Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files" - Page 45

Showing 2110 open source projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

View related business solutions
  • Jesta I.S. | Enterprise Software For Retail and Supply Chain Icon
    Jesta I.S. | Enterprise Software For Retail and Supply Chain

    Transition from fragmented entry-level or legacy systems to an enterprise suite.

    Unify your people and operations across all departments and channels. Discover end-to-end retail, wholesale, and supply chain management software suites designed to scale.
    Learn More
  • Hightouch is a data and AI platform for marketing and personalization. Icon
    Hightouch is a data and AI platform for marketing and personalization.

    Marketing needs data and AI. Give them Hightouch.

    Find insights, run real-time campaigns, and build AI agents with all your data.
    Learn More
  • 1

    TeamSploit

    Pen Testing With Friends

    ...TeamSploit should work with any MSF product (including, OpenSource, Express, or Pro). Features Include: - Exploitation Automation - Automated Post-Exploitation - Information and Data Gathering - Session Sharing - Trojans and Trollware TeamSploit's primary goal is to automate common penetration testing tasks, and provide access and information to fellow team members.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    WinMd5Checksum

    WinMd5Checksum

    Calculating and comparing MD5 checksums, calculating SHA256 hash

    You can calculating md5 hashsums, comparing files and hashsums in pairs. If you have backups of one file and you have a md5 hashsum, you can compare your backups against this md5 hashsum. Calculating SHA256 hashes too. This repository will no longer updated! Please take a look at this url: https://github.com/tualatin/winmd5checksum
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Revenssis Ethical Hacking Suite

    Revenssis Ethical Hacking Suite

    Fully featured network, wireless and web app pentesting suite.

    Nicknamed as the "Smartphone Version of Backtrack", Revenssis Penetration Suite is a set of all the useful types of tools used in Computer and Web Application security. Tools available in it include: Web App scanners, Encode/Decode & Hashing tools, Vulnerability Research Lab, Forensics Lab, plus the must-have utilities (Shell, SSH, DNS/WHOIS Lookup, Traceroute, Port Scanner, Spam DB Lookup, Netstat... etc). All these fitting in an application approx. 10MB (post installation).
    Downloads: 15 This Week
    Last Update:
    See Project
  • 4
    Azrar

    Azrar

    Encryption addressing long-term data secrecy

    Most of today's cryptographic standards will be broken with tomorrow's computational power. Azrar is a user-friendly tool for the encryption/decryption of single files - preferably compressed archives - addressing long-term data secrecy. Thus, Azrar provides the possibility to use webspace for secure data transfer between two communication/transfer partners (encryption only, network transfer not yet included in current version). Data in encrypted files are secret/private indefinitely. To achieve long-term data secrecy, Azrar differs from other approaches in terms of not to rely on effective computational deficiencies. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • MaintainX is the world-leading mobile-first workflow management platform for industrial and frontline workers. Icon
    MaintainX is the world-leading mobile-first workflow management platform for industrial and frontline workers.

    Trusted by Operational Leaders Across the Globe

    Your day-to-day maintenance tasks, simplified. MaintainX eliminates the paperwork, so you can spend less time on your clipboard and more time getting things done.
    Learn More
  • 5
    DEEEP

    DEEEP

    Detector of Integer Vulnerabilities in Software Portability

    ...It uses the tools Lint and Splint, and runs over Open Solaris and Linux operating systems. This tool semantically analyses source code. More precisely, it does type checking, data-flow analysis, and it automatically correlates the results of these two types of analysis. Type checking is used for finding bugs on the way integers are handled, and data-flow analysis is used to see if hazardous functions (eg. memcpy, strcpy) are accessible from outside the program. After this two analyses, the tool correlates the results from the previous phases to attain if the data that comes from the inputs are affected by vulnerabilities from porting to LP64, and if these are handled by dangerous functions (memcpy, strcpy,...). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    File Encryptor

    Very simple file encryptor (coder)

    File Encryptor is a very simple, totally free and easy to use batch file encryption application. Main features are: - Secures (encrypts) text files with an extra-large security key. - Secures (encrypts) media files with an extra-large security key. - Converts multiple files into a single encrypted file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Pecker Scanner

    A static source code analyser for vulnerabilities in PHP.

    A scanner named pecker, written in php,It can check dangerous functions with lexical analysis. to scans files for malicious PHP Code. Github : https://github.com/cfc4n/pecker
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    PiShare

    PiShare

    RetroShare binaries compiled for Raspberry Pi

    compiled RetroShare binaries, and packaged for Raspberry Pi using Debian 7.0 Wheezy ARMHF known Raspbian If you want to compile it yourself, download the source-tarball, it is only ~7MB big, or pull the code repository with SubVersioN. compiling takes up to 2-3 hours. or install the .deb files with dpkg -i "retrosharefilename".deb if necessary make a "apt-get update && apt-get upgrade" to update your system for all how to start it in a detached screen session: screen -t retroshare -dmS RetroShare retroshare -display :0 If you run headless, i suggest to use X11VNC to control it remote. or use the nogui binary Files available for download: RetroShare-Gui RetroShare-NoGui RetroShare-Plugins
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Crypton

    Crypton

    Program to save accounts

    It is a program to save account (username, passwords). You can import/export files. Set shortcuts for frequent used account. Update/delete data. It is a multiuser program (one password to remember all others). Link: http://youtu.be/0PR--cf2En4
    Downloads: 0 This Week
    Last Update:
    See Project
  • SalesTarget.ai | AI-Powered Lead Generation, Email Outreach, and CRM Icon
    SalesTarget.ai | AI-Powered Lead Generation, Email Outreach, and CRM

    SalesTarget.ai streamlines your sales process, providing everything you need to find high- quality leads, automate outreach, and close deals faster

    SalesTarget is ideal for B2B sales teams, startup founders, and marketing professionals looking to streamline lead generation and outreach. It also benefits growing SaaS companies and agencies aiming to scale their outbound efforts efficiently.
    Learn More
  • 10
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed. Executing the program with command-line arguments causes bigram to generate a random bigram table to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Portable Folder Locker

    Portable Folder Locker

    Quick protect your folder

    Hook Folder Locker is a small tool to lock your folder quickly. Its a portable software easy to use, just 1 file only. Protected by password. How to use: 1. Browse the folder 2. Click Lock 3. Choose your password for the folder How to unlock 1. Browse the folder 2. Click Unlock 3. Enter the password.
    Leader badge
    Downloads: 27 This Week
    Last Update:
    See Project
  • 12
    Fileprivacy

    Fileprivacy

    Fileprivacy easily encrypts your files

    ...Because there are no start scripts, yet, you have to start Fileprivacy from console by typing: java -jar Fileprivacy-1.0_<version>.jar ####### ALSO NOTE ####### The author of this software is not responsible for the safety of your data. There is no guarantee that one or more of the implemented algorithms cannot be compromised.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Steganography v2.0

    Steganography v2.0

    Hide archives inside any image type

    .... ************************************************************************************************************************** Now has the ability to mask the size of the image so that it stays the same even when TB's of data are hidden within it. ************************************************************************************************************************** --- UPDATES --- * Now has support for all image types. * Now has support to mask an images file size in outer type mode. * v1.0 bug fixes. --- ALERT --- Once an image is edited in any image software it looses its hidden files and reverts back to being a regular image file again!
    Leader badge
    Downloads: 22 This Week
    Last Update:
    See Project
  • 14
    Personal Notes

    Personal Notes

    This application saves text in an encrypted form with password.

    All the data you type into this application are encrypted with a password and saved. No one can read this file unless he/she has the password. Not even you can open the file if you forget the password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    File System Tracker .NET

    File System Tracker .NET

    File system change tracker.

    File System Tracker .NET is a utility to monitor modifications that are made on the files of a Windows system. Further, this tool supports various filter mechanisms, e.g. filtering by change state and/or by file size. Saving of the recorded file system changes is of course also possible. Addressed to other developers; the sources code includes several interesting classes that could be used in their own projects. As an example, this program includes a user-control which displays errors, warnings, and so on.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    HFV (Hidden Folder Virus) Cleaner Pro

    HFV (Hidden Folder Virus) Cleaner Pro

    A Small Utility programmed to destroy Win32:Atraps-PZ[Trojan]

    ...This is where HFV comes to help...Simply paste the location of your Infected directory on the box & click Delete virus to get rid of virus. As a safety precaution, keep this software backed up on system as well since the virus which hides all files and creates a shortcut can also hide this software as well. P.S.It can also be used to hide your private data from Neighbors and Roommates;)
    Downloads: 49 This Week
    Last Update:
    See Project
  • 17
    Manual Virus Removal Tool

    Manual Virus Removal Tool

    MVRT is a small utility to unhide all files and help in virus deletion

    Manual Virus Removal Tool 1.01-beta Platform: Windows ============ Information: ============ 1- This is NOT an Anti-Virus so don't assume it to be one. 2- If you don't know anything about file types specially (.exe/.bat/.vbs etc) then this application is useless for you. =========================== What this application does? =========================== You select a folder, click 'Unhide All' and MVRT unhides all the files and folders (even super hidden ones) inside the chosen folder. Then you can either go to that folder in the Windows Explorer and delete the .exe,.bat,.cmd,.vbs files or shortcuts you suspect to be viruses. Or you may choose the file in MVRT itself and click 'Delete File' to delete it. You can also check basic information about files like attributes and file size by choosing a file from tree and clicking "File Info"...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    SilentEye
    SilentEye is a cross-platform application design for an easy use of steganography. It provides a pretty nice interface and an easy integration of new steganography algorithm and cryptography process.
    Leader badge
    Downloads: 236 This Week
    Last Update:
    See Project
  • 19
    web4thejob.org

    web4thejob.org

    Open source to productivity

    Web4thejob is an open source java framework for the rapid development of data-centric web applications. It is ideal for those who seek a component-based event-driven full-stack web development framework, capable of producing elegant desktop-style web applications that can automate any business domain. The framework addresses the automation needs of any business domain introducing "joblets". A joblet encapsulates the relational schema of a business domain using modern orm technology. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    EnigmaGPG Community

    EnigmaGPG Community

    Sending encrypted data through internet web applications.

    Enigma GPG Community allows you to encrypt / sign text and attachments using plugins in browsers, to send encrypted information via any Internet application that can only be understood by the intended recipient ensuring the authenticity, privacy and confidentiality of messages between the sender and receiver . Note the utility that can achieve this project because it aims to meet the global need for privacy on the web. Also applies to any web application that allows text input by the user...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Arcanum Editor
    The Arcanum Editor is a small but powerful tool to encrypt and decrypt messages. The program also comes with it's own format CTXT. This format is based on XML and allows you to save texts with the Advanced Encryption Standard.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 22

    n4p

    Configures network variables automatically for MITM, ARP, and SSLstrip

    ...Configures network variables automatically for HOSTAPD or Airbase-ng with bridging and ipv4_forwarding ability. Configures all necessary iptables rules and prepares the system for MITM, ARP, and SSLstriping attacks. — Edit 9 commits 1 branch 0 releases
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    ArcThemALL!
    It supports files and folders multi-compression (UPX, ZIP, 7Z) and archives extraction (several formats). It includes an intelligent UPX compression mode, self-extracting archive creation, encryption/decryption, external compressors and much more.
    Downloads: 18 This Week
    Last Update:
    See Project
  • 24

    Cipherbox

    Protecting your documents everywhere

    Cipherbox is a free software to protect many kinds of documents (Office/PDF/ZIP) with passwords by using native and standard encryption algorithms. It can also compress the selected documents into an archive with a lock. This is best when used together with cloud storage tools like SkyDrive, DropBox or Google Drive. Cipherbox has several advantages: 1. It supports native document encryption algorithms, which means that you can open your documents everywhere. 2. It implements all functions independently to MS Office or Adobe Acrobat. You don’t need to buy software to use it. 3. It supports fast lock/unlock operations on files in batch. 4. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Linux user-space implementation of Aladdin's eToken R2 device driver
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB