[go: up one dir, main page]

Showing 47 open source projects for "otp bypass tool"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Network Performance Monitoring | Statseeker Icon
    Network Performance Monitoring | Statseeker

    Statseeker is a powerful network performance monitoring solution for businesses

    Using just a single server or virtual machine, Statseeker can be up and running within minutes, and discovering your entire network in less than an hour, without any significant effect on your bandwidth availability.
    Learn More
  • 1
    Survey Bypass Tool

    Survey Bypass Tool

    Free Download Survey Remover Tool

    ...Sometimes, they even ask for your personal information, which can compromise your privacy and security. If you are tired of filling out online surveys, you might be looking for a survey bypasser tool that can help you skip them easily. This is one of the best online websites to bypass online surveys. It supports all common survey providers like FileIce, ShareCash, CPALead, etc. To use it, you just need to copy and paste the URL of the website where you want to bypass the survey in the URL box of Bypass Survey website. It also offers some other options like allowing cookies, removing scripts, encrypting page, etc.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 2
    Zapret

    Zapret

    Advanced open source tool for bypassing DPI-based censorship

    Zapret is an open source, cross-platform tool designed to help users bypass and evade Deep Packet Inspection (DPI)-based traffic blocking and censorship systems. Rather than acting as a traditional proxy or VPN, it works by manipulating network packets and traffic streams locally to confuse or disrupt DPI mechanisms used by ISPs and network filters, making it possible to access restricted websites and services without relaying traffic through third-party servers.
    Downloads: 1,131 This Week
    Last Update:
    See Project
  • 3
    Go Cursor Help

    Go Cursor Help

    Cursor Free Trial Reset Tool

    A small CLI utility written in Go to reset free trial restrictions of the Cursor AI code assistant on local machines. It automates machine‑ID resets and environment cleanups so users can bypass "Too many free trial accounts" limitations across platforms.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    Kubernetes Goat

    Kubernetes Goat

    Kubernetes Goat is a "Vulnerable by Design" cluster environment

    Learn to attack or find security issues, misconfigurations, and real-world hacks within containers, Kubernetes, and cloud-native environments. Enumerate, exploit, and gain access to the workloads right from your browser. Understand how attackers think, work, and exploit security issues, and apply these learnings to detect and defend them. Also, learn best practices, defenses, and tools to mitigate, and detect in the real world. Learn the hacks, defenses, and tools. So that you can think like...
    Downloads: 7 This Week
    Last Update:
    See Project
  • Your go-to FinOps platform Icon
    Your go-to FinOps platform

    Analyze, optimize, and govern your multi-cloud environment effortlessly with AI Agentic FinOps.

    Unlike reporting-only FinOps tools, FinOpsly unifies cloud (AWS, Azure, GCP), data (Snowflake, Databricks, BigQuery), and AI costs into a single system of action — enabling teams to plan spend before it happens, automate optimization safely, and prove value in weeks, not quarters.
    Learn More
  • 5
    UACMe

    UACMe

    Defeating Windows user account control

    ...The second parameter can be empty - in this case, the program will execute elevated cmd.exe from the system32 folder. Since 3.5.0 version all "fixed" methods are considered obsolete and removed altogether with all supporting code/units. If you still need them. This tool shows ONLY popular UAC bypass method used by malware, and re-implement some of them in a different way improving original concepts. There are different, not yet known to the general public, methods. This tool is not intended for AV tests and not tested to work in aggressive AV environment, if you still plan to use it with installed bloatware AV soft, use it at your own risk.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    Lantern

    Lantern

    Tool to access videos, messaging, and other popular apps

    Can't access your favorite apps? Download Lantern to easily access videos, messaging, and other popular apps while at school or work. Lantern is an application that allows you to bypass firewalls to use your favorite applications and access your favorite websites. Lantern does not cooperate with any law enforcement in any country. Lantern encrypts all of your traffic to blocked sites and services to protect your data and privacy. Lantern passed multiple third party white box security audits...
    Downloads: 29 This Week
    Last Update:
    See Project
  • 7
    Dialyxir

    Dialyxir

    Mix tasks to simplify use of Dialyzer in Elixir projects

    Mix tasks to simplify use of Dialyzer in Elixir projects. Elixir 1.6 is required, to support the new pretty printing feature. If your project is not yet on 1.6, continue to specify 0.5 in your mix deps. Warning messages have been greatly improved, but are filtered through the legacy formatter to support your existing ignore files. You can optionally use the new Elixir term format for ignore files. You may want to use the --format short argument in your CI pipelines. There are several...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 8
    NSmartProxy

    NSmartProxy

    NSmartProxy is an open source reverse proxy tool

    NSmartProxy is a reverse proxy system that enables external access to devices or applications behind NAT/firewalls without requiring public IPs or router configuration. It’s designed to work with desktop and server apps, and includes a centralized SmartNode server that helps initiate and maintain tunnel connections. This makes it ideal for remote access to local services or self-hosted applications. NSmartProxy supports both TCP and UDP protocols, making it versatile for a wide range of...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Nipe

    Nipe

    An engine to make Tor network your default gateway

    Nipe is a Perl-based engine whose primary aim is to make the Tor network act as the default gateway for outgoing traffic. In practice, it configures system firewall rules (iptables) and network routing so that almost all IPv4 traffic is redirected through Tor. The tool provides commands such as install, start, stop, restart, and status to manage its behavior. When “start” is issued, it sets up the necessary rules; when “stop” is used, it attempts to remove those rules. Nipe currently operates over IPv4 and does not yet support IPv6, meaning that users with IPv6 connectivity may bypass Tor routing. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • Loan business software for any kind of loan Icon
    Loan business software for any kind of loan

    For established lenders, loan-granting scaleups and credit startups.

    CreditOnline is an end-to-end integrated loan business management platform helping organizations connect and integrate all relevant parties in a state-of-art lending ecosystem that supports any kind of loan or lending segment. Our future-proof lending technology and partnerships render it simple, fast and cost-effective to expand the portfolio of your services and number of your clients, allowing your business to scale up or reinvigorate itself effectively at any stage of the business life-cycle.
    Learn More
  • 10
    Th3inspector

    Th3inspector

    Best Tool For Information Gathering

    Th3Inspector is a Perl- and shell-based, all-in-one information-gathering toolkit built to quickly enumerate public and semi-public data about targets (domains, IPs, phone numbers, mail servers, etc.). It exposes a single command-line entrypoint (Th3inspector.pl) with many switches for common reconnaissance tasks — examples include website info, whois, MX lookup, geo-IP, subdomain discovery, CMS detection, port scanning, and Cloudflare real-IP resolution — so a user can chain many checks...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11
    CF-Workers-docker.io

    CF-Workers-docker.io

    Docker Warehouse Image Proxy Tool

    CF-Workers-docker.io is a project by cmliu that sets up a proxy for Docker Hub (and potentially other container image registries) using Cloudflare Workers, effectively acting as a middle-man mirror to improve image pull reliability and speed in regions where direct access is degraded. The idea is to intercept registry requests, reroute or mirror them through a worker endpoint, and therefore bypass regional limitations or firewall blocks affecting official Docker registries. Users can deploy...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Geodesic

    Geodesic

    Geodesic is a DevOps Linux Toolbox in Docker

    Geodesic is a robust Linux toolbox container, crafted to optimize DevOps workflows. This container comes fully loaded with all essential dependencies for a complete DevOps toolchain. It's designed to bring consistency and boost efficiency across development environments. It achieves this without the need for installing additional software on your workstation. Think of Geodesic as a containerized parallel to Vagrant, offering similar functionality within a Docker container context.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Modlishka

    Modlishka

    Powerful and flexible HTTP reverse proxy

    Modlishka is a powerful and flexible HTTP reverse proxy. It implements an entirely new and interesting approach of handling browser-based HTTP traffic flow, which allows to transparently proxy of multi-domain destination traffic, both TLS and non-TLS, over a single domain, without the requirement of installing any additional certificate on the client. What exactly does this mean? In short, it simply has a lot of potential, that can be used in many use case scenarios. Modlishka was written as...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    BypassHash

    BypassHash

    This tool downloads an executable and bypasses hash-based virus checks

    This tool downloads an executable, ELF (Linux) and PE (Windows), modify metadata to bypasses hash-based virus checks and protect against identification with metadata (like rich headers, timestamps, ...).
    Downloads: 9 This Week
    Last Update:
    See Project
  • 15
    cleanvideo-cli

    cleanvideo-cli

    CLI tool for removing watermarks from AI-generated videos using frame-

    ...Note: This tool does not bypass platform restrictions and should be used only on content you own or have the rights to use.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    HWID Spoofer - Hardware ID Changer

    HWID Spoofer - Hardware ID Changer

    The best HWID Spoofer in 2025.

    TraceX is a powerful and advanced HWID Spoofer designed to bypass anti-cheat systems in games like Valorant, Apex Legends, Warzone, Fortnite, and more. It spoofs critical system identifiers such as disk serials, MAC addresses, BIOS UUIDs, motherboard and GPU IDs, and even EFI boot variables. This HWID Spoofer also includes a full system cleaner that removes traces of game activity, browser data, event logs, Xbox and Discord accounts, and network fingerprints. With deep spoofing of CPU,...
    Leader badge">
    Downloads: 1,820 This Week
    Last Update:
    See Project
  • 17
    tls SNI injector + VPNGate Free Server

    tls SNI injector + VPNGate Free Server

    VPN 4G ssl/tls sni VPNGate CN/RU/JP/UK..

    TCP Over SSL Tunnel TCP Over SSL Tunnel is a free SSL tool with SNI Host (Spoof Host) support ( SSL Injector ). VPN client 4G ssl/tls sni + SoftEther + VPNGate CN/RU/JP/UK.. Sibling project https://tunnelsmux.great-site.net/?i=1 🚀 Free VPNGate + SNI Customization 🛡️ One of the most powerful censorship bypass tools ever shared 🌍 Works globally — optimized for Vietnam, Iran, and more 💡 Try it today and experience real freedom!
    Leader badge">
    Downloads: 46 This Week
    Last Update:
    See Project
  • 18
    tls SNI injector + Psiphon Free Server

    tls SNI injector + Psiphon Free Server

    VPN 4G ssl/tls sni Psiphon CN/RU/JP/UK..

    TCP Over SSL Tunnel TCP Over SSL Tunnel is a free SSL tool with SNI Host (Spoof Host) support ( SSL Injector ). 🔧 Máy chủ Psiphon3 miễn phí có hỗ trợ SNI tùy chỉnh và meek proxy ✅ Dùng để vượt tường lửa, kiểm duyệt mạng ⚙️ Cấu hình chuyên nghiệp, phù hợp với kỹ thuật viên và người yêu công nghệ 📡 Không cần root, không quảng cáo, hoạt động ổn định. 🚀 Free Psiphon3 + SNI Customization and meek proxy 🛡️ One of the most powerful censorship bypass tools ever shared 🌍 Works globally — optimized for Vietnam, Iran, and more 💡 Try it today and experience real freedom! ...
    Downloads: 20 This Week
    Last Update:
    See Project
  • 19
    Unshackle

    Unshackle

    Tool to bypass windows and linux passwords from bootable USB

    Unshackle is an open-source tool to bypass Windows and Linux user passwords from a bootable USB based on Linux. Open-source tool to bypass windows and Linux passwords from bootable USB.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    ChatGPT Proxy

    ChatGPT Proxy

    Simple Cloudflare bypass for ChatGPT

    ChatGPTProxy is an open-source project that creates a lightweight proxy server to intermediate between client applications and the ChatGPT web endpoints, allowing developers to integrate ChatGPT-style functionality into their software without using an official API or embedding web UI code directly. This tool works by accepting requests in a defined format, forwarding them through the proxy to ChatGPT’s backend services, and returning responses to the caller, abstracting away direct browser...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21

    OTP-Crypto-Tool

    Symetric file encryption based on OTP implemented as XOR encryption

    OTP (One Time Pad) In case you have any questions, contact me at: crypto-munition@gmx.de When used correctly, the OTP is an information-theoretically secure and demonstrably non-breakable encryption. The encryption process is implemented as symmetrical file encryption based on XOR encryption. The integrated pseudo-random generator serves only to illustrate and check the functionality. The use of this generator for REAL OTPs is not recommended. For REAL OTPs, hardware-based key generators...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    youtube-dl

    youtube-dl

    Download videos from YouTube (and more sites)

    youtube-dl is a command-line program to download videos from YouTube and a few more sites. It requires the Python interpreter (2.6, 2.7, or 3.2+), and it is not platform specific. We also provide a Windows executable that includes Python. youtube-dl should work in your Unix box, in Windows or in Mac OS X. It is released to the public domain, which means you can modify it, redistribute it or use it however you like. youtube-dl is a powerful, open-source command-line program designed to...
    Downloads: 205 This Week
    Last Update:
    See Project
  • 23

    OTP-Chat

    OTP-Chat (client / server) YOUR PC is both client and server!

    ...When used correctly, the OTP is an information-theoretically secure and demonstrably non-breakable encryption. By using an OTP-based key on both, the sender and recipient side, eavesdropping on chat communication, in terms of information theory, is impossible to poop. Correct use of the OTP is important. Details can be found in my project OPT-Crypto-Tool under Sourceforge.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    PyExfil

    PyExfil

    A Python Package for Data Exfiltration

    ...In my eyes it’s still a messy PoC that needs a lot more work and testing to become stable. The purpose of PyExfil is to set as many exfiltrations, and now also communication, techniques that CAN be used by various threat actors/malware around to bypass various detection and mitigation tools and techniques. You can track changes at the official GitHub page. Putting it simply, it’s meant to be used as a testing tool rather than an actual Red Teaming tool. Although most techniques and methods should be easily ported and compiled to various operating systems, some stable some experimental, the transmission mechanism should be stable on all techniques. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Bilibili Helper

    Bilibili Helper

    Auxiliary tool that can replace the player, push notifications, etc.

    Bilibili (bilibili.com) Auxiliary tool that can replace the player, push notifications and perform some shortcut operations. Bilibili (bilibili.com) is an auxiliary tool that can download videos, query the sender of the barrage, and some very useful live broadcast area functions. An auxiliary extension for Bilibili (bilibili.com) which allows users to bypass playback restrictions, replace video players and use shortcuts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next