Search Results for "source code for ddos attacks" - Page 2

Showing 83 open source projects for "source code for ddos attacks"

View related business solutions
  • Field Service+ for MS Dynamics 365 & Salesforce Icon
    Field Service+ for MS Dynamics 365 & Salesforce

    Empower your field service with mobility and reliability

    Resco’s mobile solution streamlines your field service operations with offline work, fast data sync, and powerful tools for frontline workers, all natively integrated into Dynamics 365 and Salesforce.
    Learn More
  • Rezku Point of Sale Icon
    Rezku Point of Sale

    Designed for Real-World Restaurant Operations

    Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
    Learn More
  • 1
    fwknop

    fwknop

    Single Packet Authorization, Port Knocking

    fwknop stands for the "FireWall KNock OPerator", and implements an authorization scheme called Single Packet Authorization (SPA). This method of authorization is based around a default-drop packet filter (fwknop supports iptables and firewalld on Linux, ipfw on FreeBSD and Mac OS X, and PF on OpenBSD) and libpcap. SPA is essentially next-generation port knocking (more on this below). The design decisions that guide the development of fwknop can be found in the blog post "Single Packet...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    amber

    amber

    A Crystal web framework that makes building applications fast

    Amber makes building web applications fast, simple, and enjoyable. Get started with blazing-fast performance. Amber provides the bare metal performance of the Crystal Language. It provides productivity and happiness through a powerful CLI and familiar design patterns seen in Kemal, Rails, Phoenix and other popular frameworks. Use code generation and scaffolding features to rapidly build prototypes. Amber is licensed under the MIT license, which makes it perfect for use in commercial...
    Downloads: 20 This Week
    Last Update:
    See Project
  • 3
    DDoS/Dos Attack Simulator

    DDoS/Dos Attack Simulator

    Distributed Denial of Service Attack Simulator

    ...Extensive features will be added! Mega Feature - > DoS Tool. [ 1 ] Bugs Fixes. [ 2 ] Increase in Optimization. [ 3 ] DoS Attacks. Note: The following program is intended for educational purposes only. I ( Muhammad Sami Furqan ) am not responsible for any damage you do by utilizing this software. Read the License Agreement for more info about the Redistribution and Copyright of this Open-Source Program. Additionally, I strongly advise that you read the documentation thoroughly before attempting to use this program. ...
    Leader badge
    Downloads: 7 This Week
    Last Update:
    See Project
  • 4
    ipfsProxyHTTP

    ipfsProxyHTTP

    InterPlanetary File System HTTP Proxy

    This implementation can help developers to use only one URL to all IPFS files without any risk of breaking the server bandwidth. You can be sure that the server's capacity is large enough to handle all traffic. This code has been written without any dependency to run as faster as possible. IPNS.co use DNSSEC, DNS Anycast, low latency DNS, and IP resolved to different servers to handle all traffic. Each IPFS gateway can break if a lot of files is downloaded simultaneously, this can help to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Skillfully - The future of skills based hiring Icon
    Skillfully - The future of skills based hiring

    Realistic Workplace Simulations that Show Applicant Skills in Action

    Skillfully transforms hiring through AI-powered skill simulations that show you how candidates actually perform before you hire them. Our platform helps companies cut through AI-generated resumes and rehearsed interviews by validating real capabilities in action. Through dynamic job specific simulations and skill-based assessments, companies like Bloomberg and McKinsey have cut screening time by 50% while dramatically improving hire quality.
    Learn More
  • 5
    Ascon

    Ascon

    Command-line Ascon v1.2 Encryption Tool written in Go

    Ascon is a new family of authenticated encryption algorithms, submitted to the CAESAR competition for authenticated ciphers. The Ascon family was designed to be lightweight and easy to implement, even with added countermeasures against side-channel attacks. This project is licensed under the ISC License. Copyright © 2020-2022 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/ascon Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Miningcore

    Miningcore

    Miningcore is a high-performance Mining Pool Software for Linux

    Miningcore is a high-performance Mining Pool Software for Linux and Windows.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    messor-opencart

    messor-opencart

    Messor Security - IPS/WAF anti DDOS/bot and more for OpenCart3

    Messor Free open source extension for OpenCart to protect your store. Each network member collects intruders and attacks data and then sends it to central servers, as well as distributes the current database to the rest network participants. The current concept provides real-time protection of your store from the network attacks.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8
    Zero Site Protector

    Zero Site Protector

    Human verification & attack prevention for website security

    The zero-site-protector plugin is a powerful security tool for your website that provides multiple layers of protection to safeguard against unauthorized access and potential attacks. The plugin includes features such as human verification, which ensures that only legitimate users are able to access your site. It also includes protection against various types of attacks such as cross-site scripting (XSS) and SQL injection. Additionally, the plugin allows you to block access to your...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    binserve

    binserve

    A fast production-ready static web server with TLS (HTTPS)

    A fast static web server with TLS (HTTPS), routing, hot reloading, caching, templating, and security in a single binary you can set up with zero code. Binserve is designed to be performant, this is thanks to Actix-Web - one of the fastest web frameworks out there and DashMap for handling routes and cache storage. Binserve is cross-platform and portable to any major operating system, like it can run on your Android phone! Routing is simply matching a URI path to a file or a directory in a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • 10
    Node.js express.js MongoDB JWT REST API

    Node.js express.js MongoDB JWT REST API

    Node.js express.js MongoDB JWT REST API - Basic Project Skeleton

    ...Do you want to contribute? Pull requests are always welcome to show more features. Custom email/password user system with basic security and blocking for preventing brute force attacks. Login access log with IP, browser and country location (for country it looks for the header cf-ipcountry that CloudFlare creates when protecting your website). NPM script for keeping good source code formatting using prettier and ESLint. JWT Tokens, make requests with a token after login with the Authorization header with value Bearer yourToken where yourToken is the signed and encrypted token given in the response.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    CleverHans

    CleverHans

    An adversarial example library for constructing attacks

    This repository contains the source code for CleverHans, a Python library to benchmark machine learning systems' vulnerability to adversarial examples. You can learn more about such vulnerabilities on the accompanying blog. The CleverHans library is under continual development, always welcoming contributions of the latest attacks and defenses. In particular, we always welcome help with resolving the issues currently open.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    obfusc

    toolchain for obfuscated compilation

    This is a C compiler, assembler, linker and virtual machine for computing based on encrypted working and obfuscated compilation and execution. The idea is that the platform machine `works encrypted' for the user and unencrypted for the operator, running a machine code instruction set in user mode that is provably safe against computational attacks, for code that is generated by a compiler that has introduced random variations into the code at each recompilation so that the attacker has no...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Simple DNSCrypt

    Simple DNSCrypt

    A simple management tool for dnscrypt-proxy

    SimpleDnsCrypt is a user-friendly graphical interface for dnscrypt-proxy, designed to make encrypted DNS resolution simple and accessible for Windows users who want to improve their privacy and security without delving into complex command-line tools. It provides an intuitive control panel where individuals can enable DNS encryption (such as DNS-over-HTTPS or DNS-over-TLS), select trusted resolvers, and configure advanced options like upstream resolver lists, fallback settings, and filtering...
    Downloads: 117 This Week
    Last Update:
    See Project
  • 14

    mod_spamhaus_new

    Apache 2.4.x security, block known bad IP

    mod_spamhaus_new is an Apache module that uses DNSBL in order to block spam relay via web forms, preventing URL injection, block HTTP DDoS attacks from bots and generally protecting your web service denying access to a known bad IP address. This module is based on mod_spamhaus but has been updated for actual web server configurations and to support a list of domains, which are NOT spam blocked so customers can reach you even if they got a dynamic IP which is on a spam list. Default...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    JavaScript CSRF Protection Bundle

    JavaScript CSRF Protection Bundle

    Automatic CSRF protection for JavaScript apps using a Symfony API

    Archived! Now that all modern browsers implement SameSite cookies and the Origin HTTP header, this bundle is - in most cases - not necessary anymore. Learn how to protect your Symfony APIs from CSRF attacks. If you need to maintain old applications, take a look to DneustadtCsrfCookieBundle. This API Platform and Symfony bundle provides automatic Cross Site Request Forgery (CSRF or XSRF) protection for client-side applications. Despite the name, it works with any client-side technology...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    passport-facebook

    passport-facebook

    Facebook authentication strategy for Passport and Node.js.

    passport-facebook is a Passport strategy for authenticating users with their Facebook credentials using the OAuth 2.0 protocol, enabling Node.js applications to let visitors log in with their Facebook account easily. It manages the redirection to Facebook’s login page, the authorization code exchange, and the retrieval of basic profile information, reducing the boilerplate developers would otherwise write to integrate with Facebook’s API manually. When used with Express and Passport, the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Injectify

    Injectify

    Perform advanced MiTM attacks on websites with ease

    Perform advanced MiTM attacks on websites with ease. Injectify is a modern web based MiTM tool, similiar to BeEF (although completely unrelated in terms of source code). It features cross-platform clients (Web, Desktop, Browser extension). Create a reverse Javascript shell between the victim and the attacker. Records keystrokes and logs them to a database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    DbPipeline.NET

    OR-Mapper for C# and VB.NET that is better than Entity Framework

    The DbPipeline.NET OR-Mapper library was created out of frustration of the shortcomings of Entity Framework in handling stateless web applications and hiding of SQL from skilled developers. The DbPipeline.NET Database Interface Library shields you, the programmer, from having to learn and work with all the ADO.NET or Entity Framework database objects at a low level, and encapsulates all this power into objects with many additional capabilities and features that are not offered in the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    lua-resty-waf

    lua-resty-waf

    High-performance WAF built on the OpenResty stack

    lua-resty-waf is a web application firewall implemented in Lua for OpenResty/NGINX, designed to run inline at the edge with low overhead. It inspects requests and responses during NGINX phases, applying rule logic and anomaly scoring to detect patterns like SQL injection, cross-site scripting, and protocol abuse. Rules are organized into policies with configurable actions—block, log, or allow—and can leverage shared dictionaries for counters, rate limits, and caching decisions. Because it...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Heads

    Heads

    A minimal Linux that runs as a coreboot or LinuxBoot ROM payload

    ...Heads is not just another Linux distribution – it combines the physical hardening of specific hardware platforms and flash security features with custom coreboot firmware and a Linux boot loader in ROM. This moves the root of trust into the write-protected region of the SPI flash and prevents further software modifications to the bootup code (and on platforms that support it, Bootguard can protect against many hardware attacks as well).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    zxcvbn

    zxcvbn

    Low-budget password strength estimation

    For over 30 years, password requirements and feedback have largely remained a product of LUDS: counts of lower- and uppercase letters, digits and symbols. LUDS remains ubiquitous despite being a conclusively burdensome and ineffective security practice. zxcvbn is an alternative password strength estimator that is small, fast, and crucially no harder than LUDS to adopt. Using leaked passwords, we compare its estimations to the best of four modern guessing attacks and show it to be accurate...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Wood Wars 3D

    Wood Wars 3D

    Open-Source, 3D Printed, Light, Tabletop Strategy War Game

    Check the wiki for rules and more information. Wood Wars 3D is an Open-Source, 3D printed, highly accessable, light, tabletop strategy war game based on classic war games like Little Wars by H. G. Wells. Mix and match race and classes to customize your armies. Dodge and move around terrain to confront your opponent and launch devastating marble roll attacks against approaching opponents. The source code for this project isn't like others on Sourceforge. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    MVProc

    MVProc

    MVC web platform for Apache and MySQL Stored Procedures

    MVProc is a Model-View-Controller module for Apache2 that facilitates using MySQL stored procedures as the controller element. NOTE: Version 2.1 is STABLE and currently in production use. NOTE: Versions 1.4+ are for Apache2.4 - in order to run on Apache2.2, replace request_rec->useragent_ip references with request_rec->connection->remote_ip (there are 3 in the source code)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    SQLMate

    SQLMate

    Rapidly generate a DAO for SQLite

    Complete source code, usage example, & a code-generated test case are included in the .jar file. ( See main.java for the usage / code generation example )
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    High Orbit Ion Cannon

    High Orbit Ion Cannon

    High Orbit Ion Cannon

    Please note that the source is in the zip. (note we're working on getting the complete source code.) DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,...
    Downloads: 446 This Week
    Last Update:
    See Project