Showing 57 open source projects for "attack"

View related business solutions
  • One Unified Time Tracking Software For Projects, Billing, Pay and Compliance Icon
    One Unified Time Tracking Software For Projects, Billing, Pay and Compliance

    For companies of all sizes looking for a Time Tracking software

    Replicon's time-tracking platform is scalable and configurable to support the diverse needs of small, mid & large businesses with a remote and globally distributed workforce. Replicon’s Time Tracking is a cloud-based, enterprise-grade solution that tracks employee time across projects, tasks, presence, and absence to facilitate client billing, project costing, and compliant payroll processing. The scalable and configurable platform offers seamless integration with common business technology stacks, such as ERP, CRM, Accounting, and payroll solutions. With AI-powered time capture, mobile apps, and labor compliance as a service, Replicon makes time tracking hassle-free.
    Learn More
  • Papirfly: Best user-friendly DAM and Content Creation Software Icon
    Papirfly: Best user-friendly DAM and Content Creation Software

    The #1 solution to create and manage content. On‑brand. At scale.

    Papirfly provides a single online destination for all your employees and other stakeholders who are engaging with your brand, ensuring consistency in all aspects of their communications. Teams can produce infinite studio-standard marketing materials from bespoke templates, store, share and adapt them for their own markets and stay firmly educated on the brand’s purpose, guidelines and evolution – with no specialist skills or agency help necessary.
    Learn More
  • 1
    Monero P2Pool

    Monero P2Pool

    Decentralized pool for Monero mining

    Decentralized pool for Monero mining. No central server that can be shutdown/blocked. P2Pool uses a separate blockchain to merge mine with Monero. Pool admin can't go rogue or be pressured to do an attack on the network because there is no pool admin.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    AWS SDK for C++

    AWS SDK for C++

    AWS SDK for C++

    ...It supports major platforms including Windows, macOS, and Linux, and uses CMake for builds so you can include only the services your application needs, helping reduce binary size and surface attack area. Documentation, code examples and build instructions make integration straightforward, and the modular build ability allows teams to pick and choose service clients.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 3
    gVisor

    gVisor

    Application Kernel for Containers

    ...Its key runtime, runsc, integrates seamlessly with container ecosystems such as Docker and Kubernetes, making it easy to deploy sandboxed workloads using familiar tools. By intercepting and safely handling syscalls from applications, gVisor reduces the attack surface of the host kernel, mitigating risks associated with running untrusted or potentially malicious code in containerized environments.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Block Attack - Rise of the Blocks
    Game based on the game "Tetris Attack". This has nothing to do with the classic tetris game. This project's main focus is on the single player experience.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Electronic Lab Notebook (ELN) Software Icon
    Electronic Lab Notebook (ELN) Software

    Ideal for any lab. Whether you’re just starting up, a small or large academic institution, or a globally operating company.

    eLabJournal is an all-in-one Electronic Lab Notebook (ELN) software that includes sample tracking and protocol management modules.
    Learn More
  • 5
    Linux Air Combat

    Linux Air Combat

    Combat Flight Simulator for LINUX. WW2. Network and VOIP. Open-source.

    WW2 Combat Flight Simulator. Free. Current Version: 9.92. This is now the world's leading open-source combat flight sim for LINUX. Linux Air Combat ("LAC") runs on almost any desktop LINUX system (even Steam Deck & Raspberry Pi) and generates smooth, high-performance flight. If it runs TOO fast on your hardware (framerates beyond 100 FPS), you should activate LAC's built-in FrameRate Limiter as documented...
    Leader badge
    Downloads: 65 This Week
    Last Update:
    See Project
  • 6
    Genode OS Framework

    Genode OS Framework

    Tool kit for building highly secure special-purpose operating systems

    ...The framework provides mechanisms to let programs communicate with each other and trade their resources, but only in strictly-defined manners. Thanks to this rigid regime, the attack surface of security-critical functions can be reduced by orders of magnitude compared to contemporary operating systems.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Seven Kingdoms: Ambition

    Seven Kingdoms: Ambition

    An enhanced version of 7K:AA (Seven Kingdoms: Ancient Adversaries).

    Seven Kingdoms: Ambition is a real-time game of epic strategy and empire building featuring economy management, warfare, and intrigue. It is an updated and enhanced version of 7kaa (7K: Ancient Adversaries) featuring numerous fixes and improvements. https://discord.gg/xJs99xK38G Begin with a single, modest village under your command, and an entire world to be conquered by force of arms, guile, persuasion, or whatever other means you choose. Wage open warfare on your rivals, or forge...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 8

    Candy's Space Mysteries II

    With the helpfull nef, you have to rescue earthlike planets!

    During their recent spacetrip, Candy & Noopy get trapped into a giant wormhole! They made a long light trip and found a passage who leads to the Milky Way. They was searching for a place to land, they have found the Earth. Knowing that great cataclysms are menacing their homeplanet, Candy & Noopy said together: - "We must save the Earth!". Since some times, the star masses, combined with the magnetic-fields of this planet gave special powers to the spaceship: The one of...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    dorban

    dorban

    A demo for the Svarog AI library.

    ...It contains a player (Pregor) controlled by the user and an NPC (Dorban) controlled by the Svarog interpreter. The objective is to kill the vampire. Or at least to attack him with the optimal chances. The Svarog AI library contains a new optimization algorithm based on so called hidden variables. In order to achieve the objective Dorban will try to convince Pregor to accompany him, and together they will try to find the vampire in a graph with 5 city nodes. When accompanying Dorban use menu item "follow orders" to follow his orders.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Jscrambler: Pioneering Client-Side Protection Platform Icon
    Jscrambler: Pioneering Client-Side Protection Platform

    Jscrambler offers an exclusive blend of cutting-edge first-party JavaScript obfuscation and state-of-the-art third-party tag protection.

    Jscrambler is the leader in Client-Side Protection and Compliance. We were the first to merge advanced polymorphic JavaScript obfuscation with fine-grained third-party tag protection in a unified Client-Side Protection and Compliance Platform. Our integrated solution ensures a robust defense against current and emerging client-side cyber threats, data leaks, and IP theft, empowering software development and digital teams to innovate securely. With Jscrambler, businesses adopt a unified, future-proof client-side security policy all while achieving compliance with emerging security standards including PCI DSS v4.0. Trusted by digital leaders worldwide, Jscrambler gives businesses the freedom to innovate securely.
    Learn More
  • 10
    Udp2raw-tunnel

    Udp2raw-tunnel

    Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic

    A tunnel which turns UDP traffic into encrypted fakeTCP/UDP/ICMP traffic by using Raw Socket, helps you bypass UDP FireWalls(or unstable UDP environment). When used alone, Udp2raw tunnels only UDP traffic. Nevertheless, if you used udp2raw + any UDP-based VPN together, you can tunnel any traffic(include TCP/UDP/ICMP), currently, OpenVPN/L2TP/ShadowVPN and tinyfecVPN are confirmed to be supported. Linux host (including desktop Linux,Android phone/tablet,OpenWRT router,or Raspberry PI) with...
    Downloads: 28 This Week
    Last Update:
    See Project
  • 11
    Blobwars: Blob And Conquer

    Blobwars: Blob And Conquer

    3D third person platform shooter

    Blob And Conquer is a 3D shooter with some puzzles. It is the second in the Blobwars series. The Blobs' homeworld is still littered with the alien forces and Bob once again makes it his task to lead the counter attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    DracOS GNU/Linux Remastered
    What is DracOS GNU/Linux Remastered ? DracOS GNU/Linux Remastered ( https://github.com/dracos-linux ) is the Linux operating system from Indonesia , open source is built based on Debian live project under the protection of the GNU General Public License v3.0. This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering. Use a GUI-based...
    Downloads: 41 This Week
    Last Update:
    See Project
  • 13
    WiFi Duck

    WiFi Duck

    Wireless keystroke injection attack platform

    A user-friendly open-source project to learn about keystroke injection attacks or ‘BadUSBs’. By emulating a USB keyboard, BadUSBs can gain full access to a computer in a matter of seconds! Unlike with other BadUSBs, you don’t need to install an app, log in, compile, or copy scripts onto an SD card. You simply connect via WiFi to manage all your scripts from within the web interface. This tool is intended to be used for testing, training, and educational purposes only. Never use it to do harm...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Mac Crack Attack
    Mac Crack Attack is a port of Crack Attack to the Mac OS X platform. Crack Attack is based on the Super Nintendo classic Tetris Attack. Mac Crack Attack is a fast paced "Tetris-like" game for one or two players (networked)
    Downloads: 7 This Week
    Last Update:
    See Project
  • 15
    Hyenae NG

    Hyenae NG

    Advanced Network Packet Generator

    Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pattern based address randomization and flood detection breaking mechanisms. *** Please check out the latest source from my GitHub repository and check the Build informations. https://github.com/r-richter/hyenae-ng/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Bat Attack

    Bat Attack

    Bat Attack is a cool classical 8bit game to save wife from the Bats

    Bat Attack is a cool classical 8bit game with bats instead and a lot of comic blood and gore and comical media with a funny story mode. The story starts when the main character 'Dave' is driving on his honeymoon with his wife Betty when an Evil bat swoops down and take his dearly beloved off. You have to get Betty back by using the guns available to your disposable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Perkun Wars

    A simple fantasy game

    A simple fantasy game based on the AI library perkun. The objective of the game is to kill a vampire. There are three towns where he may be hidden: Wyzima, Novigrad and Shadizar. It is best to attack the vampire when many NPCs are around. However Pregor and Thragos will avoid him. Dorban will constantly hunt him. It requires the perkun library - download it from http://sourceforge.net/projects/perkun/ This game is intended mainly for the developers willing to learn how to use perkun as a library.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Rcbot2
    RCBot2 An open source GPL bot framework for HL2 Orange Box Mods ONLY
    Downloads: 29 This Week
    Last Update:
    See Project
  • 19
    conquests

    conquests

    Turn based Civ-like strategy game

    Conquests is a turn-based 4X Civilization-like 3D strategy game for Windows and Linux. You can discover new technologies from the stone age to the space age, explore the world, and wage war on your opponents. It supports both Direct3D and OpenGL graphics, and can run in both 2D and 3D modes.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Rinzler USB Cleaner

    Rinzler USB Cleaner

    V2.0-Unhides Folder/Files,removes malicious scripts from USB Drive

    V2.0 (30th Dec 2014). It is a USB Malware Cleaner. This is a small tool that removes malicious scripts created by virus or malware, unhides folder and files, deletes all shortcut from selected drive. Also disables autorun completely and provides option to enable registry, folder options and task manager. Visit the project website for more information.
    Leader badge
    Downloads: 65 This Week
    Last Update:
    See Project
  • 21
    PhishBlock

    PhishBlock

    A program that detects and blocks phishing, pharming, Hacker's C&C.

    ...Recently, most malware codes are delivered covertly to users’ personal computers through Google ads, SNS, Blogs, BBS and so on, which users visit often. And After the malware codes connect the C&C server(or Botnet), they attack, and steal information, repeatedly and persistently. Currently, there is a lack of affordable software to protect individuals personal computer’s from detecting and blocking these malware features. Generally, virus vaccine programs only detect and block files already existing inside a users’ personal computer. But PhishBlock detects and blocks harmful files at the network entrance of personal computers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    SSL Diagnos

    SSL Diagnos

    SSL Strength Evaluation and Test Utility

    SSL Diagnos is used to test SSL strength; get information about SSL protocols (pct, ssl2, ssl3, tls, dtls) and cipher suites. It can also be used for testing and rating ciphers on SSL clients. It has also specific support for pop3s, sip, smtp and explicit ftps. Tests for heartbleed (including dtls). Furthermore a separate tool, SSLPressure, not using openssl can be used to check the whole spectrum of possible SSL protocols on a server. Can also be used for testing ssl for...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 23
    Penguin Attack is a puzzle game in the style of Tetris Attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Pulsar Game

    Pulsar Game

    Pulsar is a card video game using Stars as gameplay key elements.

    Pulsar is a card video game. A card represents a star constellation, and thus contains stars that can be used in two ways : * Attack Stars (also called AMAS Stars) will generate an attack to flip opponents cards (and take them) ; * Defense Stars will protect the card from opponents. It is also the interface with other cards to begin a battle. The inner gameplay is much more complex as Cards and Stars can evolve, be damaged. AMAS Stars are "AutoMated Attack System" Stars. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Skraken

    Break A5/1 cipher used in GSM

    Skraken is a tool to break the A5/1 ciphering used in GSM. It is a partial rewrite of Kraken that solves its stability issues. The attack is based on a CPU/storage tradeoff that attempts to find the internal state of the A5/1 registers given an observed keystream. The storage component requires a set of 40 rainbow tables that totals ~1.7 TB, although any subset of the tables can be used with a reduced success rate. Using all the tables, the success rate of finding the internal state that generates a GSM burst is around 20%. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next
MongoDB Logo MongoDB