Search Results for "c:\program files\micronetics\msmws\program\" - Page 22

Showing 546 open source projects for "c:\program files\micronetics\msmws\program\"

View related business solutions
  • A warehouse and inventory management software that scales with your business. Icon
    A warehouse and inventory management software that scales with your business.

    For leading 3PLs and high-volume brands searching for an advanced WMS

    Logiwa is a leader in cloud-native fulfillment technology, revolutionizing high-volume fulfillment for third-party logistics (3PLs), B2B and B2C fulfillment networks, and direct-to-consumer brands. Our flagship product, Logiwa IO, is an advanced Fulfillment Management System (FMS) designed to scale operations in the digital era. Logiwa elevates digital warehousing to new heights, ensuring dynamic and efficient fulfillment processes. Our commitment to AI-driven technology, combined with a focus on customer-centricity, equips businesses to adeptly navigate and excel in rapidly changing market landscapes. Discover the future of smart fulfillment and how you can fulfill brilliantly with Logiwa IO.
    Learn More
  • Monitoring, Securing, Optimizing 3rd party scripts Icon
    Monitoring, Securing, Optimizing 3rd party scripts

    For developers looking for a solution to monitor, script, and optimize 3rd party scripts

    c/side is crawling many sites to get ahead of new attacks. c/side is the only fully autonomous detection tool for assessing 3rd party scripts. We do not rely purely on threat feed intel or easy to circumvent detections. We also use historical context and AI to review the payload and behavior of scripts.
    Learn More
  • 1
    Enkript is an user-friendly file ciphering program. It uses the popular algorithms MD5 and IDEA (used in PGP, for example). It detects automatically whether to encrypt or decrypt the given file, and badly deciphered files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    A peer-to-peer chat program that uses public key encryption (via Gnu Privacy Guard) to keep your conversations from the eyes of packet sniffers (*Cough* Carnivore *Cough*)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    hping2 is an interactive packet costructor and responses analyzer that uses the same CLI of the ping program (but with a lot of extensions). It can be used to performs a lot of tasks, like testing of firewall rules, (spoofed) port scanning, et cetera.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    SocketWatch is an anti-port scanning program. SocketWatch is configured to listen to specified ports, and if a connection is made from an unauthorized host, Ipchains is used to completely DENY the host.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Hightouch is a data and AI platform for marketing and personalization. Icon
    Hightouch is a data and AI platform for marketing and personalization.

    Marketing needs data and AI. Give them Hightouch.

    Find insights, run real-time campaigns, and build AI agents with all your data.
    Learn More
  • 5
    Sportal is made for people that need to know what is going on in their systems. It monitors files that you select, for "hot words" that you also select, through a graphical interface.This is work in progress, i spect it to grown to a full IDS.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    We at GCD are here to bring you ease in decoding your friends CRYPTIC GeekCode .signature files -=). Also sometime in the future we plan to eventualy start an ENCODER to help you even more!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A modular steganography program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Xitadel is a documentation platform for managing different types of security projects.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A command line tool written in C++ that analyzes the source files of a C program to represent the pattern of its system calls in terms of a LALR(1) grammar.
    Downloads: 0 This Week
    Last Update:
    See Project
  • ToogleBox: Simplify, Automate and Improve Google Workspace Functionalities Icon
    ToogleBox: Simplify, Automate and Improve Google Workspace Functionalities

    The must-have platform for Google Workspace

    ToogleBox was created as a solution to address the challenges faced by Google Workspace Super Admins. We developed a premium and secure Software-as-a-Service (SaaS) product completely based on specific customer needs. ToogleBox automates most of the manual processes when working with Google Workspace functionalities and includes additional features to improve the administrator experience.
    Learn More
  • 10
    This program makes it possible to transfert files from a computer to another via SSL/TCP/IP. It is composed of a part to listening of possible requests, the server, and of one or more customers. Pure Java program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Kernel module designed to stealthily trace a userland Linux program from kernel space.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The program uses a number of processes to brute-force crack MD5 hashes. MD5 brute-force cracking involves hashing all possible strings and each time compare the obtained hash to the one we are trying to crack
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Licence server is designed to licence your own terminal application. You can integrate these codes into your client program by a few simple changes in a code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Easy Encryptor is a cross-platform encryption program designed to be of high secure standard, and easy to use even for users with no knowledge of cryptography algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    themaRegister

    themaRegister

    themaRegister - register to forums and blogs

    themaRegister is an auto register to forums and blogs. It has build-in email client, automatic account confirmation, captcha solving services support and more. The program helps to register to forums and blogs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Enpct (Easy Network Packet Crafting Tool) allows you to generate network packets to check firewalls or other network equipment. The packets can be precisely described in configuration files. It also supports fragmentation based network attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Black Hole is a GPG frontend. The GUI has is file browser where you can drag and drop your files for being encrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    KomodoPGMP is a cryptographic protection and compression tool for executable files. The project takes malicious code enhanced privacy to the next level.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Tulihänd is a security tool that aims to protect files on a filesystem. It collects information about them and compares with a specification in order to highlight modifications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    ethernet host availibality monitoring (logging to sql/file) checks active hosts with database/files active operation - contously sends out arp packets and tries to detect promiscous mode enabled machines
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    SecondFaqtor

    SecondFaqtor

    Two-Factor Authenticator for Linux.

    ...SecondFaqtor supports Time-based One Time Passwords, which can be added directly, using a QR Code, or with an OTPAUTH URL. Your Secrets are stored securely for your local account, with the option to protect the program with a password for advanced security. The main window of SecondFaqtor provides quick access to multiple authentication profiles and lists not only the present code, but the last code and the next one as well, for ultimate convenience. Codes are copied automatically on click, saving you time and energy. Advanced support for SHA1, SHA256, and SHA512 is included by default, with either 6 or 8 digit codes, and a rolling time period of anywhere between one second to one day. ...
    Downloads: 0 This Week
    Last Update:
    See Project