Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files" - Page 10

Showing 2108 open source projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

View related business solutions
  • Process Street | Compliance Operations Platform Icon
    Process Street | Compliance Operations Platform

    Systemize execution. Prove compliance.

    Bring compliance and operations under one roof with an AI agent that automates workflows, policies that enforce rules, and a platform that delivers results.
    Learn More
  • Infor M3 ERP Icon
    Infor M3 ERP

    Enterprise manufacturers and distributors requiring a solution to manage and execute complex processes

    Efficiently executing the complex processes of enterprise manufacturers and distributors. Infor M3 is a cloud-based, manufacturing and distribution ERP system that leverages the latest technologies to provide an exceptional user experience and powerful analytics in a multicompany, multicountry, and multisite platform. Infor M3 and related CloudSuite™ industry solutions include industry-leading functionality for the chemical, distribution, equipment, fashion, food and beverage, and industrial manufacturing industries. Staying ahead of the competition means staying agile. Our new capabilities bring improved data-driven insights and streamlined workflows to help you make informed decisions and take quick action.
    Learn More
  • 1
    ModSecurity Nginx Connector

    ModSecurity Nginx Connector

    ModSecurity v3 Nginx Connector

    ModSecurity-nginx is the connector that embeds the ModSecurity v3 (libmodsecurity) web application firewall engine into NGINX. It integrates WAF processing into the NGINX request/response phases, allowing rules to inspect headers, bodies, and even streaming request data before it reaches upstream apps. Operators can load the OWASP Core Rule Set or custom rules to detect and block common attacks such as SQLi, XSS, RCE patterns, and protocol anomalies. The module exposes directives for enabling audit logging, anomaly scoring, request body buffering limits, and performance tuning to fit high-traffic deployments. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    Open Source API Firewall by Wallarm

    Open Source API Firewall by Wallarm

    Fast and light-weight API proxy firewall for request and response

    API Firewall is a high-performance proxy with API request and response validation based on OpenAPI/Swagger schema. It is designed to protect REST API endpoints in cloud-native environments. API Firewall provides API hardening with the use of a positive security model allowing calls that match a predefined API specification for requests and responses, while rejecting everything else.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    Flan Scan

    Flan Scan

    A pretty sweet vulnerability scanner

    Flan Scan is a lightweight open-source network vulnerability scanner designed to make it easy to detect exposed services, open ports, and associated vulnerabilities across IP ranges or network segments as part of security audit and compliance workflows. It is essentially a thin wrapper around the widely-used Nmap scanner, augmenting it with scripts and tooling that transform raw Nmap output into vulnerability-focused reports that map detected services to known CVEs, making results more...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    ObjectivePGP

    ObjectivePGP

    ObjectivePGP is an open-source library for iOS and macOS

    ObjectivePGP is an open-source library for OpenPGP encryption, decryption, signing, and verification in Objective-C and Swift. It enables developers to add PGP-based security to iOS and macOS apps.
    Downloads: 1 This Week
    Last Update:
    See Project
  • SIEM | API Security | Log Management Software Icon
    SIEM | API Security | Log Management Software

    AI-Powered Security and IT Operations Without Compromise.

    Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
    Learn More
  • 5
    Python Outlier Detection

    Python Outlier Detection

    A Python toolbox for scalable outlier detection

    PyOD is a comprehensive and scalable Python toolkit for detecting outlying objects in multivariate data. This exciting yet challenging field is commonly referred as outlier detection or anomaly detection. PyOD includes more than 30 detection algorithms, from classical LOF (SIGMOD 2000) to the latest COPOD (ICDM 2020) and SUOD (MLSys 2021). Since 2017, PyOD [AZNL19] has been successfully used in numerous academic researches and commercial products [AZHC+21, AZNHL19].
    Downloads: 8 This Week
    Last Update:
    See Project
  • 6

    Impacket

    A collection of Python classes for working with network protocols

    ...It features several protocols, including Ethernet, IP, TCP, UDP, ICMP, IGMP, ARP, NMB and SMB1, SMB2 and SMB3 and more. Impacket's object oriented API makes it easy to work with deep hierarchies of protocols. It can construct packets from scratch, as well as parse them from raw data.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    Serverless Appsync Plugin

    Serverless Appsync Plugin

    Serverless plugin for appsync

    Deploy AppSync API's in minutes using this Serverless plugin. This plugin exports some handy variables that you can use in your yml files to reference some values generated by CloudFormation. This plugin adds some useful CLI commands. AppSync is currently using an older version of the Graphql Specs. This plugin intends to use modern schemas for future-proofing. Incompatibilities will either be dropped or attempted to be fixed. Old-style descriptions (using #) are supported by AppSync but will be removed by the stitching procedure which does not support them*. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    Authenticator

    Authenticator

    Authenticator generates 2-Step Verification codes in your browser

    ...Back up your secrets to a file, Google Drive, Microsoft OneDrive, or Dropbox. Sync your secrets with your Google Account. Available for Chrome, Firefox, and Microsoft Edge. Import data from Google Authenticator's official mobile App.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    macOS-Security-and-Privacy-Guide

    macOS-Security-and-Privacy-Guide

    Community guide to securing and improving privacy on macOS

    ...The content includes step-by-step recommendations for configuring macOS features such as FileVault, firewalls, and system integrity protections. It also addresses broader topics such as secure browsing, communication tools, and data backup strategies. The guide is continuously updated to reflect modern security challenges and evolving threats.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Easy-to-use online form builder for every business. Icon
    Easy-to-use online form builder for every business.

    Create online forms and publish them. Get an email for each response. Collect data.

    Easy-to-use online form builder for every business. Create online forms and publish them. Get an email for each response. Collect data. Design professional looking forms with JotForm Online Form Builder. Customize with advanced styling options to match your branding. Speed up and simplify your daily work by automating complex tasks with JotForm’s industry leading features. Securely and easily sell products. Collect subscription fees and donations. Being away from your computer shouldn’t stop you from getting the information you need. No matter where you work, JotForm Mobile Forms lets you collect data offline with powerful forms you can manage from your phone or tablet. Get the full power of JotForm at your fingertips. JotForm PDF Editor automatically turns collected form responses into professional, secure PDF documents that you can share with colleagues and customers. Easily generate custom PDF files online!
    Learn More
  • 10
    reconFTW

    reconFTW

    Automated framework for domain reconnaissance and vulnerability scans.

    reconFTW is an open source automated reconnaissance framework created for security researchers, penetration testers, and bug bounty hunters. The tool streamlines the reconnaissance phase of security assessments by orchestrating numerous specialized tools to gather intelligence about a target domain. It performs multiple discovery and analysis tasks such as subdomain enumeration, OSINT collection, and vulnerability scanning in an automated workflow. The framework integrates many external...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 11
    Scope Sentry

    Scope Sentry

    Cyberspace asset mapping and vulnerability scanning platform

    ...ScopeSentry combines multiple reconnaissance and vulnerability assessment capabilities such as subdomain enumeration, port scanning, directory scanning, and sensitive information detection. ScopeSentry can automatically identify assets and services, extract URLs, and crawl websites to collect useful security data for further analysis. It also includes vulnerability scanning and subdomain takeover detection to help identify common security weaknesses across web infrastructure. It supports distributed scanning with multiple nodes, allowing large scanning tasks to be performed efficiently across different systems.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    Laravel CSP

    Laravel CSP

    Set content security policy headers in a Laravel app

    By default, all scripts on a webpage are allowed to send and fetch data to any site they want. This can be a security problem. Imagine one of your JavaScript dependencies sends all keystrokes, including passwords, to a third party website. It's very easy for someone to hide this malicious behaviour, making it nearly impossible for you to detect it (unless you manually read all the JavaScript code on your site).
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    Spiral Framework

    Spiral Framework

    High-Performance PHP Framework for large scale applications

    Born out of real-world software development projects, Spiral Framework is a modern PHP framework designed to power faster, cleaner, superior software development. Due to its design and sophisticated application server, Spiral Framework will execute your code up to 10 times faster than Laravel or Symfony without compromising code quality or compatibility with commonly-used libraries. Spiral Framework provides all the tools you need to write secure applications with embedded encryption, CSRF...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14
    XRAY

    XRAY

    XRay for recon, mapping and OSINT gathering from public networks

    XRAY is a modular security toolset that helps developers and security professionals analyze, fuzz, and test web applications, protocols, and network services for vulnerabilities. It provides a framework for writing and executing inspection modules that can parse structured data (JSON, XML, HTML), traverse graphs of endpoints, and perform intelligent probing guided by discovered surface area. XRay is typically used as a reconnaissance and vulnerability discovery engine in red-team or app-security workflows: it leverages extensible plugins to adapt to different protocols, inject payloads, and detect common bug classes such as injection flaws, misconfigurations, and unsafe endpoints. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 15
    sqlmap

    sqlmap

    Automatic SQL injection and database takeover tool

    ...It offers full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, and many other database management systems. It also comes with a wide set of switches which include database fingerprinting, over data fetching from the database, accessing the underlying file system, and more.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 16
    garak

    garak

    The LLM vulnerability scanner

    garak checks if an LLM can be made to fail in a way we don't want. garak probes for hallucination, data leakage, prompt injection, misinformation, toxicity generation, jailbreaks, and many other weaknesses. garak's a free tool, we love developing it and are always interested in adding functionality to support applications. garak is a command-line tool, it's developed in Linux and OSX. Just grab it from PyPI and you should be good to go.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 17
    StatiCrypt

    StatiCrypt

    Password protect a static HTML page

    StatiCrypt uses AES-256 and WebCrypto to encrypt your HTML file with your long password and return a static page including a password prompt and the javascript decryption logic that you can safely upload anywhere (see what the page looks like). This means you can password protect the content of your public static HTML file, without any back-end - serving it over Netlify, GitHub pages, etc. You can encrypt a file online in your browser (client side). StatiCrypt uses WebCrypto to generate a...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18
    Username Anarchy

    Username Anarchy

    Username generator for penetration testing and user enumeration

    ...Username Anarchy supports numerous formatting styles, allowing security testers to replicate patterns commonly used in enterprise environments such as first.last, flast, or firstinitiallastname. Username Anarchy can also utilize name sources gathered from OSINT techniques such as social networks or other public data to produce realistic username lists.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    Django OAuth Toolkit

    Django OAuth Toolkit

    OAuth2 goodies for the Djangonauts!

    Django OAuth Toolkit can help you by providing, out of the box, all the endpoints, data, and logic needed to add OAuth2 capabilities to your Django projects. Django OAuth Toolkit makes extensive use of the excellent OAuthLib, so that everything is rfc-compliant. OAuth is an open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    uAssets

    uAssets

    Filter lists for uBlock Origin & uBlock Origin Lite

    uAssets is a companion repository for the uBlock Origin content blocker that contains filter lists, rules, and configuration data used to block advertisements, trackers, and unwanted web content across the internet. It acts as a continuously updated database of filtering rules that define how uBlock Origin interacts with web pages, enabling it to remove intrusive elements and improve user privacy. The repository includes domain-based filters, cosmetic rules, scriptlet injections, and exception handling to ensure both effectiveness and compatibility with websites. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    Open-Source auth provider

    Open-Source auth provider

    Open source alternative to Auth0 / Firebase Auth, etc.

    Add secure login and session management to your apps. SDKs available for popular languages and front-end frameworks e.g. Node.js, Go, Python, React.js, React Native, Vanilla JS, etc. Supertokens architecture is optimized to add secure authentication for your users without compromising on user and developer experience. Frontend SDK: Manages session tokens and renders login UI widgets. Backend SDK: Provides APIs for sign-up, sign-in, signout, session refreshing etc. Your Frontend will talk to...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    ZipUnlocker2025

    ZipUnlocker2025

    Zip Unlocker WinZip/WinRAR Password Unlocker

    This WinZip/WinRAR Password Unlocker is a powerful and efficient tool designed to help users recover lost or forgotten passwords for their password-protected ZIP and RAR files. Whether you're dealing with important compressed files or simply can't access your archive, this password unlocker can assist in restoring your access. With its easy-to-use interface and fast recovery process, the program supports multiple attack methods, such as brute-force and dictionary attacks, to quickly guess and recover the correct password. ...
    Downloads: 31 This Week
    Last Update:
    See Project
  • 23
    DNS Blocklists

    DNS Blocklists

    For a better internet - keep the internet clean

    ...It targets a wide range of online threats and nuisances, including advertisements, trackers, malware, phishing domains, scam websites, and cryptojacking services. The lists are built from multiple data sources and are carefully optimized to minimize false positives while maintaining high effectiveness. They are compatible with a variety of DNS-based filtering tools such as Pi-hole, AdGuard, and DNSMasq, making them easy to integrate into different environments. The project also includes specialized lists for categories like gambling, social media, and adult content, offering additional customization.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    Central Authentication Service (CAS)

    Central Authentication Service (CAS)

    Identity & Single Sign On for all earthlings and beyond

    ...The primary implementation of the protocol is an open-source Java server component by the same name hosted here, with support for a plethora of additional authentication protocols and features. Monitor and track application and system behavior, statistics and metrics in real-time. Manage and review audits and logs centrally, and publish data to a variety of downstream systems. Manage and register client applications and services with specific authentication policies. Cross-platform client support (Java, .NET, PHP, Perl, Apache, etc).
    Downloads: 3 This Week
    Last Update:
    See Project
  • 25
    ezXSS

    ezXSS

    ezXSS is an easy way for penetration testers and bug bounty hunters

    ezXSS is an open-source XSS (Cross-Site Scripting) testing platform designed to help security researchers identify and collect XSS vulnerabilities. It acts as a payload receiver and logger, storing details about triggered XSS attacks such as the user agent, cookies, DOM, and referrer. This tool is highly useful in bug bounty hunting and penetration testing for monitoring and documenting XSS vectors in real-time.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB