[go: up one dir, main page]

Showing 60 open source projects for "lg bypass tool"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Boon: The Agile Referral Hiring Platform Icon
    Boon: The Agile Referral Hiring Platform

    Tap your entire community to hire better talent, faster

    Boon's agile referral platform expands your recruiting power 
through AI, automation, integrations, and gamification.
    Learn More
  • 1
    Survey Bypass Tool

    Survey Bypass Tool

    Free Download Survey Remover Tool

    ...Sometimes, they even ask for your personal information, which can compromise your privacy and security. If you are tired of filling out online surveys, you might be looking for a survey bypasser tool that can help you skip them easily. This is one of the best online websites to bypass online surveys. It supports all common survey providers like FileIce, ShareCash, CPALead, etc. To use it, you just need to copy and paste the URL of the website where you want to bypass the survey in the URL box of Bypass Survey website. It also offers some other options like allowing cookies, removing scripts, encrypting page, etc.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 2
    Zapret

    Zapret

    Advanced open source tool for bypassing DPI-based censorship

    Zapret is an open source, cross-platform tool designed to help users bypass and evade Deep Packet Inspection (DPI)-based traffic blocking and censorship systems. Rather than acting as a traditional proxy or VPN, it works by manipulating network packets and traffic streams locally to confuse or disrupt DPI mechanisms used by ISPs and network filters, making it possible to access restricted websites and services without relaying traffic through third-party servers.
    Downloads: 1,131 This Week
    Last Update:
    See Project
  • 3
    Go Cursor Help

    Go Cursor Help

    Cursor Free Trial Reset Tool

    A small CLI utility written in Go to reset free trial restrictions of the Cursor AI code assistant on local machines. It automates machine‑ID resets and environment cleanups so users can bypass "Too many free trial accounts" limitations across platforms.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    UACMe

    UACMe

    Defeating Windows user account control

    ...The second parameter can be empty - in this case, the program will execute elevated cmd.exe from the system32 folder. Since 3.5.0 version all "fixed" methods are considered obsolete and removed altogether with all supporting code/units. If you still need them. This tool shows ONLY popular UAC bypass method used by malware, and re-implement some of them in a different way improving original concepts. There are different, not yet known to the general public, methods. This tool is not intended for AV tests and not tested to work in aggressive AV environment, if you still plan to use it with installed bloatware AV soft, use it at your own risk.
    Downloads: 5 This Week
    Last Update:
    See Project
  • The all-in-one Omnichannel Experience Management Platform Icon
    The all-in-one Omnichannel Experience Management Platform

    Do more than just Surveys.

    Build conversational surveys of any type, for any purpose, in any language. Get 40% more responses.
    Learn More
  • 5
    Lantern

    Lantern

    Tool to access videos, messaging, and other popular apps

    Can't access your favorite apps? Download Lantern to easily access videos, messaging, and other popular apps while at school or work. Lantern is an application that allows you to bypass firewalls to use your favorite applications and access your favorite websites. Lantern does not cooperate with any law enforcement in any country. Lantern encrypts all of your traffic to blocked sites and services to protect your data and privacy. Lantern passed multiple third party white box security audits...
    Downloads: 29 This Week
    Last Update:
    See Project
  • 6
    Kubernetes Goat

    Kubernetes Goat

    Kubernetes Goat is a "Vulnerable by Design" cluster environment

    Learn to attack or find security issues, misconfigurations, and real-world hacks within containers, Kubernetes, and cloud-native environments. Enumerate, exploit, and gain access to the workloads right from your browser. Understand how attackers think, work, and exploit security issues, and apply these learnings to detect and defend them. Also, learn best practices, defenses, and tools to mitigate, and detect in the real world. Learn the hacks, defenses, and tools. So that you can think like...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 7
    NSmartProxy

    NSmartProxy

    NSmartProxy is an open source reverse proxy tool

    NSmartProxy is a reverse proxy system that enables external access to devices or applications behind NAT/firewalls without requiring public IPs or router configuration. It’s designed to work with desktop and server apps, and includes a centralized SmartNode server that helps initiate and maintain tunnel connections. This makes it ideal for remote access to local services or self-hosted applications. NSmartProxy supports both TCP and UDP protocols, making it versatile for a wide range of...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Nipe

    Nipe

    An engine to make Tor network your default gateway

    Nipe is a Perl-based engine whose primary aim is to make the Tor network act as the default gateway for outgoing traffic. In practice, it configures system firewall rules (iptables) and network routing so that almost all IPv4 traffic is redirected through Tor. The tool provides commands such as install, start, stop, restart, and status to manage its behavior. When “start” is issued, it sets up the necessary rules; when “stop” is used, it attempts to remove those rules. Nipe currently operates over IPv4 and does not yet support IPv6, meaning that users with IPv6 connectivity may bypass Tor routing. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9
    LFIMap

    LFIMap

    Advanced LFI Exploitation Tool

    A Advanced LFI Exploitation Tool offer Bypass WAF and Plugins and support Large of LFI Technique and scan customization and user friendly
    Downloads: 0 This Week
    Last Update:
    See Project
  • Powerful Website Security | Continuous Web Threat Platform Icon
    Powerful Website Security | Continuous Web Threat Platform

    Continuously detect, prioritize, and validate web threats to quickly mitigate security, privacy, and compliance risks.

    Reflectiz is a comprehensive web exposure management platform that helps organizations proactively identify, monitor, and mitigate security, privacy, and compliance risks across their online environments. Designed to address the growing complexity of modern websites, Reflectiz provides full visibility and control over first, third, and even fourth-party components, such as scripts, trackers, and open-source libraries that often evade traditional security tools.
    Learn More
  • 10
    Th3inspector

    Th3inspector

    Best Tool For Information Gathering

    Th3Inspector is a Perl- and shell-based, all-in-one information-gathering toolkit built to quickly enumerate public and semi-public data about targets (domains, IPs, phone numbers, mail servers, etc.). It exposes a single command-line entrypoint (Th3inspector.pl) with many switches for common reconnaissance tasks — examples include website info, whois, MX lookup, geo-IP, subdomain discovery, CMS detection, port scanning, and Cloudflare real-IP resolution — so a user can chain many checks...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11
    CF-Workers-docker.io

    CF-Workers-docker.io

    Docker Warehouse Image Proxy Tool

    CF-Workers-docker.io is a project by cmliu that sets up a proxy for Docker Hub (and potentially other container image registries) using Cloudflare Workers, effectively acting as a middle-man mirror to improve image pull reliability and speed in regions where direct access is degraded. The idea is to intercept registry requests, reroute or mirror them through a worker endpoint, and therefore bypass regional limitations or firewall blocks affecting official Docker registries. Users can deploy...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Geodesic

    Geodesic

    Geodesic is a DevOps Linux Toolbox in Docker

    Geodesic is a robust Linux toolbox container, crafted to optimize DevOps workflows. This container comes fully loaded with all essential dependencies for a complete DevOps toolchain. It's designed to bring consistency and boost efficiency across development environments. It achieves this without the need for installing additional software on your workstation. Think of Geodesic as a containerized parallel to Vagrant, offering similar functionality within a Docker container context.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Modlishka

    Modlishka

    Powerful and flexible HTTP reverse proxy

    Modlishka is a powerful and flexible HTTP reverse proxy. It implements an entirely new and interesting approach of handling browser-based HTTP traffic flow, which allows to transparently proxy of multi-domain destination traffic, both TLS and non-TLS, over a single domain, without the requirement of installing any additional certificate on the client. What exactly does this mean? In short, it simply has a lot of potential, that can be used in many use case scenarios. Modlishka was written as...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    BypassHash

    BypassHash

    This tool downloads an executable and bypasses hash-based virus checks

    This tool downloads an executable, ELF (Linux) and PE (Windows), modify metadata to bypasses hash-based virus checks and protect against identification with metadata (like rich headers, timestamps, ...).
    Downloads: 9 This Week
    Last Update:
    See Project
  • 15
    Fadeboard

    Fadeboard

    Android Keyboard transforms simple letters into special characters

    FadeBoard is a niche Android keyboard that converts typed text into special Unicode characters—designed to circumvent basic text filters and content restrictions. It provides a playful tool to make messages less detectable by simplistic moderation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    cleanvideo-cli

    cleanvideo-cli

    CLI tool for removing watermarks from AI-generated videos using frame-

    ...Note: This tool does not bypass platform restrictions and should be used only on content you own or have the rights to use.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    QUAST

    QUAST

    Quality Assessment Tool for Genome Assemblies

    ...QUAST computes several well-known metrics, including contig accuracy, the number of genes discovered, N50, and others, as well as introducing new ones, like NA50 (see details in the paper and manual). A comprehensive analysis results in summary tables (in plain text, tab-separated, and LaTeX formats) and colorful plots. The tool also produces web-based reports condensing all information in one easy-to-navigate file. QUAST and its three follow-up papers (MetaQUAST, Icarus, QUAST-LG) papers were published in Bioinformatics; the last paper (WebQUAST) is out in Nucl Acid Research.
    Leader badge">
    Downloads: 25 This Week
    Last Update:
    See Project
  • 18
    HWID Spoofer - Hardware ID Changer

    HWID Spoofer - Hardware ID Changer

    The best HWID Spoofer in 2025.

    TraceX is a powerful and advanced HWID Spoofer designed to bypass anti-cheat systems in games like Valorant, Apex Legends, Warzone, Fortnite, and more. It spoofs critical system identifiers such as disk serials, MAC addresses, BIOS UUIDs, motherboard and GPU IDs, and even EFI boot variables. This HWID Spoofer also includes a full system cleaner that removes traces of game activity, browser data, event logs, Xbox and Discord accounts, and network fingerprints. With deep spoofing of CPU,...
    Leader badge">
    Downloads: 1,820 This Week
    Last Update:
    See Project
  • 19
    tls SNI injector + VPNGate Free Server

    tls SNI injector + VPNGate Free Server

    VPN 4G ssl/tls sni VPNGate CN/RU/JP/UK..

    TCP Over SSL Tunnel TCP Over SSL Tunnel is a free SSL tool with SNI Host (Spoof Host) support ( SSL Injector ). VPN client 4G ssl/tls sni + SoftEther + VPNGate CN/RU/JP/UK.. Sibling project https://tunnelsmux.great-site.net/?i=1 🚀 Free VPNGate + SNI Customization 🛡️ One of the most powerful censorship bypass tools ever shared 🌍 Works globally — optimized for Vietnam, Iran, and more 💡 Try it today and experience real freedom!
    Leader badge">
    Downloads: 46 This Week
    Last Update:
    See Project
  • 20
    tls SNI injector + Psiphon Free Server

    tls SNI injector + Psiphon Free Server

    VPN 4G ssl/tls sni Psiphon CN/RU/JP/UK..

    TCP Over SSL Tunnel TCP Over SSL Tunnel is a free SSL tool with SNI Host (Spoof Host) support ( SSL Injector ). 🔧 Máy chủ Psiphon3 miễn phí có hỗ trợ SNI tùy chỉnh và meek proxy ✅ Dùng để vượt tường lửa, kiểm duyệt mạng ⚙️ Cấu hình chuyên nghiệp, phù hợp với kỹ thuật viên và người yêu công nghệ 📡 Không cần root, không quảng cáo, hoạt động ổn định. 🚀 Free Psiphon3 + SNI Customization and meek proxy 🛡️ One of the most powerful censorship bypass tools ever shared 🌍 Works globally — optimized for Vietnam, Iran, and more 💡 Try it today and experience real freedom! ...
    Downloads: 20 This Week
    Last Update:
    See Project
  • 21
    Unshackle

    Unshackle

    Tool to bypass windows and linux passwords from bootable USB

    Unshackle is an open-source tool to bypass Windows and Linux user passwords from a bootable USB based on Linux. Open-source tool to bypass windows and Linux passwords from bootable USB.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    ChatGPT Proxy

    ChatGPT Proxy

    Simple Cloudflare bypass for ChatGPT

    ChatGPTProxy is an open-source project that creates a lightweight proxy server to intermediate between client applications and the ChatGPT web endpoints, allowing developers to integrate ChatGPT-style functionality into their software without using an official API or embedding web UI code directly. This tool works by accepting requests in a defined format, forwarding them through the proxy to ChatGPT’s backend services, and returning responses to the caller, abstracting away direct browser...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23

    Burdjia Cypher

    Simple cypher tool.

    Simple cypher tool to bypass Google's file bans for some compression and executable formats. This is a personal tool that may be useful for somebody else. DO NOT USE TO PROTECT DATA.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    youtube-dl

    youtube-dl

    Download videos from YouTube (and more sites)

    youtube-dl is a command-line program to download videos from YouTube and a few more sites. It requires the Python interpreter (2.6, 2.7, or 3.2+), and it is not platform specific. We also provide a Windows executable that includes Python. youtube-dl should work in your Unix box, in Windows or in Mac OS X. It is released to the public domain, which means you can modify it, redistribute it or use it however you like. youtube-dl is a powerful, open-source command-line program designed to...
    Downloads: 205 This Week
    Last Update:
    See Project
  • 25
    PyExfil

    PyExfil

    A Python Package for Data Exfiltration

    ...In my eyes it’s still a messy PoC that needs a lot more work and testing to become stable. The purpose of PyExfil is to set as many exfiltrations, and now also communication, techniques that CAN be used by various threat actors/malware around to bypass various detection and mitigation tools and techniques. You can track changes at the official GitHub page. Putting it simply, it’s meant to be used as a testing tool rather than an actual Red Teaming tool. Although most techniques and methods should be easily ported and compiled to various operating systems, some stable some experimental, the transmission mechanism should be stable on all techniques. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next