Showing 17 open source projects for "abuse"

View related business solutions
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • The All-in-One Commerce Platform for Businesses - Shopify Icon
    The All-in-One Commerce Platform for Businesses - Shopify

    Shopify offers plans for anyone that wants to sell products online and build an ecommerce store, small to mid-sized businesses as well as enterprise

    Shopify is a leading all-in-one commerce platform that enables businesses to start, build, and grow their online and physical stores. It offers tools to create customized websites, manage inventory, process payments, and sell across multiple channels including online, in-person, wholesale, and global markets. The platform includes integrated marketing tools, analytics, and customer engagement features to help merchants reach and retain customers. Shopify supports thousands of third-party apps and offers developer-friendly APIs for custom solutions. With world-class checkout technology, Shopify powers over 150 million high-intent shoppers worldwide. Its reliable, scalable infrastructure ensures fast performance and seamless operations at any business size.
    Learn More
  • 1
    SafeLine

    SafeLine

    Serve as a reverse proxy to protect your web services from attacks

    SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits. A web application firewall helps protect web apps by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web apps from attacks such as SQL injection, XSS, code injection, os command injection, CRLF injection, LDAP injection, XPath injection, RCE, XXE, SSRF, path traversal, backdoor, brute force, HTTP-flood, bot abuse, among others...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 2
    Docker Mailserver

    Docker Mailserver

    Production-ready fullstack but simple mail server

    docker-mailserver provides a production-ready, all-in-one email server in a single container, focused on simplicity and maintainability. It bundles the core mail stack—Postfix for SMTP and Dovecot for IMAP/POP3—then layers in optional anti-spam and anti-virus services, DKIM/DMARC signing and verification, and rate-/abuse-protection tooling. The project emphasizes secure defaults while exposing configuration via environment variables and mounted files, allowing you to define users, aliases...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    IndiMail
    Highly scalable/configurable Messaging Platform allowing users in a domain to be distributed on multiple hosts, has multiple queues. Provides virtual domains/users in MySQL. Modern MSP class qmail replacement with ESMTP, POP3/IMAP, QMTP, QMQP support
    Leader badge
    Downloads: 8 This Week
    Last Update:
    See Project
  • 4
    Redix

    Redix

    A very simple pure key => value storage system that speaks Redis

    redix is a very simple key => value storage engine that speaks redis and even more simpler and flexible. redis is very simple, sometimes we abuse it, so I decided to build a pure key-value storage system that introduces the core utilities for building any data structure you want based on the key => value model that is because I think that everything could be modeled easily using that model, so I decided to not to follow redis and all of its commands, you won’t find lpush, hset, sadd, … etc you...
    Downloads: 6 This Week
    Last Update:
    See Project
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • 5
    Cutieys Fake PW Stealer

    Cutieys Fake PW Stealer

    Fake Password Stealer thats primarily meant to trick terrible people

    The main purpose of this is to trick those that actually attempt to steal peoples passwords and login(s) against the; Computer Fraud and Abuse Act (CFAA) Stored Communications Act (SCA) Electronic Communications Privacy Act (ECPA) And is based off of batch functions converted into an exe that essentially looks like an authentic Oauth2 password stealer, but in reality creates about a thousand empty folders on the desktop changes the BG and restarts the pc, adding the exe to the startup...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The...
    Leader badge
    Downloads: 11 This Week
    Last Update:
    See Project
  • 7
    lua-resty-waf

    lua-resty-waf

    High-performance WAF built on the OpenResty stack

    lua-resty-waf is a web application firewall implemented in Lua for OpenResty/NGINX, designed to run inline at the edge with low overhead. It inspects requests and responses during NGINX phases, applying rule logic and anomaly scoring to detect patterns like SQL injection, cross-site scripting, and protocol abuse. Rules are organized into policies with configurable actions—block, log, or allow—and can leverage shared dictionaries for counters, rate limits, and caching decisions. Because it runs...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Tattle Trail

    PHP 404 pages to trap malicious web requests and report abusers

    Catch bad visitors to your php website that are looking for admin access or exploitable web scripts, automatically lookup abuse information for their IP address and notify their network's administrators of their bad behavior. Most network operators provide abuse contact email addresses in their WHOIS information, and your webserver can immediately report malicious access attempts as they happen. A large amount of bots that sniff around websites for unsecured standard web apps (like...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    NetInfoTrace
    The project is supposed to be a helper tool for administrators in providing a centralized place to track your routes, view them on google maps, show abuse info, dns tracking, asn, blocklists etc'
    Downloads: 0 This Week
    Last Update:
    See Project
  • Enterprise and Small Business CRM Solution | Clear C2 C2CRM Icon
    Enterprise and Small Business CRM Solution | Clear C2 C2CRM

    Voted Best CRM System with Top Ranked Customer Support. CRM Management includes Sales, Marketing, Relationship Management, and Help Desk.

    C2CRM consists of four modules that integrate to provide a comprehensive CRM solution: Relationship Management, Sales Automation, Marketing Automation, and Customer Service. Only buy what each user needs.
    Learn More
  • 10
    The WiFi Guard Dog project is a complete and embeddable captive portal solution for wireless community groups or individuals who wish to open free HotSpots while preventing abuse of their connection. Go to dev.wifidog.org to download the latest version.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 11
    vCardBlaster is a tool designed to abuse the sending of vCards over Bluetooth. It allows the user to send a continual stream of vCards to attempt a Bluetooth DoS or abuse other device recourses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Blueper is a tool designed to abuse Bluetooth file transferring. This tool can cause several mischievous results, including; continual popups of file transfer requests, writing data to a remote device disk,or locking up/crashing some devices.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Web application to manage abuse ssh usage and contacting the responsible network operater about the abuse.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Running as a daemon it monitors /var/log/messages(configurable) for bastille iptables and PSAD scan alerts with a max threshold (configurable) It will block ip on iptables instantly and send abuse email out. Requires a few perl modules (tries to install)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    NART (Net Abuse Reporting Tool) is a tool to gather information related to Net Abuse, create complaints, and forward those complaints to appropriate personnel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Mangler is a modularized network service management utility. Mangler is geared towards ISPs and large enterprise networks, providing data tracking and service management for Customers, IP adresses, DNS zones, and abuse incident tracking.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    WaterFall project was started as a proxy/filter/firewall solution for NNTP (Usenet News) abuse protection. Due to the similiarity, SMTP may be covered as time permits.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next