Showing 17 open source projects for "abuse"

View related business solutions
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • 1
    Docker Mailserver

    Docker Mailserver

    Production-ready fullstack but simple mail server

    docker-mailserver provides a production-ready, all-in-one email server in a single container, focused on simplicity and maintainability. It bundles the core mail stack—Postfix for SMTP and Dovecot for IMAP/POP3—then layers in optional anti-spam and anti-virus services, DKIM/DMARC signing and verification, and rate-/abuse-protection tooling. The project emphasizes secure defaults while exposing configuration via environment variables and mounted files, allowing you to define users, aliases...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    SafeLine

    SafeLine

    Serve as a reverse proxy to protect your web services from attacks

    SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits. A web application firewall helps protect web apps by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web apps from attacks such as SQL injection, XSS, code injection, os command injection, CRLF injection, LDAP injection, XPath injection, RCE, XXE, SSRF, path traversal, backdoor, brute force, HTTP-flood, bot abuse, among others...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    IndiMail
    Highly scalable/configurable Messaging Platform allowing users in a domain to be distributed on multiple hosts, has multiple queues. Provides virtual domains/users in MySQL. Modern MSP class qmail replacement with ESMTP, POP3/IMAP, QMTP, QMQP support
    Leader badge
    Downloads: 14 This Week
    Last Update:
    See Project
  • 4
    Redix

    Redix

    A very simple pure key => value storage system that speaks Redis

    redix is a very simple key => value storage engine that speaks redis and even more simpler and flexible. redis is very simple, sometimes we abuse it, so I decided to build a pure key-value storage system that introduces the core utilities for building any data structure you want based on the key => value model that is because I think that everything could be modeled easily using that model, so I decided to not to follow redis and all of its commands, you won’t find lpush, hset, sadd, … etc you...
    Downloads: 6 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 5
    Cutieys Fake PW Stealer

    Cutieys Fake PW Stealer

    Fake Password Stealer thats primarily meant to trick terrible people

    The main purpose of this is to trick those that actually attempt to steal peoples passwords and login(s) against the; Computer Fraud and Abuse Act (CFAA) Stored Communications Act (SCA) Electronic Communications Privacy Act (ECPA) And is based off of batch functions converted into an exe that essentially looks like an authentic Oauth2 password stealer, but in reality creates about a thousand empty folders on the desktop changes the BG and restarts the pc, adding the exe to the startup...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The...
    Leader badge
    Downloads: 14 This Week
    Last Update:
    See Project
  • 7
    lua-resty-waf

    lua-resty-waf

    High-performance WAF built on the OpenResty stack

    lua-resty-waf is a web application firewall implemented in Lua for OpenResty/NGINX, designed to run inline at the edge with low overhead. It inspects requests and responses during NGINX phases, applying rule logic and anomaly scoring to detect patterns like SQL injection, cross-site scripting, and protocol abuse. Rules are organized into policies with configurable actions—block, log, or allow—and can leverage shared dictionaries for counters, rate limits, and caching decisions. Because it runs...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Tattle Trail

    PHP 404 pages to trap malicious web requests and report abusers

    Catch bad visitors to your php website that are looking for admin access or exploitable web scripts, automatically lookup abuse information for their IP address and notify their network's administrators of their bad behavior. Most network operators provide abuse contact email addresses in their WHOIS information, and your webserver can immediately report malicious access attempts as they happen. A large amount of bots that sniff around websites for unsecured standard web apps (like...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    NetInfoTrace
    The project is supposed to be a helper tool for administrators in providing a centralized place to track your routes, view them on google maps, show abuse info, dns tracking, asn, blocklists etc'
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    The WiFi Guard Dog project is a complete and embeddable captive portal solution for wireless community groups or individuals who wish to open free HotSpots while preventing abuse of their connection. Go to dev.wifidog.org to download the latest version.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 11
    vCardBlaster is a tool designed to abuse the sending of vCards over Bluetooth. It allows the user to send a continual stream of vCards to attempt a Bluetooth DoS or abuse other device recourses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Blueper is a tool designed to abuse Bluetooth file transferring. This tool can cause several mischievous results, including; continual popups of file transfer requests, writing data to a remote device disk,or locking up/crashing some devices.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Web application to manage abuse ssh usage and contacting the responsible network operater about the abuse.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Running as a daemon it monitors /var/log/messages(configurable) for bastille iptables and PSAD scan alerts with a max threshold (configurable) It will block ip on iptables instantly and send abuse email out. Requires a few perl modules (tries to install)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    NART (Net Abuse Reporting Tool) is a tool to gather information related to Net Abuse, create complaints, and forward those complaints to appropriate personnel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Mangler is a modularized network service management utility. Mangler is geared towards ISPs and large enterprise networks, providing data tracking and service management for Customers, IP adresses, DNS zones, and abuse incident tracking.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    WaterFall project was started as a proxy/filter/firewall solution for NNTP (Usenet News) abuse protection. Due to the similiarity, SMTP may be covered as time permits.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next