30 projects for "abuse" with 1 filter applied:

  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    TikTok-ViewBot

    TikTok-ViewBot

    ViewBot using requests updated 2025

    ...Because it touches on automation against a third-party service, responsible use and adherence to platform terms are emphasized; using such tools to manipulate metrics or violate policies is unethical and can be unlawful. From a security research perspective, understanding these patterns helps both defenders and platform engineers improve abuse detection. For developers, the repo also serves as a cautionary example of how brittle unofficial integrations can be and why resilient, compliant APIs matter.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 2
    JavaScript Obfuscator

    JavaScript Obfuscator

    A powerful obfuscator for JavaScript and Node.js

    ...It works with modern JavaScript syntax and integrates into build pipelines to protect selected bundles or modules automatically. Teams use it to deter casual inspection of proprietary logic, license checks, or anti-abuse heuristics shipped to the browser or Node targets.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    HighwayHash

    HighwayHash

    Fast strong hash functions: SipHash/HighwayHash

    ...Typical uses include protecting hash tables that store untrusted keys and authenticating short-lived messages or records in storage systems. Although not a replacement for collision-resistant digests like SHA-2/3, it strikes a pragmatic balance of speed, simplicity, and resistance to common abuse patterns seen in production backends.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    tirreno

    tirreno

    Open Source Security Analytics

    The open-source security analytics. tirreno helps you to understand, monitor, and protect your platforms from cyber fraud, account threats, and abuse. Proactively defend against internal and external threats, ensure sovereignty through on-premises deployment, and secure your digital platforms.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    IndiMail
    Highly scalable/configurable Messaging Platform allowing users in a domain to be distributed on multiple hosts, has multiple queues. Provides virtual domains/users in MySQL. Modern MSP class qmail replacement with ESMTP, POP3/IMAP, QMTP, QMQP support
    Leader badge
    Downloads: 8 This Week
    Last Update:
    See Project
  • 6
    reCAPTCHA

    reCAPTCHA

    PHP client library for reCAPTCHA, a free service

    reCAPTCHA is Google’s human-verification system that helps websites distinguish real users from automated abuse while keeping friction low for legitimate traffic. The project bundles client and server examples, language-specific helpers, and documentation patterns for integrating reCAPTCHA v2 and v3 flows into web forms and APIs. Its design philosophy is “risk-based”: most users pass silently based on behavioral signals, while higher-risk interactions may be challenged with an image, checkbox, or other verification step. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7

    Tattle Trail

    PHP 404 pages to trap malicious web requests and report abusers

    Catch bad visitors to your php website that are looking for admin access or exploitable web scripts, automatically lookup abuse information for their IP address and notify their network's administrators of their bad behavior. Most network operators provide abuse contact email addresses in their WHOIS information, and your webserver can immediately report malicious access attempts as they happen. A large amount of bots that sniff around websites for unsecured standard web apps (like phpMyAdmin or WordPress) to exploit are run by a very few bad actors. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    ARIN RESTful Whois

    ARIN RESTful Whois Retrieve and Store

    Is a simple utility written by Mark T. Vitt to grab ARIN IP Block information for admin research and security. Its output includes basic WildCard, Netmask, and IP range information. Stores locally in MySql Table. Is currently being used by automated processes for research purposes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Intended for Developers to highlight their security weak coding and show them how attackers can abuse these weaknesses. Refer to the following web sites for directly viewing training movies online. http://yehg.net/lab/#training http://core.yehg.net/lab/#training
    Downloads: 14 This Week
    Last Update:
    See Project
  • Get the most trusted enterprise browser Icon
    Get the most trusted enterprise browser

    Advanced built-in security helps IT prevent breaches before they happen

    Defend against security incidents with Chrome Enterprise. Create customizable controls, manage extensions and set proactive alerts to keep your data and employees protected without slowing down productivity.
    Download Chrome
  • 10
    NetInfoTrace
    The project is supposed to be a helper tool for administrators in providing a centralized place to track your routes, view them on google maps, show abuse info, dns tracking, asn, blocklists etc'
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    This is a fork from PHProxy, which is no longer in development by its original creator. Private PHProxy adds user-level access control to prevent abuse by anonymous users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Report Abuse Button (jetzt-loeschen.de)
    This is an add-on for Firefox to report accusable content on websites anonymously to the INHOPE network member in germany. INHOPE in turn tries to notify the provider and let him takedown the criminal content, espacially child pornography.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    TightURL is a templated, easily customizable PHP & MySQL based URL shortner / redirection service similar to TinyURL, Bit.ly, or SnipURL and produces short URLs. It includes extensive anti-abuse URI checks to protect against abuse.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Web application to manage abuse ssh usage and contacting the responsible network operater about the abuse.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    PopServerInfo gives you an easy way to serve contact information to people how need to report abuse. They only need to know the ip address and then telnet to port 54. Fast and easy. It also holds latitude & longitude for the server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Blackbox is an IRC Service which provides the following services preventing IRC Operator abuse, Anti Proxy System, Network Statistics and Web Based Management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Another shoutbox for developers and users to include in their websites (with DB-backend) easily. It is hardened against SQL-injections and prevents abuse by using configurable buzzwords. As you have a CSS you may customize its appearance.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Protect bandwidth from abuse with bandwidth limiters and anti-leech token technology. Simple setup routine, Ready-to-go download display page. Does not use HTTP_REFERER or IP which can easily be spoofed or blocked. Includes a web-based Admin page.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Spam Pesters Admins about Mail-abuse. This script automatically extracts sites from a spam mail and mails administrators of those sites to complain!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Pix 6.3 Parser is a PERL-based utility for parsing the particular logging style of PIX OS 6.3 when you have object-groups tied to ACLs via access-groups. It outputs a detailed HTML page, an RSS feed and helps you compile and track network abuse reports.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Jaca - Java Against Code Abuse Project is a package with a set of files improving pages, classes and standard operations so you can copy, paste and edit them to avoid rebuild stuff that is already done. Save time !!!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Net Death is a hardware accelerated 2D multiplayer sidescroller in the spirit of Abuse, Soldat, and Stick Soldiers. Kee2D is the cross-platform engine, designed for polygons and "realistic" physics unlike traditional 2D engines which only use tiles.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    NART (Net Abuse Reporting Tool) is a tool to gather information related to Net Abuse, create complaints, and forward those complaints to appropriate personnel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    yaspi is a POP3 mail-scanner that targets mailbox bombing originated by virusen. It connects to the POP3 server and uses some heuristics to catch mails infected by Swen and similar virus. Then, it uses Ricochet to send abuse reports.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    A spam abuser tracking device, complete with lookups and domain abuse owners.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next