malicious hacking by network administrators. Available on the Android Market.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 16
    AESTextCrypt

    AESTextCrypt

    Encrypt and decrypt text using AES 256 bit encryption

    AESTextCrypt is an easy-to-use open source tool for text encryption and decryption. Primarily intended for use with email, use it wherever you need to protect text from prying eyes. The encrypted text can be copy/pasted into any text-handling application (e.g. email) instead of plain text. Convenience buttons are provided for clipboard operations. AESTextCrypt uses AES-256 bit encryption which is the strongest available encryption scheme. It also employs bcrypt, which implements...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Java-based Open Source WAF (Web Application Firewall) to include inside a web application in order to protect it against attacks like Cross-Site Request Forgery (CSRF), Parameter Manipulation and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    MyZone Social Network

    peer to peer social network

    ...MyZone does not downgrade the resolution of your photos and all established connections are encrypted using state of the art encryption techniques. MyZone is designed to be resilient towards cyber attacks especially DDoS attacks and government imposed censorships. MyZone should be an interesting social networking platform for users who are more concerned with the privacy of their profile information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    PokeDroid
    Pokémon simulator for Android! Features include a variety of AI opponents, all Pokémon and moves, and total Pokémon customization (IVs, EVs, nature, etc.) Download it and send us your feedback!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    DroidVulMon

    DroidVulMon

    This project is to monitor vulnerability of Android based smartphone

    ...We want to develop an Android Vulnerability Monitoring system (DroidVulMon) by collecting and aggregate diverse events activated from user's mobile device for detecting malicious attacks such as mobile exploits. We provide open source S/W with overall common modules such as collecting events and detecting malicious events.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    javawebutils

    web application utilities

    This library contains utility classes such as a converter from plain text to HTML (for safe inclusion of user-supplied text into web pages, avoiding XSS attacks, etc.), converters from binary to hex representation, and similar functions
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Droid Pentest help you to find all android apps for penetration testing and hacking so you can make complete penetration test platform .
    Downloads: 11 This Week
    Last Update:
    See Project
  • 23

    AntiDef

    Anti defacement command line tool

    AntiDef is written in order to handle with defacement attacks. This tool written in Java in a fast-and-dirty manner; However is works. This tool is working straight forward. Server administrator should run the application with the following specific parameters: path to the copy of the web site (source), path to the application directory, path to log directory and few more optional parameters.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24

    RIDSystem

    capturing packet and detecting intruders with their signature

    Introduction: This project has been developed to detecting intruder activity in your network according to the existing signature of intrusion attacks,Anomalous behaviour etc... Scope: Government authorities has lot of information about defence,revenue,income tax and many informations. Intrusion Detection System will certainly minimize the unauthorized access and take immediate response to stop such illegal works. MNCs manages their whole information system using application software over their network.It will be helpful to monitor all the activity in the network. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Chess Queens
    Calculate the number of solutions to place n queens on an n*n chess board, without any queen attacking each other. Options allow using rooks instead of queens, disabling knight attacks and setting the minimum distance between queens.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB