Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files" - Page 29

Showing 2108 open source projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

View related business solutions
  • PageDNA: Web-to-Print eCommerce Software Icon
    PageDNA: Web-to-Print eCommerce Software

    eCommerce for Print, Signs and Fulfillment Trusted by In‑Plants and Commercial Print Leaders

    PageDNA enables successful eCommerce strategies for commercial print sales organizations, internal print shops, and brand owners. PageDNA’s online ordering platform increases print volume while decreasing touch costs for all stakeholders: clientele, print operations, and the organizations they support.
    Learn More
  • Your go-to FinOps platform Icon
    Your go-to FinOps platform

    Analyze, optimize, and govern your multi-cloud environment effortlessly with AI Agentic FinOps.

    Unlike reporting-only FinOps tools, FinOpsly unifies cloud (AWS, Azure, GCP), data (Snowflake, Databricks, BigQuery), and AI costs into a single system of action — enabling teams to plan spend before it happens, automate optimization safely, and prove value in weeks, not quarters.
    Learn More
  • 1
    SafeBox

    SafeBox

    Truly anonymous and secure file sharing

    Anonymity No registrations. Immediately after installing the application, you can start sharing files. Strong cryptography Proven standards of cryptography (PGP, RSA 2048). There is not a single case of hacking data encrypted with PGP using full brute force or cryptographic algorithm vulnerability. Files are not stored in the cloud as soon as the recipient receives the file, it is instantly removed from the cloud. Thus, it is impossible to get files to anyone other than the addressee. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    VersionInfo

    VersionInfo

    Generate file version information

    This command-line utility produces a report of file information including version information where available. The reports can be useful for release information, manifests, and integrity verification.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    VenSafe

    VenSafe

    Free, secure, customizable and the best folder locker software!

    [UPDATE! - VenSafe 2.0.1.2) VenSafe, the best of its kind; A Folder/USB locker software by Rahul M. The all-new VenSafe is ready with its simple, smooth and friendly GUI. This version is far more secure comes with all kinds of bugs, bypasses and cheats fixed. The password can no longer be edited by others from outside. Everything's in the Settings. It's impossible to crack through your folder once it's locked. In case you forget you VenSafe password, you can request for a recovery...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    goim

    goim

    goim is a im server writen by golang

    ...You can view the comments in target/comet.toml,logic.toml,job.toml to understand the meaning of the config. Install comet/logic/job modules and use Supervisor management (You might need to change the configuration files based on your servers).
    Downloads: 4 This Week
    Last Update:
    See Project
  • Quality Management Software Icon
    Quality Management Software

    Ideal for small to medium-sized businesses. Pay for all the modules or only the ones you need.

    isoTracker Quality Management is a popular cloud-based quality management software (QMS) that is used by small to medium sized businesses on a worldwide basis. It helps to manage ISO 9001, ISO 13485, ISO 22000, ISO 17025, ISO 14001 systems...plus many similar other systems. It also conforms to the requirements of 21 CFR Part 11.
    Learn More
  • 5
    Xplico

    Xplico

    Xplico is a Network Forensic Analysis Tool (NFAT)

    Xplico is a Network Forensic Analysis Tool (NFAT). The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP, MGCP, MEGACO, RTP), IRC, WhatsApp... Xplico is able to classify more than 140 (application) protocols. Xplico cam be used as sniffer-decoder if used in "live mode" or in conjunction with netsniff-ng.
    Downloads: 23 This Week
    Last Update:
    See Project
  • 6
    RapidSum

    RapidSum

    Checksum calculator and verifier tool

    RapidSum is a simple checksum calculator and verifier. Changelog: ● v1.1.5 - [exprimental] File Operation - Added auto-scroll option - Fixed critical bugs ● v1.1.0 (Reborn) - Added 64-bit build - Prevent file duplication in the list - Improved compatibility - Fixed critical bugs ● v1.0.4 - Added SaveAs dialog - Added support for save and verify sha-1 checksums - Fixed bugs
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7

    CryptoFlouze

    This software display the last prices of the top 20 cryptocurencies

    This software download and display the last prices of the top 20 cryptocurrencies on the market. All the data are updated at every run. The data is downloaded from : https://coinmarketcap.com/api/ For windows : Download this zip file, unzip everything in the same directory. The data are updated at every run. For other operating systems : Run it from the source. https://github.com/hamdyaea/CryptoFlouze Developer - Author Hamdy Abou El Anein
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A USLESS KEYLOGGER |MZL

    A USLESS KEYLOGGER |MZL

    A keylogger that save your data with yourself and works

    A keylogger that save your data with yourself and works as backup of every text you write
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    pdf_encryptor

    Encrypt PDFs with Python and PyPDF2

    Downloads: 0 This Week
    Last Update:
    See Project
  • Empower Your Workforce and Digitize Your Shop Floor Icon
    Empower Your Workforce and Digitize Your Shop Floor

    Benefits to Manufacturers

    Easily connect to most tools and equipment on the shop floor, enabling efficient data collection and boosting productivity with vital insights. Turn information into action to generate new ideas and better processes.
    Learn More
  • 10
    NASH OS

    NASH OS

    Nash Operating System for Modern Ecommerce

    The all-built-in-one, automatic, ready-to-go out-of-box, easy-to-use state-of-the-art, and really awesome NASH OS! Over 25,000+ flexible features and controls and all scalable!! The most powerful solution ever built to instantly deliver new heights of online ecommerce enterprise to you.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11
    goRBAC

    goRBAC

    goRBAC provides a lightweight role-based access control (RBAC) in Go

    ...Although you can adjust the RBAC instance anytime and it's absolutely safe, the library is designed for use with two phases, preparing and checking. Also, you can implement gorbac.Role and gorbac.Permission for your own data structure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Universal Password Manager

    Universal Password Manager

    Store all your passwords in one secure encrypted database.

    Universal Password Manager allows you to store all your passwords in one highly secure encrypted database. Its strengths are simplicity, portability and security (uses 128bit AES encryption). UPM is available on Android, Windows, OS X & Linux.
    Leader badge
    Downloads: 29 This Week
    Last Update:
    See Project
  • 13
    Firefly

    Firefly

    A proxy software to help circumventing the Great Firewall

    Firefly is an agent used to access Great Firewall (GFW) blocked websites and applications. Under the default settings, Firefly only goes through VPN forwarding wall of IP traffic, IP wall straight. If you find a website or application you cannot access, Firefly flow mechanism can be built to distinguish between an error. In this case, you can choose to forward all traffic through the VPN, and then try again.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    Remme PKI (d) Protocol

    Remme PKI (d) Protocol

    Blockchain-based distributed PKI protocol

    Remme Protocol is a blockchain-based protocol focused on digital key and identity lifecycle management to resolve issues related to cybersecurity, IoT connectivity, data integrity, digital copyright protection, transparency etc. Some of the groundbreaking features include: - Free Rate Limited Transactions - Low Latency Block confirmation (0.5 seconds) - Attribute-based identity and access control - Designed for Sparse Header Light Client Validation - Time Delay Security - Hierarchical Role Based Permissions - Support for Biometric Hardware Secured Keys (e.g. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    bin64ed

    bin64ed

    Base64 encode (or decode) files of any type with this lightweight tool

    bin64ed is a binary base64 encoder/decoder that allows you to encode/decode binary files (such as images, pdfs, etc) to and from base64.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16
    CapAnalysis

    CapAnalysis

    PCAP from another point of view

    CapAnalysis is a web visual tool for information security specialists, system administrators and everyone who needs to analyze large amounts of captured network traffic. Analyze TCP and UDP streams Support multible datasets Perform deep packet inspection Support filtering capability Source Code: https://github.com/xplico/CapAnalysis
    Downloads: 28 This Week
    Last Update:
    See Project
  • 17
    GORSK

    GORSK

    Idiomatic Golang Restful Starter Kit

    There are many ways to write a (RESTful) backend in Go. Most of the available tutorials are way too simple, with all the presented content fitting into a single file (or at most two-three). More complex examples are quite rare, and even most of them miss lots of things for the sake of reducing complexity. That’s one of the reasons I wrote Gorsk - to have a fully functional example of a RESTful backend (in Golang) utilizing best practices, idiomatic code, and minimal dependencies. Instead of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    sjcl

    sjcl

    Stanford Javascript Crypto Library

    The Stanford Javascript Crypto Library is a project by the Stanford Computer Security Lab to build a secure, powerful, fast, small, easy-to-use, cross-browser library for cryptography in Javascript. SJCL is small but powerful. The minified version of the library is under 6.4KB compressed, and yet it posts impressive speed results. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    goflyway

    goflyway

    An encrypted HTTP server

    ...However pure HTTP requesting is definitely a waste of bandwidth if you already have a better network environment, so use -w to turn on WebSocket relay, or -K to turn on KCP relay if possible. In HTTP mode when the server received some data it can't just send them to the client directly because HTTP is not bi-directional, instead, the server must wait until the client requests them, which means these data will be stored in memory for some time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    PGIIXUA

    PGIIXUA

    PGIIXUA allows to generate network traffic right of your Android

    PGIIXUA allows to generate network traffic right of your Android smartphone. THERE ARE NO VIRUSES, THE SYSTEM JUST DETECTS SUCH TOOLS THAT WAY! Malware detected (wanted feature): 'a variant of Android/HackTool.Loicdos.B application': What does it mean? This tool is based on the 'Low Orbit Ion Canon', but more powerful as for the advanced changes that were made on the software. What is Low Orbit Ion Canon?
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    ansvif

    ansvif

    An advanced cross platform fuzzing framework suited to find code bugs.

    ansvif, or A Not So Very Intelligent Fuzzer, suited to find bugs in code by throwing garbage arguments, files, and environment variables at the target program, that you may or may not have the source code to. It supports many features, such as buffer size, randomization of the buffer size, random data injection, templates, and much more. The purpose of this project is to identify bugs in software, specifically bugs that can induce a segmentation fault under various conditions. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    dotNet Disk Imager

    dotNet Disk Imager

    Lightweight RAW and ZIP disk images reader and writer to USB or SD

    IMPORTANT!!! Since this is new software, your web browser, operating system or even possibly antivirus software may report security alerts against this tool. Please ignore that messages until this tool gets widely spread. This program is highly inspired by Win32 Disk Imager and sort of copies it's function. However, I've added some features, like verification of readed/writed image file and the most important is on the fly support for zipped images. Another features worth...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 23
    pcaprunner

    pcaprunner

    Analizes PCAP files and gives statistics about IP packets.

    PCAPRUNNER runs through PCAP files and statistically analyzes IP packets. Other packets are ignored. Adresses, ports, oldest timestamp, youngest timestamp (first seen / last seen), the quantity of packets and the sum of the packet volumes (as given in the PCAP file as orig_len) are listed. PCAPRUNNER uses only the C standard library, no LIBPCAP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    PF_HP

    PF_HP

    Prediction of proteinfolding in 2D HP model

    Even in the simplified two dimensional HP-model (hydrophob/polar) the prediction of proteinfolding is NP complete. We implement a brute force algorithm with serial and parallel execution to solve short inputs of HP sequences (0-1 bitstrings). Selbst im vereinfachten zweidimensionalen HP-Modell (hydrophob/polar) ist die Proteinfaltung bereits NP-vollständig. Hier implementieren wir einen brute-force Algorithmus zur Lösung kurzer Eingabesequenzen (0-1-Bitstrings) für die Proteinfaltung. Spende einen Cappuccino: Bitcoin: 1HqrdnfQgi9B4LW8UEvLAwh7X5gXPCoQ5B Litecoin: Lbo2jxD85ymyq5167r7yFVZkEr73F2h44B Paypal: paypal.me/GerritLeder Credits ====== Principle Investigator -------------------------- Gerrit Leder: protein folding algorithm design and testing, and initial implementation in Eiffel. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Cuckoo Sandbox

    Cuckoo Sandbox

    Cuckoo Sandbox is for automated analysis of malware

    Cuckoo Sandbox uses components to monitor the behavior of malware in a Sandbox environment; isolated from the rest of the system. It offers automated analysis of any malicious file on Windows, Linux, macOS, and Android.
    Downloads: 29 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB