Showing 11 open source projects for "cyber"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    SmartGaGa

    SmartGaGa

    Lightweight Android emulator optimized for FPS games on low-end PCs

    ...Powered by Titan Engine and Turbo GPU technology, the software delivers smooth gaming performance even on machines with 2GB RAM and dual-core processors. The emulator supports popular FPS titles including Free Fire, PUBG Mobile, Clash of Clans, and Cyber Hunter, enabling players to enjoy mobile games on larger screens with keyboard and mouse controls. SmartGaGa runs Android Nougat natively and integrates Google Play Store for easy app installation, while also supporting APK sideloading for offline installation. The software features customizable keyboard mapping, allowing users to configure controls for optimal gameplay precision. ...
    Downloads: 748 This Week
    Last Update:
    See Project
  • 2
    GRASSMARLIN

    GRASSMARLIN

    Provides situational awareness of Industrial Control Systems (ICS)

    GRASSMARLIN provides IP network situational awareness of industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks to support network security. Passively map, and visually display, an ICS/SCADA network topology while safely conducting device discovery, accounting, and reporting on these critical cyber-physical systems.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    ODS3 Virtual Machine Challenge

    ODS3 Virtual Machine Challenge

    Virtual Machine Image To Test Penetration Skills

    The ODS3 Virtual Machine Challenge are downloadable images that can be run as VMWare or VirtualBox instances. The Idea behind the challenge is to test and exercise web application penetration testing in a controlled environment. These images are great for cyber security students, penetration testers and hobbyist. Care should be taken if installed on an Internet access host as the application are purposely vulnerable to attack and exploitation.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    Matriux
    Matriux is a GNU/Linux, Debian based security distribution designed for penetration testing and cyber forensic investigations. It is a distribution designed for security enthusiasts and professionals, can also be used normally as your default OS.
    Downloads: 41 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    JBernstein

    JBernstein

    JBernstein: Exploration techniques for non-linear constraint checking

    JBernstein is a tool implemented in Java that enables to check whether a polynomial constraint holds for all variables within their domain. It is mainly used in the verification or synthesis of cyber-physical systems where the system model is nonlinear. The tool also supports specifications in assume-guarantee style. The underlying algorithm is based on a translation to Bernstein polynomials, and several optimization techniques are implemented to ensure efficiency. Concerning performance, the tool enables to check all examples in the PVS Bernstein testsuite within a second, which can be an order of magnitude faster than some other tools such as QEPCAD or REDLOG. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Matriux-VM

    Matriux-VM

    Matriux OS - Virtual Machine

    Matriux is a GNU/Linux, Debian based security distribution designed for penetration testing and cyber forensic investigations. It is a distribution designed for security enthusiasts and professionals, can also be used normally as your default OS. It's Matriux VM, for ISO, please visit https://sourceforge.net/projects/matriux/
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7

    MyZone Social Network

    peer to peer social network

    ...MyZone does not downgrade the resolution of your photos and all established connections are encrypted using state of the art encryption techniques. MyZone is designed to be resilient towards cyber attacks especially DDoS attacks and government imposed censorships. MyZone should be an interesting social networking platform for users who are more concerned with the privacy of their profile information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Cultix

    Cultix

    A fast Debian-based Linux distribution for VampireFreaks community

    Cultix. A distro for freaks'n'geeks, based on the mighty Debian GNU/Linux, with cyber-gothic eye-candy and speed and power in mind. It is built under the aegis of the VampireFreaks OpenSource cult and seems to be the only Linux distribution representing any VF community for now. Cultix comes in the form of LiveDVD hybrid iso image that has an installer. It contains heavily customized Debian Squeeze configs, as well as some manually rebuilt software (Midori, Vala - from official sources) and some components written specially for this distribution (for example, VampireFreaks Sanctuary Radio tray applet, written in Python). ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    Binary Cyber Cannon is an open source network attack tool for Windows written in C++ with the interface written in C#.
    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 10
    Cybera is an Internet cafe administration system. It works with prepaid cards or client accounts or in a post paid Self Service mode. Features include workstation control, user rights lockdown, accounting, stats and screen replication for CAI.
    Downloads: 25 This Week
    Last Update:
    See Project
  • 11

    Cybera.NET

    This is an attempt to port the famous Cybera software to .NET.

    Cyber.NET is an attempt to port the famous Cybera Cyber Cafe software to the Microsoft .NET platform. Cybera is written in Visual Basic 6 and needs to be ported to Visual Basic .NET to get ready for the future. The first step is to port the Cybera client to .NET. In the second step the Cybera server will be ported. There will be no new features in the first two steps. If the ports are stable, feature enhancements can taken into account.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB