Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files" - Page 3

Showing 72 open source projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

View related business solutions
  • Securden Password Vault Icon
    Securden Password Vault

    For IT Teams, CIO, CSO, Security Analysts

    Store, manage, and share passwords, files, SSH keys, and DevOps secrets among IT teams. Enforce password security best practices. Ensure compliance with industry standards using comprehensive audit trails.
    Learn More
  • No-Nonsense Code-to-Cloud Security for Devs | Aikido Icon
    No-Nonsense Code-to-Cloud Security for Devs | Aikido

    Connect your GitHub, GitLab, Bitbucket or Azure DevOps account to start scanning your repos for free.

    Aikido provides a unified security platform for developers, combining 12 powerful scans like SAST, DAST, and CSPM. AI-driven AutoFix and AutoTriage streamline vulnerability management, while runtime protection blocks attacks.
    Learn More
  • 1
    AWS Vault

    AWS Vault

    A vault for securely storing and accessing AWS credentials

    ...It's designed to be complementary to the AWS CLI tools, and is aware of your profiles and configuration in ~/.aws/config. By default, there is a dedicated Keychain for AWS credentials and Keychain prompts you when credentials are accessed. Beyond the strong storage-at-rest, aws-vault generates short-lived session-based credentials to expose to sub-processes and it encourages you to use the tool to run other tools, rather than exporting credentials to your environment. This means that rogue node.js packages have a harder time obtaining your credentials, and when they do, are limited to the lifetime of the session.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    Exposure Notifications Server

    Exposure Notifications Server

    Exposure Notification Reference Server | Covid19 Exposure Notification

    Exposure Notifications Server is an open source reference implementation developed by Google to support the COVID-19 Exposure Notifications API, designed for use by public health authorities around the world. The server provides a secure and privacy-preserving backend system that enables governments and organizations to deploy exposure notification applications for Android and iOS devices. It handles essential backend functions, including receiving and validating temporary exposure keys from users who have tested positive, storing those keys, and generating downloadable key files for mobile devices to check for potential exposure matches. The system integrates cryptographic signing for authenticity, supports configurable data retention policies, and ensures user privacy by design—no personally identifiable information is stored or transmitted. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Covermyass

    Covermyass

    Post-exploitation tool to cover your tracks on a compromised machine

    Covermyass is a post-exploitation tool to cover your tracks on various operating systems. It was designed for penetration testing "covering tracks" phase, before exiting the compromised server. At any time, you can run the tool to find which log files exists on the system, then run again later to erase those files. The tool will tell you which file can be erased with the current user permissions. Files are overwritten repeatedly with random data, in order to make it harder for even very expensive hardware probing to recover the data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Fast Wipe

    Fast Wipe

    Fast Wipe

    - Fast Wipe: wipe files and/or free hd space FAST! - Fast wipe has also secure deletion! wipe&fswipe now supports up to 12 different wipe standards. - It works from command line: windows and linux os available. - Works on any mounted partition. - Added windows installer - Completely Rewritten and Improved - Fixed windows execution usn
    Downloads: 4 This Week
    Last Update:
    See Project
  • Create and manage the email signature you need Icon
    Create and manage the email signature you need

    For companies and organizations that need an email signature solution

    With WiseStamp it’s easy to unify your brand and turn your emails into a powerful marketing tool. Get the most out of your emails with a professionally designed custom email signature.
    Learn More
  • 5
    Horusec

    Horusec

    Open source tool that improves identification of vulnerabilities

    ...Currently, the languages for analysis are C#, Java, Kotlin, Python, Ruby, Golang, Terraform, Javascript, Typescript, Kubernetes, PHP, C, HTML, JSON, Dart, Elixir, Shell, Nginx. The tool has options to search for key leaks and security flaws in all your project's files, as well as in Git history. Horusec can be used by the developer through the CLI and by the DevSecOps team on CI /CD mats.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 6
    certstrap

    certstrap

    Tools to bootstrap CAs, certificate requests, and signed certificates

    ...The spaces will be preserved inside the fields of the generated files. certstrap requires either -common-name or -domain flag to be set in order to generate a certificate signing request.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    mkcert

    mkcert

    Zero-config tool to make locally trusted development certificates

    ...Managing your own CA is the best solution, but usually involves arcane commands, specialized knowledge and manual steps. mkcert automatically creates and installs a local CA in the system root store, and generates locally-trusted certificates. mkcert does not automatically configure servers to use the certificates, though, that's up to you. The CA certificate and its key are stored in an application data folder in the user's home. You usually don't have to worry about it, as the installation is automated, but the location is printed by mkcert -CAROOT.
    Downloads: 174 This Week
    Last Update:
    See Project
  • 8
    Hetty

    Hetty

    An HTTP toolkit for security research

    ...Intercept requests and responses for manual review (edit, send/receive, cancel) Scope support, to help keep work organized. Easy-to-use web-based admin interface. Project-based database storage, to help keep work organized.
    Downloads: 61 This Week
    Last Update:
    See Project
  • 9
    wholeaked

    wholeaked

    Tool that embeds identifiers in files to trace leak sources

    ...By integrating metadata signatures into each distributed file, wholeaked makes it easier to track potential data leaks while maintaining a structured record of distribution. Overall, it provides a practical method for accountability and leak attribution when sharing confidential files.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Intelligent Automation Solutions Built for Modern Finance Teams Icon
    Intelligent Automation Solutions Built for Modern Finance Teams

    We do CFO stuff.

    Digitally transform your business with workflow automation and integrated payment solutions. Digitally store and secure your data with advanced search and accessibility features that keeps your documents at the tip of your team’s fingers.
    Learn More
  • 10
    GoSpider

    GoSpider

    Gospider - Fast web spider written in Go

    GoSpider - Fast web spider written in Go. Fast web crawling. Brute force and parse sitemap.xml. Parse robots.txt. Generate and verify link from JavaScript files. Link Finder. Find AWS-S3 from response source. Find subdomains from the response source. Get URLs from Wayback Machine, Common Crawl, Virus Total, Alien Vault. Format output easy to Grep. Support Burp input. Crawl multiple sites in parallel.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 11
    Insider

    Insider

    Static Application Security Testing (SAST) engine

    Static Application Security Testing (SAST) engine focused on covering the OWASP Top 10, to make source code analysis to find vulnerabilities right in the source code, focused on agile and easy-to-implement software inside your DevOps pipeline. Support the following technologies: Java (Maven and Android), Kotlin (Android), Swift (iOS), .NET. Insider is focused on covering the OWASP Top 10, to make source code analysis to find vulnerabilities right in the source code, focused on a agile and easy to implement software inside your DevOps pipeline. We currently support the following technologies: Java (Maven and Android), Kotlin (Android), Swift (iOS), .NET Full Framework, C#, and Javascript (Node.js).
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    CloudBrute

    CloudBrute

    Awesome cloud enumerator

    A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, Linode). The outcome is useful for bug bounty hunters, red teamers, and penetration testers alike. While working on HunterSuite, and as part of the job, we are always thinking of something we can automate to make black-box security testing easier.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    horcrux

    horcrux

    Split your file into encrypted fragments

    ...The tool provides a “split” command to create the fragments and a “bind” command to recombine them to the original file. It’s especially aimed at people who want strong security for sensitive large files and want to avoid remembering complex pass-codes, and also those who may distribute fragments across multiple locations. The logic is built on Go’s crypto libraries and the underlying Shamir implementation, with an emphasis on simplicity and security rather than password-based keying.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14
    Trousseau

    Trousseau

    File based encrypted key-value store

    ...Create a trousseau data store, add some key-value pairs to it, push it to S3 and re-import it from another device or simply sync it over Dropbox. Safe data sharing had never been that simple! Secrets are made to be shared, just not with anyone. Whether you're an admin, a paranoid guy living in a bunker, or a random user who seeks a simple way to store it's critical data in secured manner.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    AQUATONE

    AQUATONE

    A tool for domain flyovers

    ...Aquatone is designed to be as easy to use as possible and to integrate with your existing toolset with no or minimal glue. Aquatone is started by piping output of a command into the tool. It doesn't really care how the piped data looks as URLs, domains, and IP addresses will be extracted with regular expression pattern matching. This means that you can pretty much give it output of any tool you use for host discovery. Aquatone is now completely focused on screenshotting and reporting. I know a lot of people used Aquatone for its DNS enumeration capabilities and it was definitely very good at that when it was released. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    goim

    goim

    goim is a im server writen by golang

    ...You can view the comments in target/comet.toml,logic.toml,job.toml to understand the meaning of the config. Install comet/logic/job modules and use Supervisor management (You might need to change the configuration files based on your servers).
    Downloads: 4 This Week
    Last Update:
    See Project
  • 17
    goRBAC

    goRBAC

    goRBAC provides a lightweight role-based access control (RBAC) in Go

    ...Although you can adjust the RBAC instance anytime and it's absolutely safe, the library is designed for use with two phases, preparing and checking. Also, you can implement gorbac.Role and gorbac.Permission for your own data structure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Firefly

    Firefly

    A proxy software to help circumventing the Great Firewall

    Firefly is an agent used to access Great Firewall (GFW) blocked websites and applications. Under the default settings, Firefly only goes through VPN forwarding wall of IP traffic, IP wall straight. If you find a website or application you cannot access, Firefly flow mechanism can be built to distinguish between an error. In this case, you can choose to forward all traffic through the VPN, and then try again.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    GORSK

    GORSK

    Idiomatic Golang Restful Starter Kit

    There are many ways to write a (RESTful) backend in Go. Most of the available tutorials are way too simple, with all the presented content fitting into a single file (or at most two-three). More complex examples are quite rare, and even most of them miss lots of things for the sake of reducing complexity. That’s one of the reasons I wrote Gorsk - to have a fully functional example of a RESTful backend (in Golang) utilizing best practices, idiomatic code, and minimal dependencies. Instead of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    goflyway

    goflyway

    An encrypted HTTP server

    ...However pure HTTP requesting is definitely a waste of bandwidth if you already have a better network environment, so use -w to turn on WebSocket relay, or -K to turn on KCP relay if possible. In HTTP mode when the server received some data it can't just send them to the client directly because HTTP is not bi-directional, instead, the server must wait until the client requests them, which means these data will be stored in memory for some time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Gitrob

    Gitrob

    Scans GitHub repositories for potentially sensitive files

    Gitrob is an open source reconnaissance tool designed to identify potentially sensitive files that have been committed to public GitHub repositories. It helps security professionals, researchers, and organizations detect accidental data exposure by scanning repositories associated with specific GitHub users or organizations. The tool works by cloning repositories and analyzing their commit history to search for files that match predefined signatures of sensitive data. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    Notary

    Notary

    Have trust over arbitrary collections of data

    Notary is a project that aims to make the internet more secure by simplifying how people publish and verify content. The Notary project is made up of a server and a client made to run and interact with trusted collections. Instead of relying on TLS to secure communications with a web server that's susceptible to malicious content, publishers can sign their content offline using secure keys with Notary. Once ready to make the content available, publishers can then push their signed trusted...
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB