[go: up one dir, main page]

Showing 55 open source projects for "otp bypass tool"

View related business solutions
  • Monitor your whole IT Infrastructure Icon
    Monitor your whole IT Infrastructure

    Know what's up and what's new: Monitor all your systems, devices, traffic and applications.

    Caters to tech staff, system Administrators, and companies of any size, from small and medium sized businesses to enterprises that need their IT network to be reliable and easy to monitor in real-time. Equipped with an easy-to-use, intuitive interface with a cutting-edge monitoring engine. PRTG optimizes connections and workloads as well as reducing operational costs by avoiding outages while saving time and controlling service level agreements (SLAs).
    Start Your Free PRTG Trial Now
  • Cynet All-in-One Cybersecurity Platform Icon
    Cynet All-in-One Cybersecurity Platform

    All-in-One Managed Cybersecurity for MSPs

    Cynet empowers MSPs and MSSPs with a comprehensive, fully managed cybersecurity platform that consolidates essential security functions into a single, easy-to-use solution. Cynet simplifies cybersecurity management, reduces operational overhead, and lowers costs by eliminating the need for multiple vendors and complex integrations.
    Learn More
  • 1
    Survey Bypass Tool

    Survey Bypass Tool

    Free Download Survey Remover Tool

    Online surveys are annoying and time-consuming. They often block your access to the content or files you want to download or view. Sometimes, they even ask for your personal information, which can compromise your privacy and security. If you are tired of filling out online surveys, you might be looking for a survey bypasser tool that can help you skip them easily. This is one of the best online websites to bypass online surveys. It supports all common survey providers like FileIce, ShareCash...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 2
    Lantern

    Lantern

    Tool to access videos, messaging, and other popular apps

    Can't access your favorite apps? Download Lantern to easily access videos, messaging, and other popular apps while at school or work. Lantern is an application that allows you to bypass firewalls to use your favorite applications and access your favorite websites. Lantern does not cooperate with any law enforcement in any country. Lantern encrypts all of your traffic to blocked sites and services to protect your data and privacy. Lantern passed multiple third party white box security audits...
    Downloads: 26 This Week
    Last Update:
    See Project
  • 3
    UACMe

    UACMe

    Defeating Windows user account control

    ... UAC bypass method used by malware, and re-implement some of them in a different way improving original concepts. There are different, not yet known to the general public, methods. This tool is not intended for AV tests and not tested to work in aggressive AV environment, if you still plan to use it with installed bloatware AV soft, use it at your own risk.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    Go Cursor Help

    Go Cursor Help

    Cursor Free Trial Reset Tool

    A small CLI utility written in Go to reset free trial restrictions of the Cursor AI code assistant on local machines. It automates machine‑ID resets and environment cleanups so users can bypass "Too many free trial accounts" limitations across platforms.
    Downloads: 5 This Week
    Last Update:
    See Project
  • Find out just how much your login box can do for your customer | Auth0 Icon
    Find out just how much your login box can do for your customer | Auth0

    With over 53 social login options, you can fast-track the signup and login experience for users.

    From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
    Sign up
  • 5
    Kubernetes Goat

    Kubernetes Goat

    Kubernetes Goat is a "Vulnerable by Design" cluster environment

    ... an attacker, and secure your Kubernetes, cloud, and container workloads right from the design, code, and architecture itself to prevent them. Use Kubernetes Goat to showcase the effectiveness of the tools, product, and solution. Also, educate the customers and share your product or tool knowledge in an interactive hands-on way.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    Nipe

    Nipe

    An engine to make Tor network your default gateway

    Nipe is a Perl-based engine whose primary aim is to make the Tor network act as the default gateway for outgoing traffic. In practice, it configures system firewall rules (iptables) and network routing so that almost all IPv4 traffic is redirected through Tor. The tool provides commands such as install, start, stop, restart, and status to manage its behavior. When “start” is issued, it sets up the necessary rules; when “stop” is used, it attempts to remove those rules. Nipe currently operates...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    Modlishka

    Modlishka

    Powerful and flexible HTTP reverse proxy

    ... as an attempt to overcome standard reverse proxy limitations and as a personal challenge to see what is possible with sufficient motivation and a bit of extra research time. The achieved results appeared to be very interesting and the tool was initially released and later updated.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    Dialyxir

    Dialyxir

    Mix tasks to simplify use of Dialyzer in Elixir projects

    Mix tasks to simplify use of Dialyzer in Elixir projects. Elixir 1.6 is required, to support the new pretty printing feature. If your project is not yet on 1.6, continue to specify 0.5 in your mix deps. Warning messages have been greatly improved, but are filtered through the legacy formatter to support your existing ignore files. You can optionally use the new Elixir term format for ignore files. You may want to use the --format short argument in your CI pipelines. There are several...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    Th3inspector

    Th3inspector

    Best Tool For Information Gathering

    Th3Inspector is a Perl- and shell-based, all-in-one information-gathering toolkit built to quickly enumerate public and semi-public data about targets (domains, IPs, phone numbers, mail servers, etc.). It exposes a single command-line entrypoint (Th3inspector.pl) with many switches for common reconnaissance tasks — examples include website info, whois, MX lookup, geo-IP, subdomain discovery, CMS detection, port scanning, and Cloudflare real-IP resolution — so a user can chain many checks...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Download the most trusted enterprise browser Icon
    Download the most trusted enterprise browser

    Chrome Enterprise brings enterprise controls and easy integrations to the browser users already know and love.

    Chrome Enterprise is ideal for businesses of all sizes, IT professionals, and organizations looking for a secure, scalable, and easily managed browser solution that supports remote work, data protection, and streamlined enterprise operations.
    Learn More
  • 10
    Fadeboard

    Fadeboard

    Android Keyboard transforms simple letters into special characters

    FadeBoard is a niche Android keyboard that converts typed text into special Unicode characters—designed to circumvent basic text filters and content restrictions. It provides a playful tool to make messages less detectable by simplistic moderation.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    NSmartProxy

    NSmartProxy

    NSmartProxy is an open source reverse proxy tool

    NSmartProxy is a reverse proxy system that enables external access to devices or applications behind NAT/firewalls without requiring public IPs or router configuration. It’s designed to work with desktop and server apps, and includes a centralized SmartNode server that helps initiate and maintain tunnel connections. This makes it ideal for remote access to local services or self-hosted applications. NSmartProxy supports both TCP and UDP protocols, making it versatile for a wide range of...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Geodesic

    Geodesic

    Geodesic is a DevOps Linux Toolbox in Docker

    Geodesic is a robust Linux toolbox container, crafted to optimize DevOps workflows. This container comes fully loaded with all essential dependencies for a complete DevOps toolchain. It's designed to bring consistency and boost efficiency across development environments. It achieves this without the need for installing additional software on your workstation. Think of Geodesic as a containerized parallel to Vagrant, offering similar functionality within a Docker container context.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Unshackle

    Unshackle

    Tool to bypass windows and linux passwords from bootable USB

    Unshackle is an open-source tool to bypass Windows and Linux user passwords from a bootable USB based on Linux. Open-source tool to bypass windows and Linux passwords from bootable USB.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 14
    SkinFlux - CS2 Skin Changer

    SkinFlux - CS2 Skin Changer

    Free CS2 Skin Changer & Swapper – Custom Skins for CS 2 Easily

    ... supports the latest game updates and offers a seamless, safe, and offline experience. Customize your loadout using any CS2 weapon skins without affecting VAC status (bypass not included). Whether you call it a CS2 inventory changer, CS2 custom skin loader, or a CS2 free skin tool, this project is built for players who want freedom, style, and simplicity.
    Leader badge">
    Downloads: 1,236 This Week
    Last Update:
    See Project
  • 15
    HWID Spoofer - Hardware ID Changer

    HWID Spoofer - Hardware ID Changer

    The best HWID Spoofer in 2025.

    TraceX is a powerful and advanced HWID Spoofer designed to bypass anti-cheat systems in games like Valorant, Apex Legends, Warzone, Fortnite, and more. It spoofs critical system identifiers such as disk serials, MAC addresses, BIOS UUIDs, motherboard and GPU IDs, and even EFI boot variables. This HWID Spoofer also includes a full system cleaner that removes traces of game activity, browser data, event logs, Xbox and Discord accounts, and network fingerprints. With deep spoofing of CPU...
    Leader badge">
    Downloads: 1,271 This Week
    Last Update:
    See Project
  • 16
    SpectraX for Roblox

    SpectraX for Roblox

    Unlock advanced tools for Roblox with seamless protection bypass

    ... under updated security scans, while keeping performance smooth and lag-free. (roblox hack, roblox hacks, roblox cheat, roblox cheats, roblox exploit, roblox exploits, roblox script, roblox scripts, roblox script executor, roblox cheat engine, roblox free hack, roblox free cheats, roblox free exploit, roblox executor 2025, roblox hacks download, roblox hack free download, roblox script hub, roblox cheat download, roblox bypass, roblox tool)
    Leader badge">
    Downloads: 180 This Week
    Last Update:
    See Project
  • 17
    LFIMap

    LFIMap

    Advanced LFI Exploitation Tool

    A Advanced LFI Exploitation Tool offer Bypass WAF and Plugins and support Large of LFI Technique and scan customization and user friendly
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    BypassHash

    BypassHash

    This tool downloads an executable and bypasses hash-based virus checks

    This tool downloads an executable, ELF (Linux) and PE (Windows), modify metadata to bypasses hash-based virus checks and protect against identification with metadata (like rich headers, timestamps, ...).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19

    OTP-Crypto-Tool

    Symetric file encryption based on OTP implemented as XOR encryption

    OTP (One Time Pad) In case you have any questions, contact me at: crypto-munition@gmx.de When used correctly, the OTP is an information-theoretically secure and demonstrably non-breakable encryption. The encryption process is implemented as symmetrical file encryption based on XOR encryption. The integrated pseudo-random generator serves only to illustrate and check the functionality. The use of this generator for REAL OTPs is not recommended. For REAL OTPs, hardware-based key generators...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    youtube-dl

    youtube-dl

    Download videos from YouTube (and more sites)

    ... to facilitate the downloading of videos and audio from popular video streaming websites. Widely recognized for its versatility, youtube-dl supports a vast array of platforms beyond YouTube, including Vimeo, Dailymotion, and many others. The tool provides users with advanced customization options, such as selecting specific video formats, extracting audio, bypassing geographic restrictions, and downloading entire playlists or channels.
    Downloads: 145 This Week
    Last Update:
    See Project
  • 21

    Burdjia Cypher

    Simple cypher tool.

    Simple cypher tool to bypass Google's file bans for some compression and executable formats. This is a personal tool that may be useful for somebody else. DO NOT USE TO PROTECT DATA.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    OTP-Chat

    OTP-Chat (client / server) YOUR PC is both client and server!

    ...-breakable encryption. By using an OTP-based key on both, the sender and recipient side, eavesdropping on chat communication, in terms of information theory, is impossible to poop. Correct use of the OTP is important. Details can be found in my project OPT-Crypto-Tool under Sourceforge.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23
    PyExfil

    PyExfil

    A Python Package for Data Exfiltration

    PyExfil was born as a PoC and kind of a playground and grew to be something a bit more. In my eyes it’s still a messy PoC that needs a lot more work and testing to become stable. The purpose of PyExfil is to set as many exfiltrations, and now also communication, techniques that CAN be used by various threat actors/malware around to bypass various detection and mitigation tools and techniques. You can track changes at the official GitHub page. Putting it simply, it’s meant to be used...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Bilibili Helper

    Bilibili Helper

    Auxiliary tool that can replace the player, push notifications, etc.

    Bilibili (bilibili.com) Auxiliary tool that can replace the player, push notifications and perform some shortcut operations. Bilibili (bilibili.com) is an auxiliary tool that can download videos, query the sender of the barrage, and some very useful live broadcast area functions. An auxiliary extension for Bilibili (bilibili.com) which allows users to bypass playback restrictions, replace video players and use shortcuts. Starting from a certain version, Bilibili Assistant uses special technical...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Mellow

    Mellow

    Mellow is a rule-based global transparent proxy client for Windows

    Mellow is a rule-based global transparent proxy tool that can run on Windows, macOS and Linux, and can also be configured as a router transparent proxy or proxy gateway, supporting multiple proxy protocols such as SOCKS, HTTP, Shadowsocks, VMess, etc. Mellow is a transparent proxy client. If you don’t understand it, then to be more realistic, it can not only proxy browser requests, but also proxy WeChat, QQ, Telegram clients, Instagram clients, NetEase Cloud Music, and various command lines...
    Downloads: 7 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next