Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files" - Page 33

Showing 2110 open source projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

View related business solutions
  • Airlock Digital - Application Control (Allowlisting) Made Simple Icon
    Airlock Digital - Application Control (Allowlisting) Made Simple

    Airlock Digital delivers an easy-to-manage and scalable application control solution to protect endpoints with confidence.

    For organizations seeking the most effective way to prevent malware and ransomware in their environments. It has been designed to provide scalable, efficient endpoint security for organizations with even the most diverse architectures and rigorous compliance requirements. Built by practitioners for the world’s largest and most secure organizations, Airlock Digital delivers precision Application Control & Allowlisting for the modern enterprise.
    Learn More
  • Intelligent Automation Solutions Built for Modern Finance Teams Icon
    Intelligent Automation Solutions Built for Modern Finance Teams

    We do CFO stuff.

    Digitally transform your business with workflow automation and integrated payment solutions. Digitally store and secure your data with advanced search and accessibility features that keeps your documents at the tip of your team’s fingers.
    Learn More
  • 1
    Network Tracking Database

    Network Tracking Database

    Track your ARP/MAC table changes and so much more

    ...It supports extensive switch, VLAN and vendor code reports from a CLI or Web App. NetDB can generate CSV reports, track the usage of static IP addresses, record neighbor discovery data and much more. There is now a VM "appliance" with easier upgrades available in the Files section. See the http://netdbtracking.sourceforge.net for more details.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    PassBox by Manu Shukla

    PassBox by Manu Shukla

    Secure your passwords with a master one.

    PassBox, lets you save you passwords for different websites within a single minute. But if you save your important passwords then anybody could steal them easily. So to figure out this issue, all your saved passwords in PassBox will be secured by a master password which only the user knows. Also, it is almost impossible to reveal the password because it has a different type of encryption method. Using it is very simple. Just run it and you'll be having on screen instructions.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    XorCryptWin

    XorCryptWin

    XOR Encryptor for Windows

    XOR encryption software for Windows. Generates random key files which it then uses to mimic the One-Time Pad encryption technique. Distributed together with RandFileGen, a program that can generate random files of any size and is extensible by plugins.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4

    Networking Tools

    This Program Contains Many Useful Network Tools

    This programs contains the following programs: ------------------------------------------------------------------ 1-Wi-Fi Connector : Connects To Available Wi-Fi Network. 2-Router Password Cracker : To Crack Router's Gateway Password. 3-IP Trace : Trace The IP Address For Any Website. 4-IP Tracker : Gets Your WAN IP Address. 5-Lan Messenger : Chat Between Computers On Same LAN Network. 6-Email Sender : For Sending E-mails Using SMTP Server. 7-Email Viewer : For Receiving E-mails Using POP3 Server. 8-YouTube Downloader : For Downloading YouTube Videos. 9-File Downloader : For Downloading Files.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Agentic AI SRE built for Engineering and DevOps teams. Icon
    Agentic AI SRE built for Engineering and DevOps teams.

    No More Time Lost to Troubleshooting

    NeuBird AI's agentic AI SRE delivers autonomous incident resolution, helping team cut MTTR up to 90% and reclaim engineering hours lost to troubleshooting.
    Learn More
  • 5
    zxcvbn

    zxcvbn

    Low-budget password strength estimation

    ...Using leaked passwords, we compare its estimations to the best of four modern guessing attacks and show it to be accurate and conservative at low magnitudes, suitable for mitigating online attacks. We find 1.5 MB of compressed storage is sufficient to accurately estimate the best-known guessing attacks up to 105 guesses, or 104 and 103 guesses, respectively, given 245 kB and 29 kB. zxcvbn can be adopted with 4 lines of code and downloaded in seconds. It runs in milliseconds and works as-is on web, iOS and Android.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Password Guessing Framework

    Password Guessing Framework

    A Framework for Comparing Password Guessing Strategies

    The Password Guessing Framework is an open source tool to provide an automated and reliable way to compare password guessers. It can help to identify individual strengths and weaknesses of a guesser, its modes of operation or even the underlying guessing strategies. Therefor, it gathers information about how many passwords from an input file (password leak) have been cracked in relation to the amount of generated guesses. Subsequent to the guessing process an analysis of the cracked...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Advanced Onion Router
    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and...
    Leader badge
    Downloads: 96 This Week
    Last Update:
    See Project
  • 8
    SWF Investigator

    SWF Investigator

    Adobe SWF Investigator enables full analysis of SWF applications.

    Adobe SWF Investigator is a cross-platform, GUI-based, comprehensive set of tools, which enables quality engineers, developers and security researchers to quickly analyze SWF files to improve the quality and security of their applications. From a static perspective, you can disassemble ActionScript 2 (AS2) and ActionScript 3 (AS3) SWFs, view SWF tags and make binary changes to SWF files.  SWF Investigator also lets you view associated information, including local shared objects (LSOs) and per site settings. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Directory control

    Hot directory

    Control changes in the choosen folder. Choose a log file with the changes within. It's recommended to use Java 8. The directory is not controlled recursively, thus if files are added or deleted in other folders it is not showed. Only things in the folder choosen. Just start a new pararell session to control another folder. Start it with "java -jar file.jar" or with the .bat file as example. You may also start it in the background with "start javaw -jar DirecHashC.jar" .
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cloud data warehouse to power your data-driven innovation Icon
    Cloud data warehouse to power your data-driven innovation

    BigQuery is a serverless and cost-effective enterprise data warehouse that works across clouds and scales with your data.

    BigQuery Studio provides a single, unified interface for all data practitioners of various coding skills to simplify analytics workflows from data ingestion and preparation to data exploration and visualization to ML model creation and use. It also allows you to use simple SQL to access Vertex AI foundational models directly inside BigQuery for text processing tasks, such as sentiment analysis, entity extraction, and many more without having to deal with specialized models.
    Try for free
  • 10

    openSSLGOSTSigner

    Simple GUI tool for openssl to sign files with GOST algorithm

    This software is a simple GUI tool which uses openssl command line utility underneath. It designed to sign any type of files with GOST algorithm (GOST cipher) and will be especially useful for russian ISP's and IT companies which in one way or another have to deal with Roskomnadzor's forbidden sites list to reduce the timewaste while typing in commandline each time you need to sign some file. To use this software you will need to have a ".PEM" file(which exactly used to sign files). ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    react-native-login

    react-native-login

    An example React Native project for client login authentication

    This project is an example application built with React Native that demonstrates how to implement client login authentication in a mobile context. It shows how to integrate WebViews or native modules to handle login flows, fetch tokens, and manage persistent user sessions across platforms (iOS and Android). Because mobile authentication flows often involve more complexity than web—such as secure storage, token renewal, and redirect handling—the example gives a scaffold for real-world usage. While not a full production app, it provides sufficient structure for mobile developers to learn the foundation of login/registration, token handling, and basic navigation after login. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    CryptoToolsPack

    CryptoToolsPack

    Basic encode/decode, files comparison and protect sensitive data

    This pack includes the following: FCSG - generate checksum and perform file comparison; JCryptoTool - encrypt/decrypt messages and files; JWallet - password protect sensitive information. See Help menu in each application, Source code included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    BTCore

    A Collection of Useful Java/Swing Code

    NEWEST FEATURE ---------- Added one line ".zip" extraction to Util class! Added one line ".zip" extraction from URL (web) and one line file download from URL! BTCore is a library that was designed to be used with all of Banotech's software. It includes a tremendous amount of code snippets and classes that have been boiled down to allow ease of use by everyone. BTCore is, and always will be FREE. It has tools that we scrapped together over our last few projects, and that we found...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    AlienVault OSSIM

    AlienVault OSSIM

    Open Source SIEM

    ...For more advanced functionality, AlienVault Unified Security Management (USM) builds on OSSIM with these additional capabilities: * Log management * Advanced threat detection with a continuously updated library of pre-built correlation rules * Actionable threat intelligence updates from AlienVault Labs Security Research Team * Rich analytics dashboards and data visualization
    Leader badge
    Downloads: 99 This Week
    Last Update:
    See Project
  • 15
    Zipped Steganography

    Zipped Steganography

    Hide files into ZIP archives

    Hide files into ZIP archives. Support Password protect mode for ZIP archives. Auto attaching ZIP file into Outlook
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Asmodat Folder Locker

    Asmodat Folder Locker

    Folder & Files encryption - opensource software.

    This is the fastest encryption tool for Windows, it allows you to encrypt whole hard drives or incredibile large and multitude of files in the matter of seconds. Now you can quickly protect your files and folders with password and prevent anyone from opening them. Source Code available here: https://asmodatfolderlocker.codeplex.com/ Project is entirely opensource, you can change it if you wish to what suits your purposes best, or send me email to request a new feature. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Mpge

    Mpge

    Mpge

    Mpge is a wrapper of meterpreter (msfconsole, msfpayload and msfencode) of Metasploit Framework directly integrated with Mac OS X Snow Leopard 10.6.8 and with OS X Mavericks 10.9. With Mpge is possible make trojan horse files for Microsoft Windows, Linux and Mac OS X 10.3 Panther, OS X 10.4 Tiger, OS X 10.5 Leopard and OS X Montain Lion 10.8.1 for all Mac OS X is possible make a trojan horse files contains a reverse shell into files .pkg and files .app. I used three real Mac OS X: Attacker: MacBook with Snow Leopard 10.6.8 Target: Mac iBook PowerPC G4 with Mac OS X10.3.5 Panther and after MacBook and iMac Mac OS X Mountain Lion 10.8.1. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Personal Productivity Tool

    Time tracking and recording multiple screens and keystrokes

    ...Not meant to run hidden but is for tracking personal productivity where an individual requires time-sheets to be filled in or to track activity for playback and recovery automatically. Does not connect over the network or try upload any files. All capture is local and virus free. This is meant to be a productivity tracker and not a key logging tool on other users machines. That is why it is not a service and not hidden. Refer to the code for full disclosure. Special mention to :http://capablemonkey.blogspot.com/2012/03/simple-keylogger-in-vb-net.html for giving me ideas and helping me understand the process of capturing screens and keys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Pixeloid

    Pixeloid

    A novel and uber-secure way to store data, by Ajay Menon

    Pixeloid is a free piece of software that lets users encode data, in the form of text or an image(β), into a Pixeloid Matrix. Pixeloid additionally provides impenetrable security to users by enabling them to password protect their matrices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Echo Mirage

    Echo Mirage

    Hook into application processes and monitor network interactions

    Echo Mirage is a powerful network proxy tool designed for cybersecurity professionals focusing on penetration testing of thick client applications. It intercepts and modifies network traffic by injecting itself into target application processes, enabling deep inspection and manipulation of data exchanged between client and server. Unlike typical web proxies, Echo Mirage specializes in local application traffic, including encrypted sessions, providing unique visibility into thick client communications. It employs advanced techniques such as DLL injection and function hooking to capture network interactions effectively. This capability makes it invaluable for security testers analyzing complex client-server interactions to uncover vulnerabilities. ...
    Leader badge
    Downloads: 113 This Week
    Last Update:
    See Project
  • 21
    keys

    keys

    A gpg-based password manager with ncurses interface

    ...Keys is merely a bash script that used internal bash commands and externals ones. Keys permits to store securely your password and credentials in gpg's encrypted files, structured in a multi-level tree. With Xdotool you can also use auto-typing, a must-have feature for this kind of software. Keys currently can open (with autotyping) these types of connections: - Open a website and logon with the provided credentials - Open an ssh/sftp connection with the provided credentials - Open an rdesktop connection with the provided credentials Also, Keys can store generic Account credentials (aka. username+password). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    LOIC-0

    LOIC-0

    A NETWORK STRESS TOOL BASED ON PRAETOX LOIC

    Low Orbit Ion Cannon - 0 (LOIC-0) The original Low Orbit Ion Cannon with interface improvements. ALSO NOTED VERSION 1.0 OF LOIC-0 IS VERSION 1.2 OF LOIC AND SO ON. DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
    Leader badge
    Downloads: 38 This Week
    Last Update:
    See Project
  • 23
    TrojanCockroach

    TrojanCockroach

    A Stealthy Trojan Spyware

    This program is a Trojan Virus that steals data (ID, password; every key stroke) from PC (Windows XP or later) and emails it back to the host. It spreads among PCs through USB drives. It is almost undetectable to any antivirus software.
    Downloads: 126 This Week
    Last Update:
    See Project
  • 24
    Password Master
    Password master is an application created by team spark riders of rocking xtreme light company in egypt and this application will help users to save their passwords and accounts under new file extensions with encryption and decryption support! برنامج فريق سبارك رايدرز اتعمل في مصرلاول مرة بيحفظ و يحمي الملفات و المعلومات بترمبز و فك ترميز
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Google Authenticator OpenSource

    Google Authenticator OpenSource

    Open source version of Google Authenticator (except the Android app)

    Google Authenticator is the open-source counterpart of Google’s one-time passcode apps, implementing industry-standard OATH algorithms such as TOTP (time-based) and HOTP (counter-based) for two-factor authentication. The repository historically hosts code for mobile platforms like iOS and BlackBerry, demonstrating how to generate numeric codes locally without needing network access. Its core purpose is to help services and users add a second factor that’s simple to deploy yet resistant to...
    Downloads: 6 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB