37 projects for "cc attack software" with 1 filter applied:

  • E-commerce Fulfillment For Scaling Brands Icon
    E-commerce Fulfillment For Scaling Brands

    Ecommerce and omnichannel brands seeking scalable fulfillment solutions that integrate with popular sales channels

    Flowspace delivers fulfillment excellence by pairing powerful software and on-the-ground logistics know-how. Our platform provides automation, real-time control, and reliability beyond traditional 3PL capabilities—so you can scale smarter, faster, and easier.
    Learn More
  • Atera IT Autopilot Icon
    Atera IT Autopilot

    Ensure operational efficiency at any scale with 24/7 autonomous IT support.

    IT Autopilot takes the pressure off your team by handling first-tier support across the channels your end users already live in — email, chat, Slack, Teams, and your Customer Portal. It doesn’t just respond to end-user queries, issues, and crises — it solves them.
    Learn More
  • 1
    Themis

    Themis

    Easy to use cryptographic framework for data protection

    Cross-platform high-level cryptographic library. Themis helps to build simple and complex cryptographic features easily, quickly, and securely. It’s a perfect fit for multi-platform apps. Themis hides cryptographic details and eliminates popular mistakes. Themis provides ready-made building blocks (“cryptosystems”) for secure data storage, message exchange, socket connections, and authentication. Secure Cell is a multi-mode cryptographic container suitable for storing anything from encrypted...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 2
    Pterodactyl Panel

    Pterodactyl Panel

    Pterodactyl® is a free, open-source game server management panel

    Pterodactyl® is a free, open-source game server management panel built with PHP, React, and Go. Designed with security in mind, Pterodactyl runs all game servers in isolated Docker containers while exposing a beautiful and intuitive UI to end users. Stop settling for less. Make game servers a first-class citizen on your platform. Security is a first-class citizen on this platform with bcrypt hashing, AES-256-CBC encryption, and HTTPS support out of the box. Built on a modern stack utilizing...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 3
    LiteBox

    LiteBox

    A security-focused library OS supporting kernel execution

    LiteBox is a security-focused “library OS” sandboxing project that aims to shrink the interface between an application and its host environment to reduce attack surface. Instead of relying solely on broad OS-level permissions, it focuses on isolating workloads by tightly controlling the boundary where code interacts with host services and system resources. The design emphasizes interoperability across different integration layers, describing a separation between “North” shims (how apps or...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    Atlantis iOS

    Atlantis iOS

    A lightweight and powerful iOS framework for intercepting HTTP/HTTPS

    Don't let cumbersome web debugging tools hold you back. With Proxyman's native macOS app, you can capture, inspect, and manipulate HTTP(s) traffic with ease. Intuitive, thoughtful, and built with meticulous attention to detail. Dive into the network level to diagnose and fix problems with reliable and powerful tools. Proxyman acts as a man-in-the-middle server that captures the traffic between your applications and SSL Web Server. With a built-in macOS setup, so you can inspect your...
    Downloads: 4 This Week
    Last Update:
    See Project
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
    Learn More
  • 5
    FISSURE

    FISSURE

    The RF and reverse engineering framework for everyone

    ...The platform supports workflows related to signal discovery, demodulation, packet inspection, fuzzing, and attack simulation, making it useful for both defensive research and controlled lab testing. Its architecture is oriented toward extensibility, so users can integrate additional hardware, signal-processing components, and protocol-specific modules depending on their needs.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 6
    Coraza

    Coraza

    OWASP Coraza WAF is a golang modsecurity compatible firewall library

    Coraza is an open-source, enterprise-grade, high-performance Web Application Firewall (WAF) ready to protect your beloved applications. It is written in Go, supports ModSecurity SecLang rulesets and is 100% compatible with the OWASP Core Rule Set. Coraza is a drop-in alternative to replace the soon-to-be abandoned Trustwave ModSecurity Engine and supports industry-standard SecLang rule sets. Coraza runs the OWASP Core Rule Set (CRS) to protect your web applications from a wide range of...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    Crosvm

    Crosvm

    The Chrome OS Virtual Machine Monitor

    crosvm (ChromeOS Virtual Machine Monitor) is a secure, lightweight virtual machine monitor built on top of the Linux KVM hypervisor. Developed for ChromeOS, it is designed to isolate and execute Linux and Android guests efficiently while maintaining strong security boundaries. Unlike general-purpose emulators like QEMU, crosvm avoids full hardware emulation and focuses on modern paravirtualized I/O using the virtio standard, reducing complexity and attack surface. Written in Rust, it...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 8
    fosite

    fosite

    Extensible security first OAuth 2.0 and OpenID Connect SDK for Go

    The security first OAuth2 & OpenID Connect framework for Go. Built simple, powerful, and extensible. This library implements peer-reviewed IETF RFC6749, counterfeits weaknesses covered in peer-reviewed IETF RFC6819 and countermeasures various database attack scenarios, keeping your application safe when that hacker penetrates or leaks your database. OpenID Connect is implemented according to OpenID Connect Core 1.0 incorporating errata set 1 and includes all flows: code, implicit, and...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    SSRFmap

    SSRFmap

    Automatic SSRF fuzzer and exploitation tool

    SSRFmap is a specialized security tool designed to automate the detection and exploitation of Server Side Request Forgery (SSRF) vulnerabilities. It takes as input a Burp request file and a user-specified parameter to fuzz, enabling you to fast-track the identification of SSRF attack surfaces. It includes multiple exploitation “modules” for common SSRF-based attacks or pivoting techniques, such as DNS zone transfers, MySQL/Postgres command execution, Docker API info leaks, and network scans....
    Downloads: 0 This Week
    Last Update:
    See Project
  • Resco toolkit for building mobile apps Icon
    Resco toolkit for building mobile apps

    A no-code toolkit for building responsive and resilient mobile business applications for Microsoft Power Platform, Dynamics 365, Dataverse and Salesfo

    Deploying mobile apps with Resco takes days, not months—all without writing a single line of code. Workers can download the Resco app from AppStore, Google Play, or Windows Store, log into your company environment, and instantly use the app you have published on any device.
    Learn More
  • 10
    Wapiti

    Wapiti

    Wapiti is a web-application vulnerability scanner

    Wapiti is a vulnerability scanner for web applications. It currently search vulnerabilities like XSS, SQL and XPath injections, file inclusions, command execution, XXE injections, CRLF injections, Server Side Request Forgery, Open Redirects... It use the Python 3 programming language.
    Leader badge
    Downloads: 126 This Week
    Last Update:
    See Project
  • 11
    Adaptive Intelligence

    Adaptive Intelligence

    Adaptive Intelligence also known as "Artificial General Intelligence"

    Adaptive Intelligence is the implementation of neural science, forensic psychology , behavioral science with machine-learning and artificial intelligence to provide advanced automated software platforms with the ability to adjust and thrive in dynamic environments by combining cognitive flexibility, emotional regulation, resilience, and practical problem-solving skills.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    Penetration Testing Tools

    Penetration Testing Tools

    A collection of more than 170+ tools, scripts, cheatsheets

    Penetration-Testing-Tools is a curated collection of tools, scripts, cheatsheets and reference materials assembled to help security researchers, red-teamers, and students perform hands-on penetration testing across multiple domains. The repository groups resources by discipline — reconnaissance, web application testing, network exploitation, privilege escalation, post-exploitation and reporting — so users can quickly find relevant utilities and walkthroughs. Many entries include short usage...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 13
    GitHub Docs

    GitHub Docs

    The open-source repo for docs.github.com

    The public, open-source repository powering GitHub’s own documentation site, hosting documentation content, guides, governance, and contribution workflows. GitHub's Docs team works on pre-production content in a private repo that regularly syncs with this public repo. Use the table of contents icon Table of contents icon on the top right corner of this document to navigate to a specific section quickly. The GitHub product documentation in the assets, content, and data folders is licensed...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    the-way-to-go_ZH_CN

    the-way-to-go_ZH_CN

    The Chinese translation of "The Way to Go" Guide

    the-way-to-go_ZH_CN is the Chinese translation of the Go programming book The Way to Go, known as (“Go Introduction Guide”). The translator, along with a team of contributors, created this project to make a high-quality Go learning resource accessible to Chinese readers who might struggle with English-language books. The README explains that the original author, Ivo Balbaert, granted authorization for the translation and even for updating certain content to match newer Go versions. The...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    waybackurls

    waybackurls

    Fetch all the URLs that the Wayback Machine knows about for a domain

    waybackurls is a command-line reconnaissance tool that retrieves historical URLs associated with a given domain by querying the Internet Archive’s Wayback Machine. It accepts input domains via standard input and outputs a list of discovered URLs, making it easy to integrate into pipelines and automated workflows. The tool is particularly valuable in security research, bug bounty hunting, and penetration testing, as it uncovers endpoints that may no longer be publicly linked but still exist...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 16
    go-fundamental-programming

    go-fundamental-programming

    Set of video and voice tutorials for the Go language

    go-fundamental-programming is the code and notes repository for the Chinese video course, a foundational Go programming tutorial aimed at beginners. The author positions it explicitly as a way to share the knowledge and pitfalls accumulated while learning Go, so that new learners can avoid common mistakes and weird corner cases. The course is delivered as a series of lectures, and each lecture has a dedicated lectureX.md file that serves as classroom notes, listing the knowledge points...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    WiFi-Pumpkin

    WiFi-Pumpkin

    WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack

    The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. It comes stuffed with features, including rogue Wi-Fi access points, deauth attacks on client APs, a probe request and credentials monitor, transparent proxy, Windows update attack, phishing manager, ARP Poisoning, DNS Spoofing, Pumpkin-Proxy, and image capture on the fly. moreover, the WiFi-Pumpkin is a very complete framework for...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    HaLVM

    HaLVM

    The Haskell Lightweight Virtual Machine (HaLVM)

    HaLVM is a Haskell-based unikernel system that lets you write entire virtual machines in Haskell and run them directly on a hypervisor, traditionally Xen. Instead of deploying a full operating system, you compile a Haskell program into a tiny image that boots as its own VM, which reduces the attack surface and startup time. The project adapts GHC and the Haskell runtime to a minimal environment, providing the I/O, networking, and memory facilities necessary for standalone services. Its...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    go-best-practice

    go-best-practice

    Trying to complete over 100 projects in various categories in golang

    go-best-practice is essentially a Go book and code collection called “Go 实战开发” (“Go in Practice”), born from the idea of building over 100 practical projects in different categories using Go. It combines an ebook/zh directory with written chapters and a src directory that holds the corresponding source code, so readers can move seamlessly between theory and practice. The goal is to help developers go beyond basic syntax and actually build real applications, drawing inspiration from similar...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Metasploit Framework

    Metasploit Framework

    Metasploit Framework

    Metasploit Framework is a comprehensive penetration-testing and exploit development platform that streamlines the process of discovering, validating, and demonstrating vulnerabilities. It provides a modular architecture—payloads, encoders, exploits, auxiliaries, and post-exploitation modules—so security professionals can piece together complex attack chains or test defensive controls in realistic ways. Built-in features include an exploit database, network scanners, credential harvesters,...
    Downloads: 44 This Week
    Last Update:
    See Project
  • 21
    go-rock-libraries-showcases

    go-rock-libraries-showcases

    Comprehensive tutorial that integrates blogs, examples, audio, video

    go-rock-libraries-showcases hosts the materials for Go, an advanced tutorial series focused on well-known Go third-party libraries. It is designed for learners who have already finished Go, and want to deepen their skills by exploring real-world libraries that are popular and highly regarded in the Go ecosystem. The course uses a “three-in-one” approach: blog posts, code examples, and audio/video lectures are combined to explain each library in practical context. The README explains that the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    JS/CC LALR(1) Parser Generator

    JS/CC LALR(1) Parser Generator

    A LALR(1) Parser Generator for JavaScript written in JavaScript

    JS/CC is a parser generator for JavaScript/ECMAScript, which is entirely written in ECMAScript itself. It produces LALR(1) parsers with integrated lexical analyzers. JS/CC can run as a website or be invoked from a console, and runs on several platforms.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    Java-based Open Source WAF (Web Application Firewall) to include inside a web application in order to protect it against attacks like Cross-Site Request Forgery (CSRF), Parameter Manipulation and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    PyLoris

    A protocol agnostic application layer denial of service attack.

    PyLoris is a scriptable tool for testing a server's vulnerability to connection exhaustion denial of service (DoS) attacks. PyLoris can utilize SOCKS proxies and SSL connections, and can target protocols such as HTTP, FTP, SMTP, IMAP, and Telnet.
    Leader badge
    Downloads: 24 This Week
    Last Update:
    See Project
  • 25
    Decision Table Preprocessor

    Decision Table Preprocessor

    Ccide is a Decision Table preprocessor.

    Ccide reads a source program, in one of several programming languages, expands all embedded decision tables, and generates the new, expanded source. Ccidew processes C language programs directly. The script, ccide, uses ccidew and m4, to process BASIC, JAVA, CC, C++, BASH, QB, VB, and EX(euphoria), source files containing embedded decision tables. Ccide checks all conditions once and only once, avoiding side effects. Ccide checks tables for conflicts and other...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB