Get full visibility and control over your tasks and projects with Wrike.
A cloud-based collaboration, work management, and project management software
Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
Learn More
Turn speech into text using Google AI
Accurately convert voice to text in over 125 languages and variants by applying powerful machine learning models with an easy-to-use API.
New customers get $300 in free credits to spend on Speech-to-Text. All customers get 60 minutes for transcribing and analyzing audio free per month, not charged against your credits.
aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump, aireplay, aircrack, airdecap, and some tools to handle capture files (merge, convert, etc.).
Pqmf is an open source project which inted to create a strong alternative to PGP. Using Pqmf you will be able to to safeguard your private files under 160bits long Keys in the simplest way posible, just choose a file set a password and voila!.
TextCode 1.4 is a small security program for encrypting/decrypting of text files (.txt, .rtf, .html etc.). You can encrypt any text files using a password. Latest Edition: TextCode 1.4 (compatible with files encrypted by TC 1.3, infos in the program!)
Multispoof exploits weak authentication method based on IP-MAC pairs checking, implemented frequently in Ethernet networks by ISPs. This program allows to multiply user's throughput and serves as a demonstration of spoofing effectiveness.
A no-code toolkit for building responsive and resilient mobile business applications for Microsoft Power Platform, Dynamics 365, Dataverse and Salesfo
Deploying mobile apps with Resco takes days, not months—all without writing a single line of code. Workers can download the Resco app from AppStore, Google Play, or Windows Store, log into your company environment, and instantly use the app you have published on any device.
Screenalert, are notifications windows styled, every user/program can send an alert on your display. Alerts can be permanent or disappear after x seconds. Several themes are available for toaster popup. It is entirely gtk based and is licensed under the
Gate Guardian is a library of C/C++ functions that can be used to avoid common security problems when a process forks or is forked from a parent process, or runs / is run by an external program. The code is meant to be portable across many UNIX variants.
pamtester is a tiny utility program to test the pluggable authentication modules (PAM) facility, specifically designed to help PAM module authors to intensively test their own modules.
KINEC Is Not Encrypted Chat is a client/server chat program designed to keep you secure. It uses strong algorithms for encryption and authentication and will not compromise security.
yafic is Yet Another File Integrity Checker, similar to Tripwire. yafic, however, is fast, simple, and yet flexible. Config files are similar to Tripwire's, even supporting flag templates. It uses SHA-1 as its hash function.
loginote is a program to immediately display a note on screen (using xosd) when a user logs into the system or logs out again. Just imagine someone knows your password and you might be interested when he/she logs into your system.. ;). loginote will tell
bddshell is a command line program for deductive database-based analysis. Its primary focus is software vulnerability detection. It acts as a front-end to a number of other programs, such as bddbddb and joeq.
CryptoHelper is a Java program designed to aid in the decryption of classical ciphers, ie pre WWII ciphers. It brings together tools like frequency analysis, friedman tests, enciphering/deciphering for several clasical ciphers, and brute force algorithm
Powerful password manager program with:
- Use OpenSSL
- Based on Plug-ins structure
- NT Authorization
- Multi-user
- Make movable media
- Auto fill HTML form
- Remember password of applications
- Backup/Restore
- Import/Export
(and more...)
The software implements an adaptive steganography algorithm called Adaptive Minimum Error Least Significant Bit Replacement(AMELSBR) along with AES 128, 192 and 256 bit cipher for 24-bit bitmap files.
Web Scanner is a command-line program that is designed to scans web servers to find default and potentially vulnerable web pages. 2.0 - Java, 1.3 - Perl
Web scanner supports both HTTP and HTTPS protocols and can be configured to use custom data files.
XSServer is a system, which is intented to be an easy way to configure dhcp, iptables and squid in order to make possible to have those working together at once, generating the needed config files for each.
SharedSecret is a program used to negotiate a shared secret (password) by two hosts in secure way over the Internet. The software is written in C, based on client/server architecture with initial intention to run on POSIX-Compliant Operating Systems.
script_setuid is a simple but secure wrapper, that enables an interpreted program such as shell and/or python scripts to be run with different privileges.
tcpick is a textmode sniffer; it tracks tcp streams, shows the status, reassembles and saves the data captured in files or displays them in the terminal in different modes (ascii, hex..). There is a color-mode. Useful to get files passively.
This is an experimental program that encrypt/decrypt/divide/join files. This program uses a new algorithm made by me, this algorithm is experimental and I working on it, every day this algoritm will be better.
A Java program to encrypt files and make them relatively safe for transfers across networks. Currently just in commandline form, but an application is in the works.
EtherMan: Ethernet Man In The Middle Attack Tool. It is capable of forcing traffic between two hosts to pass by a third party (MITM) and then redirected to its original destination again.
This program is written for educational reasons, and I am not res
Security Advisor is a program designed to analyze and report security issues beyond application vulnerabilities. The program will analyze system and network configurations to recommend ways for improving security.
Multiprecision unsigned number template library (MUNTL).
The program is intended for the organization of calculations with the big
precision for unsigned numbers. Program is very fast because do not use any heap call (new, malloc etc.)