Search Results for "cyber attack////////////////"

4 projects for "cyber attack////////////////" with 1 filter applied:

  • SalesTarget.ai | AI-Powered Lead Generation, Email Outreach, and CRM Icon
    SalesTarget.ai | AI-Powered Lead Generation, Email Outreach, and CRM

    SalesTarget.ai streamlines your sales process, providing everything you need to find high- quality leads, automate outreach, and close deals faster

    SalesTarget is ideal for B2B sales teams, startup founders, and marketing professionals looking to streamline lead generation and outreach. It also benefits growing SaaS companies and agencies aiming to scale their outbound efforts efficiently.
    Learn More
  • Securden Windows Privilege Manager Icon
    Securden Windows Privilege Manager

    For IT security teams

    Remove local administrator rights on Windows servers and endpoints. Seamlessly elevate applications for standard users. Grant time-limited rights on-demand. Control application usage by remote employees through whitelisting and blacklisting.
    Learn More
  • 1
    Adaptive Intelligence

    Adaptive Intelligence

    Adaptive Intelligence also known as "Artificial General Intelligence"

    Adaptive Intelligence is the implementation of neural science, forensic psychology , behavioral science with machine-learning and artificial intelligence to provide advanced automated software platforms with the ability to adjust and thrive in dynamic environments by combining cognitive flexibility, emotional regulation, resilience, and practical problem-solving skills.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Kubesploit

    Kubesploit

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command

    ...While researching Docker and Kubernetes, we noticed that most of the tools available today are aimed at passive scanning for vulnerabilities in the cluster, and there is a lack of more complex attack vector coverage. They might allow you to see the problem but not exploit it. It is important to run the exploit to simulate a real-world attack that will be used to determine corporate resilience across the network. When running an exploit, it will practice the organization's cyber event management, which doesn't happen when scanning for cluster issues. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    The Cyber Hordes is a single or multi-player RTS game where each player builds robots and gives them various components (weapons etc..) and then general orders (e.g. Attack), which the AI of the robot will attempt to complete on its own.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Quick-Safe

    Quick-Safe

    Generate strong and secure passwords with QuickSafe ,

    QuickSafe is an open-source password generator designed to bolster online security by generating robust and secure passwords. This project addresses the growing need for enhanced password strength in the face of escalating cyber threats. QuickSafe empowers users to create highly secure passwords through a diverse character set, including uppercase and lowercase letters, numbers, symbols, and more. With the increasing frequency of online security breaches, having a reliable password generator...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Create stunning, professional email signatures in minutes Icon
    Create stunning, professional email signatures in minutes

    For companies looking to create, assign and manage all their employees email signatures and add targeted marketing banners.

    Create, assign and manage all your employees’ email signatures and add targeted marketing banners. Stop getting worked up about your signatures! Leverage a centralized interface to easily create and manage the email signatures of all your employees. Take advantage of each email to broadcast and amplify your brand. Letsignit helps you regain control over your digital identity. Harmonize 100% of your employee’s email signatures in just a few clicks! 121 professional emails are received and 40 are sent every day by an employee. With Letsignit, turn every email into a powerful communication opportunity: send the right message to the right person at the right time! Innovative more than tech, inspiring more than following. Authentic more than overrated, close more than "think big", trustworthy more than doubtful. Hands-on more than complex, available but yet premium, fun but yet expert.
    Learn More
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB