Showing 212 open source projects for "dos attack tools"

View related business solutions
  • Level Up Your Cyber Defense with External Threat Management Icon
    Level Up Your Cyber Defense with External Threat Management

    See every risk before it hits. From exposed data to dark web chatter. All in one unified view.

    Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
    Try for Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    Rufus

    Rufus

    Utility to create bootable USB flash drives

    ... the media. This can be immensely useful while you're on the go or just need access to an OS for a temporary, isolated reason. The app can even be used to flash firmware to BIOS or other destinations by just using DOS. Even though Rufus is a tiny utility in comparison to other USB creation tools that can be rather bulky in size, it contends easily with the competition and creates bootable USB drives in record time!
    Downloads: 952 This Week
    Last Update:
    See Project
  • 2
    airgeddon

    airgeddon

    This is a multi-use bash script for Linux systems

    .... Offline password decrypting on WPA/WPA2 captured files for personal networks (Handshakes and PMKIDs) using a dictionary, brute-force, and rule-based attacks with aircrack, crunch and hashcat tools. Enterprise networks captured password decrypting based on john the ripper, crunch, asleap and hashcat tools. GPU support available for hashcat. Only Rogue/Fake AP mode to sniff using external sniffer (Hostapd + DHCP + DoS).
    Downloads: 48 This Week
    Last Update:
    See Project
  • 3
    ZAP

    ZAP

    The OWASP ZAP core project

    The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by a dedicated international team of volunteers. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. It's also a great tool for experienced pentesters to use for manual security testing. ZAP is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications...
    Downloads: 144 This Week
    Last Update:
    See Project
  • 4
    thc-hydra

    thc-hydra

    Shows how easy it would be to gain unauthorized access to a system

    Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. There are already several login hacker tools available, however, none does either support more than one protocol to attack or support parallelized connects. It was tested to compile cleanly on Linux, Windows/Cygwin...
    Downloads: 70 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    OWASP Amass

    OWASP Amass

    In-depth attack surface mapping and asset discovery

    The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery using open source information gathering and active reconnaissance techniques. The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software. All of our projects ,tools, documents, forums, and chapters are free and open to anyone interested in improving application...
    Downloads: 24 This Week
    Last Update:
    See Project
  • 6
    Proxyman

    Proxyman

    Web Debugging Proxy for macOS, iOS, and Android

    Don't let cumbersome web debugging tools hold you back. With Proxyman's native macOS app, you can capture, inspect, and manipulate HTTP(s) traffic with ease. Intuitive, thoughtful, built with meticulous attention to detail. Comprehensive Guideline to set up with iOS simulator and iOS and Android devices. Proxyman acts as a man-in-the-middle server that capture the traffic between your applications and SSL Web Server. With built-in macOS setup, so you can inspect your HTTP/HTTPS Request...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    Kubernetes Goat

    Kubernetes Goat

    Kubernetes Goat is a "Vulnerable by Design" cluster environment

    Learn to attack or find security issues, misconfigurations, and real-world hacks within containers, Kubernetes, and cloud-native environments. Enumerate, exploit, and gain access to the workloads right from your browser. Understand how attackers think, work, and exploit security issues, and apply these learnings to detect and defend them. Also, learn best practices, defenses, and tools to mitigate, and detect in the real world. Learn the hacks, defenses, and tools. So that you can think like...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8

    Impacket

    A collection of Python classes for working with network protocols

    Impacket is a collection of Python classes designed for working with network protocols. It was primarily created in the hopes of alleviating some of the hindrances associated with the implementation of networking protocols and stacks, and aims to speed up research and educational activities. It provides low-level programmatic access to packets, and the protocol implementation itself for some of the protocols, like SMB1-3 and MSRPC. It features several protocols, including Ethernet, IP, TCP,...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    NextDNS

    NextDNS

    NextDNS CLI client (DoH Proxy)

    ... (in a matter of nanoseconds) in order to detect and block malicious behavior. With usually only a few hours between domain registration and the start of an attack, our threat intelligence system is built to catch malicious domains earlier than classic security solutions. Block ads and trackers on websites and in apps, including the most devious ones. Use the most popular ads & trackers blocklists, millions of domains all updated in real-time.
    Downloads: 5 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    gVisor

    gVisor

    Application Kernel for Containers

    ..., resource efficiency, and flexibility of containers. Its key runtime, runsc, integrates seamlessly with container ecosystems such as Docker and Kubernetes, making it easy to deploy sandboxed workloads using familiar tools. By intercepting and safely handling syscalls from applications, gVisor reduces the attack surface of the host kernel, mitigating risks associated with running untrusted or potentially malicious code in containerized environments.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11
    GOAD (Game of Active Directory)

    GOAD (Game of Active Directory)

    game of active directory

    ... can filter, cluster, and explore these relationships to identify infrastructure patterns, potential subdomains, or attack surfaces. Integrations may include metadata like geolocation, WHOIS, and risk scoring to prioritize leads. GOAD helps teams transition from fragmented OSINT tools to a unified reconnaissance dashboard where exploration and filtering are first-class.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    Ring Programming Language

    Ring Programming Language

    Simple and flexible programming language for applications development

    Simple and flexible programming language for applications development. Ring is a practical general-purpose multi-paradigm language. The supported programming paradigms are Imperative, Procedural, Object-Oriented, Functional, Metaprogramming, Declarative programming using nested structures, and Natural programming. The language is portable (MS-DOS, Windows, Linux, macOS, Android, WebAssembly, etc.) and can be used to create Console, GUI, Web, Games, and Mobile applications.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    Atlantis iOS

    Atlantis iOS

    A lightweight and powerful iOS framework for intercepting HTTP/HTTPS

    Don't let cumbersome web debugging tools hold you back. With Proxyman's native macOS app, you can capture, inspect, and manipulate HTTP(s) traffic with ease. Intuitive, thoughtful, and built with meticulous attention to detail. Dive into the network level to diagnose and fix problems with reliable and powerful tools. Proxyman acts as a man-in-the-middle server that captures the traffic between your applications and SSL Web Server. With a built-in macOS setup, so you can inspect your HTTP/HTTPS...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    ContainerSSH

    ContainerSSH

    ContainerSSH: Launch containers on demand

    An SSH Server that Launches Containers in Kubernetes and Docker. Building a lab environment can be time-consuming. ContainerSSH solves this by providing dynamic SSH access with APIs, automatic cleanup on logout using ephemeral containers, and persistent volumes for storing data. Perfect for vendor and student labs. Provide production access to your developers, give them their usual tools while logging all changes. Authorize their access and create short-lived credentials for the database using...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    GmSSL

    GmSSL

    Password toolbox that supports national secret

    GmSSL is an open source library of domestic commercial ciphers independently developed by Peking University. It realizes comprehensive functional coverage of national secret algorithms, standards, and secure communication protocols. It supports mainstream operating systems and processors including mobile terminals, and supports cryptographic keys, Cipher cards and other typical domestic cryptographic hardware provide feature-rich command line tools and multiple compiled language programming...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    picocli

    picocli

    Framework for building GraalVM-enabled command line apps

    Picocli is a one-file framework for creating Java command-line applications with almost zero code. It supports a variety of command-line syntax styles including POSIX, GNU, MS-DOS and more. It generates highly customizable usage help messages that use ANSI colors and styles to contrast important elements and reduce the cognitive load on the user. Picocli-based applications can have command line TAB completion showing available options, option parameters, and subcommands, for any level of nested...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    Firecracker

    Firecracker

    Secure and fast microVMs for serverless computing

    Firecracker is an open-source virtualization technology developed by AWS for deploying secure micro-VMs (microVMs) that offer strong isolation with minimal overhead. Designed for serverless workloads (e.g., AWS Lambda, Fargate), it combines VM-level security with container-like performance and startup speed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Hermit for Rust

    Hermit for Rust

    Hermit for Rust

    Hermit-RS is a Rust-based unikernel designed for high-performance and cloud computing applications. By combining the safety and concurrency features of Rust with the minimalistic approach of unikernels, Hermit-RS offers a secure and efficient runtime environment. It is particularly suited for running single-tenant applications directly on hypervisors or bare-metal hardware, reducing overhead and improving performance.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    ruroco

    ruroco

    A tool that lets you execute commands on a server

    Ruroco is a tool that lets you execute commands on a server by sending UDP packets. The commands are configured on the server side, so the client does not define what is going to be executed, it only picks from existing commands.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Middleman

    Middleman

    Hand-crafted frontend development

    ..., internationalization, sitemaps, data-driven pages, and external build steps, so complex sites remain manageable without server-side code. Because output is plain files, Middleman sites deploy anywhere—from object storage and CDNs to GitHub Pages—benefiting from high performance and low attack surface. Teams use it for marketing sites, docs, microsites, and prototypes where content and design matter more than dynamic backends.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    ES-DOS A
    ES-DOS is a application for windows that looks like MS-DOS but is not a OS
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Penetration Testing Tools

    Penetration Testing Tools

    A collection of more than 170+ tools, scripts, cheatsheets

    Penetration-Testing-Tools is a curated collection of tools, scripts, cheatsheets and reference materials assembled to help security researchers, red-teamers, and students perform hands-on penetration testing across multiple domains. The repository groups resources by discipline — reconnaissance, web application testing, network exploitation, privilege escalation, post-exploitation and reporting — so users can quickly find relevant utilities and walkthroughs. Many entries include short usage...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    HWiNFO

    HWiNFO

    Comprehensive Hardware Analysis, Monitoring and Reporting for Windows

    Professional System Information and Diagnostics. Comprehensive Hardware Analysis, Monitoring and Reporting for Windows and DOS. HWiNFO is an all-in-one solution for hardware analysis and monitoring supporting a broad range of OSes (DOS, Microsoft Windows 95 - Windows 11, WinPE) and platforms (i8086 - Xeon Platinum). Exhausting information about hardware components displayed in hierarchy unfolding into deep details. Useful for obtaining a detailed hardware inventory report or checking...
    Downloads: 128,354 This Week
    Last Update:
    See Project
  • 24
    pj-net-tools

    pj-net-tools

    Pure Java Network Tools

    ...) Anonymous FTP-server. 18) Parallel Network TCP-scanner. 19) Parallel Network SNMP-scanner. 20) Parallel Network DNS-scanner. 21) Parallel SNMP-DoS. 22) Parallel HTTP/HTTPS-DoS Need JRE-1.8: https://www.oracle.com/java/technologies/javase/javase8-archive-downloads.html . Source - https://github.com/harp077/pj-net-tools . If you like this - put a star on https://github.com/harp077/pj-net-tools
    Downloads: 10 This Week
    Last Update:
    See Project
  • 25

    Euphoric tools

    Companion Tools to Euphoric and other Oric emulators.

    These Tools used to be compiled with djgpp, allowing them to be executed both on DOS and Windows. However, they were thus considered as 16 bits applications, although they were compiled as 32 bits applications. As such, they required the CWSDPMI 32-bits extender in order to be run on DOS. Problem is that modern versions of Windows can't execute 16-bits applications anymore. I guess very few people have a use for DOS nowadays, so the Euphoric Tools collection will now be compiled as true 32...
    Downloads: 6 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.