Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files" - Page 4

Showing 368 open source projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

View related business solutions
  • Securden Privileged Account Manager Icon
    Securden Privileged Account Manager

    Unified Privileged Access Management

    Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.
    Learn More
  • Get full visibility and control over your tasks and projects with Wrike. Icon
    Get full visibility and control over your tasks and projects with Wrike.

    A cloud-based collaboration, work management, and project management software

    Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
    Learn More
  • 1

    BroBu converT

    Convert .txt files into .brobu files

    BroBu converT can convert .txt files into .brobu files which can be used in our codeZ application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    codeZ

    A program to en/decrypt texts that are only crackable using bruteforce

    codeZ is a program that can encrypt/decrypt texts that are not crackable without using brute-force attacks. It supports loads of characters, including symbols like brackets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    JChecksum

    JChecksum

    MD5 Checksum Tool

    This tool checks the integrity of files. It is very important if you don’t want your computer to get infected with viruses and malware. Sometimes, hackers and malicious software developers modify the contents of a downloadable zip, which can even result in granting them remote access to your system. While downloading various software, you might have noticed that developers usually provide hash values (MD5) of their files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Directory control

    Hot directory

    Control changes in the choosen folder. Choose a log file with the changes within. It's recommended to use Java 8. The directory is not controlled recursively, thus if files are added or deleted in other folders it is not showed. Only things in the folder choosen. Just start a new pararell session to control another folder. Start it with "java -jar file.jar" or with the .bat file as example. You may also start it in the background with "start javaw -jar DirecHashC.jar" .
    Downloads: 0 This Week
    Last Update:
    See Project
  • Comet Backup - Fast, Secure Backup Software for MSPs Icon
    Comet Backup - Fast, Secure Backup Software for MSPs

    Fast, Secure Backup Software for Businesses and IT Providers

    Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
    Learn More
  • 5
    CryptoToolsPack

    CryptoToolsPack

    Basic encode/decode, files comparison and protect sensitive data

    This pack includes the following: FCSG - generate checksum and perform file comparison; JCryptoTool - encrypt/decrypt messages and files; JWallet - password protect sensitive information. See Help menu in each application, Source code included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Google Authenticator OpenSource

    Google Authenticator OpenSource

    Open source version of Google Authenticator (except the Android app)

    Google Authenticator is the open-source counterpart of Google’s one-time passcode apps, implementing industry-standard OATH algorithms such as TOTP (time-based) and HOTP (counter-based) for two-factor authentication. The repository historically hosts code for mobile platforms like iOS and BlackBerry, demonstrating how to generate numeric codes locally without needing network access. Its core purpose is to help services and users add a second factor that’s simple to deploy yet resistant to...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    MicroZip

    MicroZip

    Create,extract and encrypt ZIP,GZIP,TAR,BZIP2,TAZ files on Java mobile

    ...MicroZip can create and extract ZIP,TAR,TGZ,TBZ2 archives and extract many other formats as JAR,GZ,BZ2,TBZ,WAR,BZIP2,GZIP,Z,TAZ,CBZ etc. MicroZip allows you to extract selected files without extracting the whole ZIP archive. MicroZip also supports encrypted ZIP archives with both classic ZIP encryption and AES 256 encryption algorithm.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    CloudSafe

    CloudSafe

    Smart and safe cloud-based credential manager

    CloudSafe is a credential manager that can store all your access informations (applications, sites, gadgets, ...), in your Google Drive account: all data are encrypted with a master password (AES-128) and all netowork operations are protected by your Google Account and HTTPS connections. The source code is open and you are free to check the security solution.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    BoarderZone ASNalyzer
    A 100% pure Java Swing ASN.1 analysis utility for inspecting arbitrary BER-encoded data files. It allows inspection of data with unknown structure, can drill down to any nesting level and allows to interpret embedded OCTET STRING data recursively.
    Downloads: 10 This Week
    Last Update:
    See Project
  • The AI-powered unified PSA-RMM platform for modern MSPs. Icon
    The AI-powered unified PSA-RMM platform for modern MSPs.

    Trusted PSA-RMM partner of MSPs worldwide

    SuperOps.ai is the only PSA-RMM platform powered by intelligent automation and thoughtfully crafted for the new-age MSP. The platform also helps MSPs manage their projects, clients, and IT documents from a single place.
    Learn More
  • 10

    IP2LocationLookupTool

    Allow you to lookup IP address with geo-location information

    ... * Country * Region * City * Latitude & Longitude * ZIP Code * Time Zone It supports both the IPv4 and IPv6 address. Please take note that this component requires the “IP2Location DB11 BIN” data file and “IP2Location Java Component” to function. Below are the download links: * IP2Location DB11.LITE BIN (free version): https://lite.ip2location.com/database/ip-country-region-city-latitude-longitude-zipcode-timezone * IP2Location DB11 BIN (commercial version): https://www.ip2location.com/databases/db11-ip-country-region-city-latitude-longitude-zipcode-timezone * IP2Location Java Component: https://github.com/ip2location/ip2location-java SUPPORT Home page: https://www.ip2location.com Email: support@ip2location.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    OpenShredder

    OpenShredder

    File Shredder Project

    Openshredder is os independent secure file deletion tool.It is very light weight and useful.It uses standard Zero and DoD algorithms.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    With this application you can encrypt texts or files and chat with friends. You can download a early Android version of the chat client from here: https://drive.google.com/uc?export=download&id=0BwePHaWdtoMweWRyMExqbHZyUEk Hint: I started this project because i have fun to write java apps. This app is not professional. I don´t recommend using this to encrypt very important data (for example of your company ...).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Hash

    Hash

    Hash: File Checksum Generator

    Hash is fast and simple java utility program for calculating and verifying checksums for files and text. Hash can generate MD5, SHA-1, SHA-256, SHA-384 and SHA-512 checksum values.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14

    TLSBench

    A tool for benchmarking the TLS performance of Cloud database systems.

    TLSBench is a tool for benchmarking the performance of Transport Layer Security (TLS) in cloud storage systems / cloud database systems like Apache Cassandra, Apache HBase, and Amazon's DynamoDB. This tool is built for research purposes. A paper which describes the general benchmarking approach and some experiments is available here: http://www.aifb.kit.edu/images/5/58/IC2E2014-Performance_Overhead_TLS.pdf.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    PasswordManager

    PasswordManager

    Simple Password Manager

    ...With a very simple gui and using AES encryption I solved my problem. You can group your accounts in a single file and multiple users can save their passwords in different files. version3.1 remove version checking that becomes annoying. version3 *Keyboard short cuts for menu items *Configuration file, account form display time and time before asking the password again before displaying account form can be configured. *Open Last open file menu item version2.2 *simple password manager icon *password suggestion frame *copy to clipboard buttons *menu icons version 2.1 *Version checker version 2 *GUI changes *Account window automatically shut down after 5 minutes *bug fix description search *user manual version 1.1 *input boxes are changed to password boxes. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    jCrypto

    jCryptor is a Java-based cryptographic tool used for any file type

    jCryptor is a Java-based cryptographic tool used for any kind of file. It implements the Data Encryption Standard (DES) to encrypt and decrypt files. The Graphical user interface is based on the java-swing components. It is fast and efficcient
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    dex2jar

    Tools to work with android .dex and java .class files

    ...It reads the dex instruction to dex-ir format, after some optimize, convert to ASM format. * dex-ir used by dex-translator, is designed to represent the dex instruction dex-tools tools to work with .class files. * d2j-smali disassemble dex to smali files and assemble dex from smali files. different implementation to smali/baksmali, same syntax, but we support escape in type desc "Lcom/dex2jar\t\u1234;" * dex-writer write dex same way as dex-reader.
    Leader badge
    Downloads: 1,512 This Week
    Last Update:
    See Project
  • 18

    SilverTunnel-NG

    Java library for easy accessing Tor network.

    ...The library requires Java 1.6/Java SE 6 or a newer version. This is a fork of silvertunnel (https://silvertunnel.org) Version (0.0.4) is deployed to maven. Since Version 0.0.4 SilverTunnel-NG also runs on Android. YourKit is kindly supporting this open source project with its full-featured Java Profiler. YourKit, LLC is the creator of innovative and intelligent tools for profiling Java and .NET applications. Take a look at YourKit's leading software products: http://www.yourkit.com/ . Automatic Builds and Tests are done with DEV@CloudBees : https://silvertunnel-ng.ci.cloudbees.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    GPGUI - PGP GUI

    GPGUI - PGP GUI

    GUI wrapping GnuPG functionality provided by Bouncy Castle

    The GPGUI program is GUI wrapping GnuPG functionality provided by Bouncy Castle. The program allows you to encrypt/sign/decrypt text messages and files using asymmeric PGP keys. The program can read and manage GnuPG keys if GnuPG is installed. But the program also maintains its own secret and public key files and having GnuPG installed is optional.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    PswGenDroid

    PswGenDroid

    Generates your passwords managed by PswGen on your mobile

    PswGenDroid is the Android counterpart for PswGen. Based on the login information you entered with PswGen on your PC PswGenDroid re-generates your passwords depending on this data or shows a password you stored with PswGen. It's fully up to you how data (just a file) is synchronised or transferred to your mobile, therefore PswGenDroid doesn't need internet access or other rights but accessing your external storage, e.g. your SD card.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    BCrypta

    encrypt data

    With this application you can encrypt texts or files and chat with friends. How to start: -------- Windows: double-click on BCrypta.exe -------- Linux: java -jar BCrypta.exe -------- Console: java -jar BCrypta.exe --help
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Web Application Protection

    Web Application Protection

    Tool to detect and correct vulnerabilities in PHP web applications

    ...WAP detects the following vulnerabilities: - SQL injection using MySQL, PostgreSQL and DB2 DBMS - Reflected cross-site scripting (XSS) - Stored XSS - Remote file inclusion - Local file inclusion - Directory traversal - Source code disclosure - OS command injection - PHP code injection WAP is a static analysis tool that performs taint analysis to detect vulnerabilities, tracking malicious users inputs and checking if they reach calls of sensitive functions. It has a low rate of false positives because has implemented a data mining module to predict false positives when detects vulnerabilities. The output of the tool is: - shows the vulnerabilities found and how they are corrected - new files with the corrections
    Downloads: 12 This Week
    Last Update:
    See Project
  • 23
    AppUse

    AppUse

    Android Pentest Platform Unified Standalone Environment

    AppSec Labs recently developed the AppUse Virtual Machine. This system is a unique, free, platform for mobile application security testing in the android environment, and it includes unique custom-made tools created by AppSec Labs. AppUse Pro v3 is now available in AppUse website:
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    nogotofail

    nogotofail

    An on-path blackbox network traffic security testing tool

    nogotofail is a network security testing tool developed by Google to help developers and researchers identify weaknesses in TLS/SSL implementations and detect unencrypted traffic that could compromise sensitive data. The tool functions as an on-path man-in-the-middle (MiTM) testing system, allowing users to inspect and evaluate how applications and devices handle encrypted connections under real-world conditions. It can detect a wide range of vulnerabilities, including improper SSL certificate validation, library misconfigurations, and downgrade or stripping attacks such as SSL and STARTTLS stripping. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    CorReactive

    Event correlation engine with reactive facilities

    Correlation engine based on Esper library which can be used together with Logstash. Please read FAQ http://sourceforge.net/p/correactive/wiki/FAQ/
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB