Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files" - Page 27

Showing 2108 open source projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

View related business solutions
  • Cybersecurity Starts With Password Security. Icon
    Cybersecurity Starts With Password Security.

    Keeper is the top-rated password manager for protecting you, your family and your business from password-related data breaches and cyberthreats.

    Research shows that a whopping 81% of data breaches are due to weak or stolen passwords. Business password managers provide an affordable and simple way for companies to solve the single biggest root cause of most data breaches. By implementing Keeper, your business is significantly reducing the risk of a data breach.
    Get Started
  • Create stunning, professional email signatures in minutes Icon
    Create stunning, professional email signatures in minutes

    For companies looking to create, assign and manage all their employees email signatures and add targeted marketing banners.

    Create, assign and manage all your employees’ email signatures and add targeted marketing banners. Stop getting worked up about your signatures! Leverage a centralized interface to easily create and manage the email signatures of all your employees. Take advantage of each email to broadcast and amplify your brand. Letsignit helps you regain control over your digital identity. Harmonize 100% of your employee’s email signatures in just a few clicks! 121 professional emails are received and 40 are sent every day by an employee. With Letsignit, turn every email into a powerful communication opportunity: send the right message to the right person at the right time! Innovative more than tech, inspiring more than following. Authentic more than overrated, close more than "think big", trustworthy more than doubtful. Hands-on more than complex, available but yet premium, fun but yet expert.
    Learn More
  • 1

    Cryptos Encoder

    Encryption and decryption

    Encryption and decryption of files using bit noise superposition and permutation with multiplication from version 2.2.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Secure File Vault

    Secure File Vault

    A very secure file vault for private files to avoid hackers

    A File vault to store all of your personal items, this file vault could not be brute forced (impossible because of the hashing algorithms). It uses a combination of veracrypt, winrar, 7zip to encrypt your files to ensure that they are secure and not be seen by someone. Once you start to create the file vault, your password gets hashed a million times (only takes 3 seconds) then base 64 3 times and hashed 1 more time, it uses a combination of SHA256, SHA512 and lot of other secret algorithms to make it really secure. This program also have voices for people that have trouble seeing the screen. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Terminal File Encrypter

    Command Line File Encrypter / Decrypter, Using AES256-CBC Cryptography

    Command Line File Encrypter / Decrypter, Using AES256-CBC Cryptography Python 3.x Or Higher Required Requires To Be Installed - Open CMD / Terminal window, navigate to folder with the encrypter files. Type "pip3 install Setup.py" without quotes. Read Syntax (Readme).txt file for instructions on use. To Uninstall - Open CMD / Terminal window, first type "pip3 list" without quotes. You Should See Terminal File Encrypter listed. Please Note pip3 may list the name differently for example it may have underscores, etc in the name. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    NetCutter

    NetCutter

    Control your Network by Disconnect/Connected Devices from your router

    NetCutter is a Powerful Program working on Wi-Fi,it Disconnect And Reconnect Connected Devices by Cutting ON/OFF Network from Choosen Interfaces and protect your network from hackers. NetCutter is Just For Windows now, Support the project for Android Port This Program is in Early Stages , So bugs will appear feel free to Contact us to fix it. Thanks. * Download Requirements To install this Program you need : - .NET Framework 4.0 or Higher - WinPcap 4.1.3 For WinXP,WinVista - Npcap 0.99 For Win7,Win8,8.1,10
    Leader badge
    Downloads: 8 This Week
    Last Update:
    See Project
  • The top-rated AI recruiting platform for faster, smarter hiring. Icon
    The top-rated AI recruiting platform for faster, smarter hiring.

    Humanly is an AI recruiting platform that automates candidate conversations, screening, and scheduling.

    Humanly is an AI-first recruiting platform that helps talent teams hire in days, not months—without adding headcount. Our intuitive CRM pairs with powerful agentic AI to engage and screen every candidate instantly, surfacing top talent fast. Built on insights from over 4 million candidate interactions, Humanly delivers speed, structure, and consistency at scale—engaging 100% of interested candidates and driving pipeline growth through targeted outreach and smart re-engagement. We integrate seamlessly with all major ATSs to reduce manual work, improve data flow, and enhance recruiter efficiency and candidate experience. Independent audits ensure our AI remains fair and bias-free, so you can hire confidently.
    Learn More
  • 5

    CKK Encryption

    Fast and unbreakable encryption

    Any comments or question should be directed to the Discussion section of this website. I'll respond to any post directed there. Still in alpha stage. We take a file/stream and break it down to 8bit ASCII "0-255" values. We then take those values and combine with individual 8bit ASCII values of the password/pass phrase. We loop thru the file combining 1 byte with 1 byte from "password phrase" in a continuous loop. We then write all odd results then even results to a file, array or string "your choice". I'm not a mathematician "not even sure what they are" but I think the results equal n exp 256 + n exp 256 + n exp 256 * n exp 2,147,483,647. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Pharos

    Pharos

    RTOS for Secure, Safe and Real-Time Systems

    Pharos is a free open-source RTOS for secure, safe and real-time systems with the following characteristics: - Memory and enhanced time partitioning (TSP) - Native support for sporadic, periodic and aperiodic threads - Fixed-priority preemptive scheduler - Execution time protection (threads are prevented from executing for more time than they are configured to) - Small size (full image has ~100 to 300KiB text, ~30KiB data) - Hard real-time determinism - Fast critical sections - Prioritized nested interrupts - inter-partition communication with filters to protect unwanted access - Multicore support (RMP) - Supports ARM9, Cortex-A/R/M and Aarch64, RISC-V64 (64 bits) - The complete TestSuite (see below information) is run successfully for each platform in each release - Tested: more than 170 KLOC of requirement-based tests, executed for each board at each release - Up-to-date User Manual also available See our wiki page for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    xorenc

    xorenc

    A "XOR-based" data encryption tool.

    It performs simple XOR operation on files from a given key or by generating data from a given short password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    BitShade

    BitShade

    AES Cipher, Base64 encoder, SHA calculator

    BitShade is a graphic utility to encrypt/decrypt with AES, base64 encode/decode, calculate the SHA checksum. It is cross platform, written in Java.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    AttackSurfaceMapper

    AttackSurfaceMapper

    Automated tool for mapping & expanding organization’s attack surface

    AttackSurfaceMapper (ASM) is a reconnaissance and attack surface discovery tool designed to automate the process of mapping potential targets within an organization's infrastructure. It combines open source intelligence (OSINT) with selective active reconnaissance techniques to expand and analyze a target’s external attack surface. Users can supply domains, subdomains, or IP addresses as input, and applies multiple discovery methods to identify additional related assets such as new...
    Downloads: 4 This Week
    Last Update:
    See Project
  • Run your private office with the ONLYOFFICE Icon
    Run your private office with the ONLYOFFICE

    Secure office and productivity apps

    A Comprehensive Alternative to Office 365 for Business
    Learn More
  • 10

    FileCrypt

    Android application to do AES-128 bit encryption on all types of files

    This is an android application able to perform AES-128 bit encryption on all types of files. Its tested encryption speed for 1080 HD video on android device is 3.43 MB per second, and decryption speed is 6.25 MB per second for android device with 3 GB RAM and MT6735 Quad-core 1.3 GHz CPU.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    DDOSER

    DDOSER

    Machine that can DDOS servers

    ...Thanks to _FoZa_ for reporting me that error! Congrats! LOG 1: That won`t fixed anything so i needed to make another version LOG 2: Fixed :) That made my program which converts files. Now it`s ok. [2 April Patch] New Features: - Better Color! Black and Yellow! - Select how much packets you want to send - File is 3.6kB Larger...
    Downloads: 72 This Week
    Last Update:
    See Project
  • 12
    JPasswords

    JPasswords

    Java password management tool

    User-friendly and proficient Java program to keep passwords in encrypted databases. High security standard and data safety measures. Storage of huge text documents and sets of images feasible. File format relies on "Password Safe" V3 files (Twofish-CBC). Compact cross-platform program with PORTABLE modus, ideal for USB sticks, Linux, Mac, etc. Requires Java JRE 1.8 or higher The Password Safe database library is available at project PWSLIB3.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    CloseTheDoor
    CloseTheDoor indentifies all the listening ports TCP/UDP over IPv4/v6 and the associated program files. This will help you to detect security holes and close backdoors when you want to prevent remote attacks.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 14
    GnuTLS

    GnuTLS

    Mirror of official gnutls repository

    GnuTLS is an open-source secure communications library designed to implement cryptographic protocols such as TLS, SSL, and DTLS for protecting data transmitted over networks. Developed as part of the GNU Project, it provides a robust framework for building secure client-server applications and services that require encrypted communication channels. The library includes implementations of widely used security standards and supports modern encryption algorithms, authentication mechanisms, and certificate management features. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Wayne

    Wayne

    Kubernetes multi-cluster management and publishing platform

    Wayne is a universal, web-based Kubernetes multi-cluster management platform. It reduces service access costs by visualizing Kubernetes object template editing. With a complete permission management system and adapting to multi-tenant scenarios, it is a publishing platform suitable for enterprise-level clusters. Wayne has been serving 360 search on a large scale, carrying most of the online services, stably managing nearly a thousand applications, and tens of thousands of containers, running...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    respite vpn - ssh & openvpn injector

    respite vpn - ssh & openvpn injector

    Bypass your ISP's firewalls and connect to the internet!

    Source: https://github.com/AlizerUncaged/HTTP-Injector respite is a SSH/openVPN client that allows you to connect to the internet with custom injected HTTP Proxy headers. This application requires Java (https://www.java.com/en/download/) and .Net 4.5 (https://www.microsoft.com/en-ph/download/details.aspx?id=42642 .Net 4.5 is already preinstalled in Windows 10). There are many SSH and OpenVPN Server providers in the internet, one is https://www.tcpvpn.com HTTP Proxy responses...
    Downloads: 59 This Week
    Last Update:
    See Project
  • 17
    horcrux

    horcrux

    Split your file into encrypted fragments

    ...The tool provides a “split” command to create the fragments and a “bind” command to recombine them to the original file. It’s especially aimed at people who want strong security for sensitive large files and want to avoid remembering complex pass-codes, and also those who may distribute fragments across multiple locations. The logic is built on Go’s crypto libraries and the underlying Shamir implementation, with an emphasis on simplicity and security rather than password-based keying.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18
    Codex - Password Manager

    Codex - Password Manager

    Administrador de contraseñas para todas sus cuentas. Fácil y seguro.

    Codex nació para una presentación final de OOP. La idea principal es diseñar una forma fácil y segura de administrar sus cuentas web, con herramientas como ezLink y copiar / pegar doble clic hace que su fecha sea más segura de usar, ver y guardar. Está hecho en C ++ y se actualizará pronto para la gestión web y más.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    ISP UNLOCKER

    ISP UNLOCKER

    Unlock Your ISP and access all your restricted websites

    Main Functions Links to official domain names only Users can visit linked sites or enter there on sites Easy and user-friendly interface All data is encrypted over the network Non-installer runs from CD HDD or USB Pen Auto updates System requirements Windows 7 SP1 (x86 and x64) Windows 8 (x86 and x64) Windows 8.1 (x86 and x64) Windows 10 (x86 and x64) .NET Framework 4.6.1 Requires Administrator Privileges Processor Intel or AMD x86 or 64 bit 1 GHz or faster processor 1GB of RAM At least 100 megabytes (MB) available space on the hard disk An active internet connection We have set a few website restrictions within the app for security reasons and to stop browser-based Bruteforce attacks all banks and payment gateways are restricted and will not load from within the app
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Simple Cipher Algorithm

    Simple Cipher Algorithm

    Java Encryption Utility.

    Very simple to use symmetric Java encryption utility. Please write a review. Email me with any questions or problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Stegano.Net

    Stegano.Net

    Image Steganography for Windows

    Stegano.Net is free Steganography Tool for Windows. It hides texts/files/data in images. The secret data can be unveiled from the Images afterwards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    SSL Kill Switch 2

    SSL Kill Switch 2

    Blackbox tool to disable SSL certificate validation

    ...Installing SSL Kill Switch 2 allows anyone on the same network as the device to easily perform man-in-the-middle attacks against any SSL or HTTPS connection. This means that it is trivial to get access to emails, websites viewed in Safari and any other data downloaded by any App running on the device.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 23
    Cardano SL

    Cardano SL

    Cryptographic currency implementing Ouroboros PoS protocol

    Cryptographic currency implementing Ouroboros PoS protocol. The cardano-node is the top level for the node and aggregates the other components from other packages: consensus, ledger and networking, with configuration, CLI, logging and monitoring. The node no longer incorporates wallet or explorer functionality. The wallet backend and explorer backend are separate components that run in separate external processes that communicate with the node via local IPC. The new Cardano implementation...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    TraySafe

    TraySafe

    Elegant and reliable profile data storage

    ...The scroll button is used to delete items from the menu. PIN functionality is included in versions 1.1.0 and above. The serious perk of the app is that all the info is saved as encrypted data in the data.tsf file in the program directory. The simple yet effective encryption algorithm has a password hash, salt key and vigenère cipher key that are changed with every update. The only thing you have to do when updating is to delete the .tsf files and re-enter all your info again so that it can be encrypted using the new parameters. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Fav-up

    Fav-up

    Look up IP addresses using favicon hashes via Shodan

    ...This technique is commonly used in security research and OSINT investigations to discover related infrastructure or services that may belong to the same organization. fav-up can retrieve favicon data from several sources, including local files, direct favicon URLs, or full web pages where the favicon is automatically extracted. fav-up then computes the favicon hash and performs Shodan queries to locate IP addresses that match the same hash. To support larger investigations, the tool can iterate over lists of URLs, domains, or favicon files in bulk. ...
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB