Showing 27 open source projects for "breach"

View related business solutions
  • Add Two Lines of Code. Get Full APM. Icon
    Add Two Lines of Code. Get Full APM.

    AppSignal installs in minutes and auto-configures dashboards, alerts, and error tracking.

    Works out of the box for Rails, Django, Express, Phoenix, and more. Monitoring exceptions and performance in no time.
    Start Free
  • Create engaging surveys on your tablet or computer with ease. Icon
    Create engaging surveys on your tablet or computer with ease.

    Choose any of our carefully designed themes, or easily customize colors, fonts, and more to reflect your brand's true look and feel.

    Create great-looking surveys, forms, polls, voting, questionnaires, NPS, customer satisfaction, customer experience, employee satisfaction surveys... on your computer or tablet, customize the look of your survey however you like, & display collected data with eye-catching and insightful graphics.
    Learn More
  • 1
    pwnedOrNot

    pwnedOrNot

    Check breached emails and find exposed passwords from public dumps

    pwnedOrNot is an open source OSINT tool designed to investigate whether an email address has been compromised in known data breaches and to identify exposed credentials associated with that account. The tool works by interacting with the HaveIBeenPwned (HIBP) API to determine if a given email address appears in breach databases. If the email is found in a breach, the tool proceeds to search for associated passwords within publicly available data dumps. This two-phase approach allows investigators, security professionals, and researchers to assess the exposure level of compromised accounts using publicly accessible breach information. The tool displays useful breach details such as the name of the breach, the affected domain, the breach date, and several status indicators related to the authenticity and status of the breach. pwnedOrNot can also analyze domains to determine whether they have been involved in breaches and can list all breached domains available through the HIBP database.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    WhatBreach

    WhatBreach

    OSINT tool for discovering email addresses in known data breaches

    ...It also supports deeper investigation of email domains and related profiles, making it useful for researchers, security analysts, and penetration testers conducting reconnaissance or breach analysis.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    GoSearch

    GoSearch

    OSINT tool to find usernames and digital footprints across 300+ sites

    ...The tool reduces false positives and false negatives by clearly marking uncertain matches, allowing users to quickly identify reliable results. In addition to username searches, GoSearch can check various breach intelligence databases for compromised credentials linked to a username. If password hashes are found in breach data, the tool can attempt to crack them using the Weakpass database.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 4
    Cr3dOv3r

    Cr3dOv3r

    Know the dangers of credential reuse attacks

    ...It is primarily intended for educational and ethical security testing purposes, helping security professionals understand how attackers might exploit reused passwords. The system integrates with external APIs and services to gather breach data and perform automated checks efficiently. It supports multiple modes of operation, including leak-only analysis and credential testing workflows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Top Corporate LMS for Training | Best Learning Management Software Icon
    Top Corporate LMS for Training | Best Learning Management Software

    Deliver and Track Online Training and Stay Compliant - with Axis LMS!

    Axis LMS enables you to deliver online and virtual learning and training through a scalable, easy-to-use LMS that is designed to enhance your training, automate your workflows, engage your learners and keep you compliant.
    Learn More
  • 5
    ClatScope

    ClatScope

    OSINT reconnaissance tool for IP, domain, email, and username lookups

    ...It operates through a menu-driven command line interface that allows users to choose from many reconnaissance functions and receive formatted results directly in the terminal. ClatScope supports dozens of OSINT operations, including domain analysis, breach checks, and account discovery.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 6
    Mtk Easy Su

    Mtk Easy Su

    Get bootless root access with few clicks.

    This app set up bootless super user access, with Magisk and Mtk-su, on MediaTek Android devices. To facilitate those wishing to use the security breach Mtk-su by Diplomatic. If you are a more advanced user. I recommend using the mtk-su tool from the terminal, you will have more possibilities and control over the process.
    Downloads: 28 This Week
    Last Update:
    See Project
  • 7
    truffleHog

    truffleHog

    Searches through git repositories for high entropy strings and secrets

    truffleHog searches through git repositories for high entropy strings and secrets, digging deep into commit history. TruffleHog runs behind the scenes to scan your environment for secrets like private keys and credentials, so you can protect your data before a breach occurs. Secrets can be found anywhere, so TruffleHog scans more than just code repositories, including SaaS and internally hosted software. With support for custom integrations and new integrations added all the time, you can secure your secrets across your entire environment. TruffleHog is developed by a team entirely comprised of career security experts. ...
    Downloads: 54 This Week
    Last Update:
    See Project
  • 8
    Wasabi Wallet

    Wasabi Wallet

    Open-source, non-custodial, privacy focused Bitcoin wallet for Windows

    Wasabi is an open-source, non-custodial, privacy-focused Bitcoin wallet for desktop, that implements trustless coinjoin. Wasabi creates trustless coinjoin transactions over the Tor anonymity network. The coinjoin coordinator cannot steal from, nor breach the privacy of the participants. Coinjoin is a mechanism by which multiple participants combine their coins (or UTXOs, to be more precise) into one large transaction with multiple inputs and multiple outputs. An observer cannot determine which output belongs to which input, and neither can the participants themselves. This makes it difficult for outside parties to trace where a particular coin originated from and where it was sent to (as opposed to regular bitcoin transactions, where there is usually one sender and one receiver). ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 9
    Neon Wallet

    Neon Wallet

    Self-custodial wallet for managing digital assets

    Neon Wallet is a self-custodial wallet for managing digital assets on desktop and mobile, supporting Neo, Ethereum, and EVM networks, with full user control. Available as a desktop wallet on Windows, Mac OS X, and Linux, the NEON wallet allows users to claim GAS on the NEO network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of Google's scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • 10
    SocialPwned

    SocialPwned

    OSINT tool to collect emails from social networks and find leaks

    ...It collects email addresses associated with individuals or organizations from platforms such as Instagram, LinkedIn, and Twitter. Once emails are discovered, SocialPwned searches for leaked credentials using breach databases like PwnDB and Dehashed to determine whether those accounts have appeared in data leaks. SocialPwned also integrates with GHunt to retrieve additional public information related to Google accounts linked to the discovered emails. By combining social media intelligence with breach data analysis, SocialPwned helps investigators identify reused passwords and patterns that may indicate potential security weaknesses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    h8mail

    h8mail

    Email OSINT tool for finding breached credentials by email

    h8mail is an open source email OSINT and password breach hunting tool designed to help security professionals investigate compromised credentials associated with email addresses. It works by querying multiple breach and reconnaissance services to identify whether an email address has appeared in publicly leaked datasets. The tool can also search locally stored breach dumps, such as Troy Hunt’s “Collection1” or the widely known “Breach Compilation,” allowing investigators to analyze large credential datasets offline. h8mail aggregates information from these sources and organizes the results to help analysts quickly understand where and how an email address has been exposed. ...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 12
    LAppS

    LAppS

    Lua Application Server for micro-services with default communication

    This is an attempt to provide very easy-to-use Lua Application Server working over WebSockets protocol (RFC 6455). LAppS is an application server for micro-services architecture. It is build to be highly scalable vertically. The docker cloud infrastructure (kubernetes or swarm) shall be used for horizontal scaling. LAppS has most scallable WebSockets server out there. LAppS is the same thing to WebSockets as the Apache or Nginx are to HTTP. LAppS does not supports HTTP (though it supports...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    chandrasekar Rathinam

    SIEM | SOAR | Incident Response | Digital Foensics

    Sharing my document like SIEM | SOAR Use Cases, Incident Response Templates, Breach Runbook, Digital Forensics Tools, Penetration testing sample reports and Infosec Policies templates to help infosec community to build the SOC | MSSP's .
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14

    SCP : Containment Breach - Mod FR

    Ne pas cligner des yeux, ou il vous trouvera.

    SCP Containment Breach : Mod FR est une modification du jeu SCP : Containment Breach créé par Joonas Rikkonen (Undertow Games). Il apporte une traduction française du jeu, ainsi que quelques ajouts mineurs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    ...This includes Russian, Japanese, Chinese, Thai and so on. The individual language files that are used are to be created/shared by the users. Please do not rip lists of words from language courses so as to not breach copyright - I do not know if this would happen (as you can't copyright a language, just the method of learning it I'm guessing) but it's best to be safe, right?
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    bWAPP

    an extremely buggy web app !

    bWAPP, or a buggy web application, is a free and open source deliberately insecure web application. bWAPP helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities. bWAPP prepares one to conduct successful penetration testing and ethical hacking projects. What makes bWAPP so unique? Well, it has over 100 web bugs! It covers all major known web vulnerabilities, including all risks from the OWASP Top 10 project. The focus is not just on one specific...
    Leader badge
    Downloads: 1,621 This Week
    Last Update:
    See Project
  • 17
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    SCP: Containment Breach Multiplayer mod.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Flashlight is a First-Person Survival Horror freeware game inspired by Amnesia, Penumbra, SCP: Containment Breach... but mainly Slender. You control Edward Thomas, a police officer who went off on his own, unprotected, to find his missing girlfriend. After receiving a letter in his mailbox, Edward went off to where the kidnapper was hiding... deep in a large, restricted forest near his home. What Edward discovers shortly is that the forest that he's going to was restricted for a very dark reason... ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Encryptron

    Encryptron

    An encryption software using C# 4.0

    First of all, let us understand the need for an encryption software. Just think of you sending a message of extreme confidentiality, someone else fetches it and goes through it. A breach in the security! We can’t allow that to happen. So, virtually every data send over a network is encrypted now-a-days. Let’s look at this now: Vdmbnld!`f`ho !Sdutsohof!whrhunsr!`oe!bnedsr-!une`x!H&l!fnhof!un!rinv!xnt!`o!houdsdruhof!unqhb!ui`u!hr-!inv!un!qsdq`sd!`o!dobsxquhno!rnguv`sd!trhof!B”!5/1!`oe!Vhoenvr!Gnslr/ Qsdsdpthrhudr!...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Tracks that a driver hands in their tachograph for each day. Possible extension - notify the driver if they have not handed in their tachograph for the past X days - this warns the driver to hand it in before it becomes a breach of legislation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Time Breach is a Massively Multiplayer Online Role Playing Game. In this univers, all gamer can create his world. Each world must be managed like an economic game. In fact two types of games are linked on one univers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    This project should fill the breach between PHProject and other more or less functional php-calender projects. It is my ambition to greate a small, simple and usefull calendar for daily use without reading a handbook.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Project moved to http://www.darkarts.co.za
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    ...It does incremental diffs between files. The main difference from rsync is that rfix doesn't require a shell access and it's portable to monouser OSs without introducing a potential security breach.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB