Showing 29 open source projects for "otp intercept tool"

View related business solutions
  • Get full visibility and control over your tasks and projects with Wrike. Icon
    Get full visibility and control over your tasks and projects with Wrike.

    A cloud-based collaboration, work management, and project management software

    Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
    Learn More
  • Software for managing apps and accounts | WebCatalog Icon
    Software for managing apps and accounts | WebCatalog

    Tired of juggling countless browser tabs? WebCatalog Desktop turns your favorite web apps into dedicated desktop apps

    Turn websites into desktop apps with WebCatalog Desktop—your all-in-one tool to manage apps and accounts. Switch between multiple accounts, organize apps by workflow, and access a curated catalog of desktop apps for Mac and Windows.
    Learn More
  • 1
    INTERCEPT

    INTERCEPT

    Unites the best signal intelligence tools

    iNTERCEPT is a web-based interface that brings multiple software-defined radio and signal-intelligence style tools under one consistent dashboard, making complex workflows more approachable. Rather than requiring you to learn a different UI and setup process for each underlying utility, it provides a single place to start modes, view results, and monitor activity from a browser.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 2
    mitmproxy

    mitmproxy

    A free and open source interactive HTTPS proxy

    mitmproxy is an open source, interactive SSL/TLS-capable intercepting HTTP proxy, with a console interface fit for HTTP/1, HTTP/2, and WebSockets. It's the ideal tool for penetration testers and software developers, able to debug, test, and make privacy measurements. It can intercept, inspect, modify and replay web traffic, and can even prettify and decode a variety of message types. Its web-based interface mitmweb gives you a similar experience as Chrome's DevTools, with the addition of features like request interception and replay. ...
    Downloads: 20 This Week
    Last Update:
    See Project
  • 3
    ProxyPin

    ProxyPin

    Open source free capture HTTP(S) traffic software ProxyPin

    ProxyPin is a full-featured, cross-platform HTTP(S) traffic capture and proxy tool. Developed in Flutter, it enables interception, inspection, rewriting, and blocking of network traffic across devices via scans and QR-based connection. It supports scripting, filtering, statistics, and integrates HTTP/2, zstd, WebSocket parsing, and AES tools.
    Downloads: 60 This Week
    Last Update:
    See Project
  • 4
    ZAP

    ZAP

    The OWASP ZAP core project

    ...ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. It stands between the tester’s browser and the web application so that it can intercept and inspect messages sent between browser and web application.
    Downloads: 138 This Week
    Last Update:
    See Project
  • IT Asset Management (ITAM) Software Icon
    IT Asset Management (ITAM) Software

    Supercharge Your IT Assets, the Easy Way

    Drowning in misplaced IT assets, compliance headaches, and shadow IT? Navigate to clarity with an intuitive IT Asset Management solution. Experience crisp visibility, effortless control, and unshakable security – all while freeing up your budget with optimized software licenses. The best part? It’s easy.
    Learn More
  • 5
    dnstwist

    dnstwist

    Detects phishing and lookalike domains using DNS fuzzing techniques

    dnstwist is an open source cybersecurity tool designed to identify malicious or suspicious domain names that imitate legitimate websites. It works by generating a large set of domain name permutations based on a target domain and analyzing whether any of those variants are actively registered or used. These permutations simulate common techniques used in phishing attacks, typosquatting, and brand impersonation campaigns. Security teams can use the tool to discover potential threats where...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Dialyxir

    Dialyxir

    Mix tasks to simplify use of Dialyzer in Elixir projects

    Mix tasks to simplify use of Dialyzer in Elixir projects. Elixir 1.6 is required, to support the new pretty printing feature. If your project is not yet on 1.6, continue to specify 0.5 in your mix deps. Warning messages have been greatly improved, but are filtered through the legacy formatter to support your existing ignore files. You can optionally use the new Elixir term format for ignore files. You may want to use the --format short argument in your CI pipelines. There are several...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 7
    PocketMocker

    PocketMocker

    In-page HTTP controller for frontend development

    PocketMocker is an in-page HTTP controller and mocking tool for frontend developers that lets you intercept, modify, or simulate API responses directly in a web application without requiring backend changes or separate mock servers. Running inside the browser, it provides a floating control panel that automatically captures outgoing requests and allows developers to override responses, simulate errors or latency, or test edge cases on the fly.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    GraphQL Inspector

    GraphQL Inspector

    Validate schema, get schema change notifications, validate operations

    Validate schemas and detect changes. Receive schema change notifications. Keep Operations and Fragments consistent. Start using our GitHub Application, setup everything up within few clicks. Using GitHub workflows? Try out the GitHub Action. GraphQL Inspector can be used in any Continuous Integration service. Use our modularized, CI suited version of CLI. GraphQL Inspector offers a CLI that lets you analyze your GraphQL API but also client-side applications. Our codebase is publicly...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    CF-Workers-docker.io

    CF-Workers-docker.io

    Docker Warehouse Image Proxy Tool

    CF-Workers-docker.io is a project by cmliu that sets up a proxy for Docker Hub (and potentially other container image registries) using Cloudflare Workers, effectively acting as a middle-man mirror to improve image pull reliability and speed in regions where direct access is degraded. The idea is to intercept registry requests, reroute or mirror them through a worker endpoint, and therefore bypass regional limitations or firewall blocks affecting official Docker registries. Users can deploy...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Quality Management Software Icon
    Quality Management Software

    Ideal for small to medium-sized businesses. Pay for all the modules or only the ones you need.

    isoTracker Quality Management is a popular cloud-based quality management software (QMS) that is used by small to medium sized businesses on a worldwide basis. It helps to manage ISO 9001, ISO 13485, ISO 22000, ISO 17025, ISO 14001 systems...plus many similar other systems. It also conforms to the requirements of 21 CFR Part 11.
    Learn More
  • 10
    Infer

    Infer

    A static analyzer for Java, C, C++, and Objective-C

    Infer is a static analysis tool - if you give Infer some Java or C/C++/Objective-C code it produces a list of potential bugs. Anyone can use Infer to intercept critical bugs before they have shipped to users, and help prevent crashes or poor performance. Infer checks for null pointer exceptions, resource leaks, annotation reachability, missing lock guards, and concurrency race conditions in Android and Java code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    BlockHook

    BlockHook

    Hook Objective-C blocks. A powerful AOP tool

    BlockHook is an Objective-C library that enables hooking into the execution of blocks (closures). It allows developers to intercept, modify, and monitor block invocations for debugging, analytics, or altering app behavior.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 12
    A command-line interface tool for API mocking and proxying using Apimimic. Apimimic is a powerful API mocking platform that allows you to create, manage, and simulate API endpoints with ease. This CLI tool integrates with the Apimimic service to provide local API mocking and proxying capabilities. What is Apimimic? Apimimic is a comprehensive API mocking solution that offers: 🚀 Fast and intuitive API mocking through a user-friendly interface 🔀 Proxy mode to selectively mock endpoints while forwarding others to your real API 🤖 AI-powered response generation ⚡ Automatic CRUD operation generation 📚 OpenAPI specification support The CLI tool extends these capabilities to your local development environment, allowing you to: Intercept HTTP requests and return mocked JSON responses from your Apimimic project Forward unmocked requests to your actual backend when using proxy mode Seamlessly integrate with your development workflow Configure listening address and remote API
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    cordum

    cordum

    Enterprise AI Agent Orchestration & Governance Platform.

    ...At its core lies the Cordum Agent Protocol (CAP) a high-performance, open standard (NATS/Redis) that decouples agent logic from control. This architecture ensures "Zero-Copy" security (keeping PII off the wire) and provides a centralized Safety Kernel to intercept hallucinations and unauthorized actions before execution. Key Features: Protocol-First: Language-agnostic orchestration (Python, Go, Node, Rust). Safety Kernel: Deterministic guardrails enforced at the infrastructure level. Human-in-the-Loop: Native approval workflows for critical agent actions. Observability: Real-time tracing of agent thoughts, decisions, and tool usage. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 14

    OTP-Crypto-Tool

    Symetric file encryption based on OTP implemented as XOR encryption

    OTP (One Time Pad) In case you have any questions, contact me at: crypto-munition@gmx.de When used correctly, the OTP is an information-theoretically secure and demonstrably non-breakable encryption. The encryption process is implemented as symmetrical file encryption based on XOR encryption. The integrated pseudo-random generator serves only to illustrate and check the functionality. The use of this generator for REAL OTPs is not recommended. For REAL OTPs, hardware-based key generators...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    OTP-Chat

    OTP-Chat (client / server) YOUR PC is both client and server!

    ...When used correctly, the OTP is an information-theoretically secure and demonstrably non-breakable encryption. By using an OTP-based key on both, the sender and recipient side, eavesdropping on chat communication, in terms of information theory, is impossible to poop. Correct use of the OTP is important. Details can be found in my project OPT-Crypto-Tool under Sourceforge.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Simple DNSCrypt

    Simple DNSCrypt

    A simple management tool for dnscrypt-proxy

    SimpleDnsCrypt is a user-friendly graphical interface for dnscrypt-proxy, designed to make encrypted DNS resolution simple and accessible for Windows users who want to improve their privacy and security without delving into complex command-line tools. It provides an intuitive control panel where individuals can enable DNS encryption (such as DNS-over-HTTPS or DNS-over-TLS), select trusted resolvers, and configure advanced options like upstream resolver lists, fallback settings, and filtering...
    Downloads: 76 This Week
    Last Update:
    See Project
  • 17
    retrap

    retrap

    Open-Source intelligence tracking and analysis tool.

    (OSINT) Open-Source intelligence tracking and analysis tool. - Disclaimer: This tool is experimental in its Alpha phase. It's developed and published as a small building block of a master's thesis research. So use it for educational purposes only and at your own discretion, the author cannot be held responsible for any damages caused.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    SSH MITM

    SSH MITM

    SSH man-in-the-middle tool

    This penetration testing tool allows an auditor to intercept SSH connections. A patch applied to the OpenSSH v7.5p1 source code causes it to act as a proxy between the victim and their intended SSH server; all plaintext passwords and sessions are logged to disk. Of course, the victim's SSH client will complain that the server's key has changed. But because 99.99999% of the time this is caused by a legitimate action (OS re-install, configuration change, etc), many/most users will disregard the warning and continue on. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Distillery

    Distillery

    Simplify deployments in Elixir with OTP releases

    ...By managing environment-specific settings, it simplifies deploying the same app to different systems without manual reconfiguration. Distillery has historically been a key tool for production Elixir deployments before Elixir added built-in release functionality, and it remains valuable for teams seeking flexibility in their deployment workflows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    James

    James

    Web Debugging Proxy Application

    James is an HTTP Proxy and Monitor that enables developers to view and intercept requests made from the browser. It is an open-source alternative to the popular developer tool Charles. James is built with hoxy, electron and react. Use wildcards in the "url to map" field, put a "*" between two adjacent slashes. The electron instance will automatically reload whenever a change is made. Download the correct version for your OS.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    TCPCopy

    TCPCopy

    An online request replication tool, also a tcp stream replay tool

    ...Moreover, the reproduced workload is similar to the production workload in request diversity, network latency and resource occupation. TCPCopy consists of two parts, TCPCopy and intercept. While TCPCopyruns on the online server and captures the online requests, intercept runs on the assistant server and does some assistant work, such as passing response info to TCPCopy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    SSL Logger

    SSL Logger

    Decrypts and logs a process's SSL traffic

    ssl_logger is a Python-based tool that decrypts and logs a target process’s SSL/TLS traffic on Linux and macOS. It attaches to a running process by name or PID and hooks SSL_read and SSL_write calls to capture plaintext data flowing through encrypted connections. Output can be streamed to the console with verbose metadata or written to a PCAP file for later analysis in standard tooling.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    GLIntercept

    GLIntercept

    GLIntercept is a OpenGL function call interceptor for Windows

    GLIntercept is a powerful OpenGL debugging and tracing tool for Windows that allows developers to intercept and log OpenGL function calls made by applications. It captures real-time graphics API activity, shader sources, textures, and framebuffers, making it invaluable for performance tuning, reverse engineering, and debugging complex rendering problems. GLIntercept can inject itself into any OpenGL application and provide deep inspection capabilities, helping developers visualize pipeline behavior and diagnose rendering issues with minimal intrusion.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Mega-Panzer

    Mega-Panzer

    Mega-Panzer tool source code

    The source code of the Mega-Panzer. This variant of Megapanzer in its ealiest days branched in 2006. First Megapanzers purpose was to connect back to its client through all kinds of firewalls and proxy servers and offering an attacker a simple command shell. The feature eavesdropping Skype conversations was added a little later and after proving its feasibility it became the new main focus. It injects function calls into the Skype process to intercept all audio data coming...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    privacyidea

    privacyidea

    two factor authentication management system

    privacyIDEA is a management and authentication system for two factor authentication. You can use OTP tokens, OTP cards, SMS, Smartphone Apps to incorparte the second factor. It can even manage SSH keys and supports Offline OTP. The latest version can manage and enroll user certificates. Its modular design makes it easily enhancable. It runs on Linux. Applications and workflows can be connected to privacyIDEA hence enabling two factor authentication in your system logon, web...
    Downloads: 6 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB