Showing 5 open source projects for "attack"

View related business solutions
  • Marketing automation for any business | ActiveCampaign Icon
    Marketing automation for any business | ActiveCampaign

    Your team of AI agents handles email, SMS, WhatsApp and more for you

    Active Intelligence revolutionizes how you work. You guide direction while AI handles execution, acts on insights, and shows you the path forward. It's how marketing should be.
    Learn More
  • The leading LMS solution for mission critical learning needs Icon
    The leading LMS solution for mission critical learning needs

    it takes the modern learning environment to workforce enablement and beyond.

    Streamline and integrate your complex learning, compliance, content monetization, and external training capabilities while keeping your people safe and delivering profits with Seertech’s LMS solution.
    Learn More
  • 1
    OWASP Amass

    OWASP Amass

    In-depth attack surface mapping and asset discovery

    The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery using open source information gathering and active reconnaissance techniques. The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software. All of our projects ,tools, documents, forums, and chapters are free and open to anyone interested in improving application security. ...
    Downloads: 20 This Week
    Last Update:
    See Project
  • 2
    PowerUpSQL

    PowerUpSQL

    A PowerShell toolkit for attacking SQL Server

    ...The project is aimed at internal penetration testers and red-teamers but is also useful for database administrators and defenders who want to inventory SQL Server attack surface and hunt for misconfigurations. PowerUpSQL can surface things like weak configuration flags, dangerous surface (for example, features that may enable code execution from SQL), credential material exposed in configuration, and cross-instance trust relationships such as linked servers. The codebase is implemented primarily in PowerShell, organized as a module with many discrete functions, and includes helper scripts and documentation for usage scenarios.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    GraphQLmap

    GraphQLmap

    GraphQLmap is a scripting engine to interact with endpoints

    ...It can connect to a target GraphQL endpoint, dump the schema (if introspection is enabled), query it interactively, and fuzz fields for NoSQL/SQL injection vectors, thereby revealing hidden attack surfaces. GraphQL endpoints represent a relatively newer attack vector compared to REST, and GraphQLmap helps bridge this gap by providing tooling tailored to the GraphQL paradigm. Because many modern applications adopt GraphQL for flexibility, this tool is useful when scanning and attacking API back ends where typical REST-based tools fall short. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    NoSQLi

    NoSQLi

    NoSql Injection CLI tool, for finding vulnerable websites

    NoSQLi is a penetration testing tool designed for detecting and exploiting NoSQL injection vulnerabilities. It allows security researchers and ethical hackers to assess the security of NoSQL databases by identifying injection flaws in applications using MongoDB and similar technologies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • InEight is a leader in construction project controls software Icon
    InEight is a leader in construction project controls software

    InEight serves contractors, owners, and engineers in capital construction

    Minimize risks, gain operational efficiency, control project costs, and make confident, informed decisions. InEight software has your back during every stage of construction, from accurate pre-planning to predictable execution and completion. When project teams collaborate effectively, every decision is backed by precise, authoritative insights.
    Learn More
  • 5
    What is Aurora Phishing Aurora Phishing is an Package with Online Web Services like Facebook, Gmail, Twitter ripped websites used for Phishing Attack. This project was started by Croatian Security Engineer Dalibor Vlaho as a part of another project
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB