Showing 28 open source projects for "hijacking"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    SSH-MITM

    SSH-MITM

    Server for security audits supporting public key authentication

    ssh man-in-the-middle (ssh-mitm) server for security audits supporting publickey authentication, session hijacking and file manipulation. SSH-MITM is a man in the middle SSH Server for security audits and malware analysis. Password and publickey authentication are supported and SSH-MITM is able to detect, if a user is able to login with publickey authentication on the remote server. This allows SSH-MITM to accept the same key as the destination server.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Genv

    Genv

    GPU environment management and cluster orchestration

    Genv is an open-source environment and cluster management system for GPUs. Genv lets you easily control, configure, monitor and enforce the GPU resources that you are using in a GPU machine or cluster. It is intended to ease up the process of GPU allocation for data scientists without code changes.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Portable OpenSSH

    Portable OpenSSH

    Complete implementation of the SSH protocol

    ...The software suite enables administrators and developers to securely log into remote systems, transfer files, and create encrypted tunnels for network traffic. By encrypting all communications between client and server, it protects against threats such as eavesdropping, connection hijacking, and data interception. The portable distribution follows the development of the main OpenSSH codebase while adding compatibility layers for multiple operating systems and authentication systems.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    ASN

    ASN

    Command line ASN lookup, network recon, and traceroute tool

    asn is a multifunctional network investigation and OSINT command line tool designed for analyzing Autonomous System (ASN) and IP-related data. It provides a comprehensive set of capabilities for inspecting network infrastructure, routing information, and security signals associated with IP addresses, hostnames, prefixes, and organizations. It aggregates data from multiple external services to present detailed information such as BGP statistics, RPKI validation status, IP reputation,...
    Downloads: 10 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    Driver.js

    Driver.js

    A lightweight, dependency-free JavaScript library

    ...The API lets you define steps, order, and behavior, while handling positioning, scrolling, and viewport collisions gracefully. It strives to be unobtrusive: tours can be triggered contextually, resumed, or dismissed without hijacking the app. Accessibility and keyboard interaction are considered so tours remain usable beyond simple mouse clicks. Because it has no hard dependency on a specific framework, it integrates into vanilla JS apps or modern stacks alike.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Piral

    Piral

    Framework for next generation web apps using micro frontends

    ...It allows you to build web apps that follow the micro frontends architecture in basically no time. Piral lets you use your standard tooling to be as efficient as possible. Perfect for distributed systems running in the cloud. No proprietary software hijacking the security of your app. Every feature plays well with custom and standard tooling. The base layer gives you high convenience without sacrificing. Performance is considered important and valued as a feature. You can build fully dynamic and scalable applications in no time. Like what you see and want to take it to the next level? ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Adaptive Intelligence

    Adaptive Intelligence

    Adaptive Intelligence also known as "Artificial General Intelligence"

    Adaptive Intelligence is the implementation of neural science, forensic psychology , behavioral science with machine-learning and artificial intelligence to provide advanced automated software platforms with the ability to adjust and thrive in dynamic environments by combining cognitive flexibility, emotional regulation, resilience, and practical problem-solving skills.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    miniPHP

    miniPHP

    A small, simple PHP MVC framework skeleton that encapsulates a lot of

    miniPHP A small, simple PHP MVC framework skeleton that encapsulates a lot of features surrounded with powerful security layers. miniPHP is a very simple application, useful for small projects, helps to understand the PHP MVC skeleton, know how to authenticate and authorize, encrypt data and apply security concepts, sanitization and validation, make Ajax calls and more. It's not a full framework, nor a very basic one but it's not complicated. You can easily install, understand, and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    DNSChain

    DNSChain

    A blockchain-based DNS + HTTP server that fixes HTTPS security

    DNSChain by okTurtles is an experimental protocol and implementation combining DNS and PKI on blockchain for secure, censorship-resistant name resolution and certificate issuance. It aims to prevent MITM attacks and domain seizures by anchoring DNS records in blockchains, integrating DPKI, RESTful APIs, and interoperability with Namecoin and Onename.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Application Monitoring That Won't Slow Your App Down Icon
    Application Monitoring That Won't Slow Your App Down

    AppSignal's Rust-based agent is lightweight and stable. Already running in thousands of production apps.

    Full APM with errors, performance, logs, and uptime monitoring. 99.999% uptime SLA on the platform itself.
    Start Free
  • 10

    Dark Arch

    This project is no longer hosted on Sourceforge.

    This project is no longer hosted on Sourceforge to avoid project hijacking by the staff. You can find the code in the official repository at https://github.com/lee8oi/darkarch
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Despite extensive efforts to secure the interdomain routing system, it might take many years to protect the Internet from devastating attacks such as IP-prefix hijacking, whereas security against more sophisticated attacks on BGP is even further afar. We present a new paradigm for securing interdomain routing that bypasses the obstacles facing today's agenda. Unlike the hierarchical RPKI approach to certifying IP prefixes, our design is flat, decentralized, fully-automated, and avoids dependency on a single root-of-trust. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    ...By invincible, I mean to browser hijacking, but not to internet settings changes, as those apply to any web browser on the system. Note: I am currently working on v3, however since it's being rewritten in C# and receiving some major changes, it may be a while before it's out.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Hijack linux system calls rootkit

    Hijack linux system calls

    Hijack the linux system calls, for example when the open system call is called, the new hijacked system call is called instead of the original one. Please see: http://se7so.blogspot.com/2012/07/hijacking-linux-system-calls-rootkit.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    etherwall
    Etherwall is a free and open source network security tool that prevents Man in The Middle (MITM) through ARP Spoofing/Poisoning attacks. It Also prevent it from various attacks such as Sniffing, Hijacking, Netcut, DHCP Spoofing, DNS Spoofing, WEB Spoofing, and others. Note: For personal computer use only (client security) if you like this program, please give us your vote at http://sourceforge.net/projects/etherwall/reviews/
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    ...It is intended to get use out of obsolete old hardware, for use in embedded systems, and as an educational tool. ELKS has been moved to Github to protest SourceForge's installer adware hijacking. This does not directly affect ELKS, but it does affect many major open source projects such as Gimp and FileZilla by attempting to trick the user into installing adware in order to download these programs. I refuse to leave ELKS here with such policies in effect. If you have questions about this, please email jody@c02ware.com.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 16
    CookieMonster that demonstrates HTTP session hijacking attacks. It sniff your network interface and hijack all cookie. The hijacked cookies can be edit and/or injected in your Firefox. It include a arp poisoning tool.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    Hijakker is the Ubuntu Linux based distro that enables someone to boot up a Windows environment on any PC, hijacking it! It can be used for browsing without leaving a trace, portable apps and troubleshooting.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    jacknsee
    Jacknsee is an educational network security tool. Its purpose is to teach students in computer science how basic hijacking techniques are used to corrupt a network. Two scenarios have been implemented: Man in the Middle and Denial of Service.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Proxy server that performs proof of concept session hijacking by receiving cookies from one or more NomNom Agents. It then offers the user an option to switch to any intercepted session. More features and site specific options later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    sxPHP - Smart extended PHP is a (RAF) Rapid Development Framework for >= PHP 5.2.2.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Hyenae
    Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant. *** Hyenae is back *** Hyenae will be continued here: https://sourceforge.net/p/hyenae-ng
    Leader badge
    Downloads: 65 This Week
    Last Update:
    See Project
  • 22
    "Video Jacking: Hijacking VoIP Video calls!"
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    An open source driving game focusing on large outdoor environments and semi realistic physics, upgradable cars that change in handling and speed, creating a slight RPG element. Hijacking cars is easy and encouraged, but not by the law enforcement.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    TypoHulk is a powerful typosquatter written in Python that generates a list of most common mistakes made by Internet users when entering website address and finds which domains are online. (known as Typosquatting or URL hijacking)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A Java Hijacking tool for web application session security assessment. A simple Java Fuzzer that can mainly be used for numeric session hijacking and parameter enumeration. Demonstration video is also available.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB