Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files" - Page 5

Showing 333 open source projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

View related business solutions
  • Instant Remote Support Software. Unattended Remote Access Software. Icon
    Instant Remote Support Software. Unattended Remote Access Software.

    Zoho Assist, your all-in-one remote access solution, helps you to access and manage remote devices.

    Zoho Assist is cloud-based remote support and remote access software that helps you support customers from a distance through web-based, on-demand remote support sessions. Set up unattended remote access and manage remote PCs, laptops, mobile devices, and servers effortlessly. A few seconds is all you need to establish secure connections to offer your customers remote support solutions.
    Learn More
  • Respond 100x faster, more accurately, and improve your documentation Icon
    Respond 100x faster, more accurately, and improve your documentation

    Designed for forward-thinking security, sales, and compliance teams

    Slash response times for questionnaires, audits, and RFPs by up to 90%. OptiValue.ai automates the heavy lifting, freeing your team to focus on strategic priorities with intuitive tools for seamless review and validation.
    Learn More
  • 1
    Ncrypt is intended to give you security in an insecure environment. If you are wanting to encrypt files, wishing to hide your activites from prying eyes, and want to "cover your tracks", Ncrypt is for you.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2

    akmos

    Cryptography toolset

    Command line utility for encryption/decryption files, computing message digests
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    OpengateM

    A MAC address based user authentication system for campus-wide network

    This system restricts the network users and records usage log of the users. It is applicable to the campus wide network and is compatible to almost all network terminals. MAIN DEVELOPMENT SITE IS MOVED FROM here TO "https://osdn.jp/projects/opengatem/"
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    lecithine

    FUSE File system powered by secret sharing scheme

    Lecithine is a FUSE (file system in user space) using a secret sharing scheme. You can use Lecithine as regular file system. When writing to disk, data will be devided into randomly chosen pieces (secret shares) and stored into different places. Upon reading, the shares are merged together such that in turn the plaintext results. From a cryptographers point of view, there is no symmetric or private key ever needed to produce a ciphertext. This is how secret sharing schemes are designed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build innovative business apps powered by process automation Icon
    Build innovative business apps powered by process automation

    Connect workflows, teams and systems within one digital business transformation platform

    Manage your business as a unified system of interacting processes. Use BPMN 2.0 for low-code process modeling by business people. Follow your strategic goals with process architecture that always corresponds to the structure of an actual business.
    Learn More
  • 5
    Kypeless

    Kypeless

    Fully decentralised secure p2p communication program

    ...Right now, Kypeless is unstable pre-alpha software, published only for testing purposes. Kypeless allows you to exchange instant messages, long not-so-instant messages and files, but a lot more features are planned to be implemented later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    cyphertite

    cyphertite

    Secure, encrypted, zero-knowledge online data backup.

    Introducing Cyphertite 2.0: An all new look and feel in Windows! Cyphertite is a tar-like secure remote archiver. It deduplicates, compresses, and encrypts data prior to transmission, providing total privacy while reducing unnecessary wire traffic. It seamlessly supports IPv6 and IPv4 on a variety of platforms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Cyberoam iView - Open Source SIEM
    Cyberoam iView; the Intelligent Logging & Reporting solution provides organizations network visibility across multiple devices to achieve higher levels of security, data confidentiality while meeting the requirements of regulatory compliance. To know more about Cyberoam and it’s security solutions visit us at www.cyberoam.com.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8

    ext2 info hiding mod

    Information Hiding Modification for EXT2

    ...WARNING: This is experimental software and could cause crashes or data loss!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    HT is a file editor/viewer/analyzer for executables. The goal is to combine the low-level functionality of a debugger and the usability of IDEs. We plan to implement all (hex-)editing features and support of the most important file formats.
    Downloads: 48 This Week
    Last Update:
    See Project
  • GoAnywhere Managed File Transfer (MFT) Icon
    GoAnywhere Managed File Transfer (MFT)

    Secure and simplify your file transfers

    GoAnywhere MFT provides secure managed file transfer for enterprises. Deployable on-premise, in the cloud, or in hybrid environments, GoAnywhere MFT software enables organizations to exchange data among employees, customers, and trading partners, as well as between systems, securely. GoAnywhere MFT was a recipient of the Cybersecurity Excellence Award for Secure File Transfer.
    Learn More
  • 10
    kripta

    kripta

    A small utility to encrypt files

    An application to encrypt files using Tiny Encryption Algorithm(TEA) with user defined keys of 4 to 16 character length
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Eristic Cryptographic Toolkit

    Eristic Cryptographic Toolkit

    Open source 8 bit random number generator

    The Eristic Cryptographic Toolkit based on the CRC (Chaotic Random Core).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    CRYpter

    CRYpter

    An encrypter/decrypter written on the weekends

    A simple encrypter/decrypter written in C with a graphical user interface written in Python. This tool was written to help forums' users to have their credits for the files they uploaded by putting their usernames from each forum they are active. *This encypting software generates a symetric key based in the password. The lenght of the key is variable. The rule for the length is: (Num_Of_Chars_In_Passwrd)^2 bytes .
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    ...SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to efficiently cipher text of arbitrary length or files of any size or type. Use it with confidence. To achieve complete one-on-one privacy, SES traverses several levels en route to its output. The more words in your key-phrase, the more layers of encipherment SES applies. It is part Vigenere, part onetime pad, part cryptographic hash, not to mention the essential scrambler element, each component driven by ISAAC, with all key-derivation and stretching relying on Keccak in 512-bit configuration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    HostIPstats

    Collect and display host IP traffic statistics

    This tool provides IP traffic information at a level between a simple traffic counter (e.g. darkstat) and full packet capture or intrusion detection. It collects packet and byte counts by host IP address, protocol, and port. The next phase of the project is to analyze and display this data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Clam sentinel is a program that detects file system changes and automatically scans the files added or modified using ClamWin. Require the installation of ClamWin. For Microsoft Windows 98/98SE/Me/2000/XP/Vista, Windows 7 and Windows 8.1.
    Leader badge
    Downloads: 162 This Week
    Last Update:
    See Project
  • 16
    Use of Michael Rabin's Information Dispersal Algorithm to provide secure, dispersed storage in a networked environment. For full download, please get both Math-FastGF2 and Crypt-IDA releases under the files link. See project wiki for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    xxteac - XXTEA Encrypter/Decrypter

    xxteac - XXTEA Encrypter/Decrypter

    This xxteac program utilizes the "Corrected Block TEA" encryption/decryption algorithm by Roger Needham and David Wheeler. The original algorithm has been slightly modified to allow arbitary length passwords / password files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Free Web Application Firewall

    Free Web Application Firewall

    Free Web Application Firewall

    The FreeWAF provides specialized, layered application threat protection. It protects your web-based applications and internet-facing data from attack and data loss. Using advanced techniques to provide bidirectional protection against sophisticated threats like SQL injection and cross-site scripting, it helps you prevent identity theft, financial fraud and corporate espionage.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    DEEEP

    DEEEP

    Detector of Integer Vulnerabilities in Software Portability

    ...It uses the tools Lint and Splint, and runs over Open Solaris and Linux operating systems. This tool semantically analyses source code. More precisely, it does type checking, data-flow analysis, and it automatically correlates the results of these two types of analysis. Type checking is used for finding bugs on the way integers are handled, and data-flow analysis is used to see if hazardous functions (eg. memcpy, strcpy) are accessible from outside the program. After this two analyses, the tool correlates the results from the previous phases to attain if the data that comes from the inputs are affected by vulnerabilities from porting to LP64, and if these are handled by dangerous functions (memcpy, strcpy,...). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Linux user-space implementation of Aladdin's eToken R2 device driver
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    FreDen Shield Project

    FreDen Shield Project

    A Toolkit for Secure and Free Web Navigation

    A browser-independent software toolkit, that offers protection against various web threats (such as malware, phishing, gossip agencies...), anonymous data sharing and free ads web navegation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Free-SA

    Free-SA is report generating tool for web, proxy and mail log files

    Free-SA is logs processor and report generating tool. It can be used to control traffic usage, to evaluate conformance to the Internet access security policies, to investigate security incidents, to evaluate web server efficiency and to detect troubles with server configuration.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23
    hwk

    hwk

    hwk is a tool used for wireless lan pentests

    hwk is an easy-to-use application used to attack and discover wireless networks. It's providing various modes such as authentication/deauthentication flood, beacon and probe response fuzzing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    VirusTrap

    VirusTrap

    Online Multi-Engine Antivirus Scanner

    VirusTrap is an open source framework for penetration testers, network auditors, system administrators who need to analyze unknown binaries during their work. The scanner was made to help computer users identifying malicious files by scanning them with 25 antivirus engines.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    MLCrypt

    Simple, lightweight, standalone command-line single file encryption.

    Simple, lightweight, cross-platform (Windows / Linux / ARM6 Linux), cross-arch (x32 / x64), standalone command line file encryption program. GnuPG is probably the best application for cross-platform encryption. However, its usage on Windows PCs may be inconvenient (installation administrator rights; large executable size for perhaps just a one-time file decryption, complicated command-line switches for stronger encryption). NCrypt would fulfill this task, but does not operate on 64-bit...
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB