Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files" - Page 6

Showing 266 open source projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

View related business solutions
  • Get full visibility and control over your tasks and projects with Wrike. Icon
    Get full visibility and control over your tasks and projects with Wrike.

    A cloud-based collaboration, work management, and project management software

    Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
    Learn More
  • Create and run cloud-based virtual machines. Icon
    Create and run cloud-based virtual machines.

    Secure and customizable compute service that lets you create and run virtual machines.

    Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
    Try for free
  • 1
    BlackWidow

    BlackWidow

    Python web scanner for OSINT gathering and OWASP vulnerability fuzzing

    ...It functions as a web spider that systematically explores a site to gather valuable information such as URLs, dynamic parameters, subdomains, email addresses, and phone numbers associated with the target domain. By automatically extracting this data, BlackWidow helps security professionals and researchers build a clearer understanding of a website’s structure and publicly accessible information. In addition to information gathering, the project includes a built-in fuzzing component called Inject-X, which tests dynamic URLs for common vulnerabilities listed in the OWASP Top 10. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Hackingtool

    Hackingtool

    ALL IN ONE Hacking Tool For Hackers

    HackingTool by Z4nzu is a large collection (“all-in-one”) of tools and scripts for penetration testing / hacking / OSINT etc. It bundles many utilities (port scanners, payload injectors, web attack tools, phishing tools, wireless attack tools, reverse engineering, etc.) into a menu interface. Includes many individual tools, often wrappers or aggregations of existing well-known tools (e.g. port scanners, web attack tools, steganography, hash cracking etc.). A menu interface offering...
    Downloads: 18 This Week
    Last Update:
    See Project
  • 3
    KeyGen

    KeyGen

    Cards based password storer

    Forgot your password or want to create new one that can never be guessed? That's KeyGen is for: make you not to remember all these passwords for countless amount of services. KeyGen provides cards based interface which makes the app easy to deal with.
    Downloads: 43 This Week
    Last Update:
    See Project
  • 4
    gasmask

    gasmask

    All-in-one OSINT tool for reconnaissance and domain intelligence

    ...These sources include services like Shodan, Censys, Netcraft, VirusTotal, GitHub, and various DNS-related services, allowing investigators to build a comprehensive profile of a domain or organization. GasMasK is commonly used by penetration testers, red teams, and security researchers who need to collect reconnaissance data.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Share your screen instantly while on a phone call with CrankWheel for an engaging presentation. Icon
    Share your screen instantly while on a phone call with CrankWheel for an engaging presentation.

    For salespeople and customer service agents who want to compliment their phone calls with visual elements.

    Our 10x simpler screen sharing tool is designed for you if you spend your days on the phone with clients, and need to add a visual presentation to close sales. No more scheduling a follow-up meeting, or teaching them to use a complex tool. Send them a text message or email, and they see your screen in seconds.
    Learn More
  • 5

    Terminal File Encrypter

    Command Line File Encrypter / Decrypter, Using AES256-CBC Cryptography

    Command Line File Encrypter / Decrypter, Using AES256-CBC Cryptography Python 3.x Or Higher Required Requires To Be Installed - Open CMD / Terminal window, navigate to folder with the encrypter files. Type "pip3 install Setup.py" without quotes. Read Syntax (Readme).txt file for instructions on use. To Uninstall - Open CMD / Terminal window, first type "pip3 list" without quotes. You Should See Terminal File Encrypter listed. Please Note pip3 may list the name differently for example it may have underscores, etc in the name. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    AttackSurfaceMapper

    AttackSurfaceMapper

    Automated tool for mapping & expanding organization’s attack surface

    AttackSurfaceMapper (ASM) is a reconnaissance and attack surface discovery tool designed to automate the process of mapping potential targets within an organization's infrastructure. It combines open source intelligence (OSINT) with selective active reconnaissance techniques to expand and analyze a target’s external attack surface. Users can supply domains, subdomains, or IP addresses as input, and applies multiple discovery methods to identify additional related assets such as new...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    Fav-up

    Fav-up

    Look up IP addresses using favicon hashes via Shodan

    ...This technique is commonly used in security research and OSINT investigations to discover related infrastructure or services that may belong to the same organization. fav-up can retrieve favicon data from several sources, including local files, direct favicon URLs, or full web pages where the favicon is automatically extracted. fav-up then computes the favicon hash and performs Shodan queries to locate IP addresses that match the same hash. To support larger investigations, the tool can iterate over lists of URLs, domains, or favicon files in bulk. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Buster

    Buster

    OSINT tool for discovering information linked to email addresses

    ...It helps investigators, security researchers, and penetration testers discover publicly available information related to email addresses and usernames. It can analyze an email address to identify associated social media accounts, references across the web, and potential data breaches linked to that email. It also performs reverse WHOIS lookups to discover domains that may have been registered using a specific email address. In addition to investigating existing addresses, Buster can generate possible email combinations and usernames based on personal details such as a person’s name, birthdate, or additional hints. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9
    CTS Surveyor

    CTS Surveyor

    Foot traffic and facial analytics for your business and home

    Surveyor is a software solution that monitors its environment via camera and gathers demographic information about the public in the surrounding area, providing important statistics such as number of people passing by as well as providing facial analytics to classify the pedestrians based on their age and gender. The statistical data is stored in a local database and is made available via RESTful API’s, and easy integration with other applications can be accomplished via a WebSocket interface that provides live notifications about people in the camera’s field of view At the moment, the solutions is available for Windows only, with Linux version coming soon – please see our User Guide at http://caerustech-solutions.com/demo/User_Guide.pdf Sample Python client: https://github.com/CaerustechSolutions/cts-surveyor-pyclient Contact Us: http://caerustech-solutions.com/contact-us/
    Downloads: 1 This Week
    Last Update:
    See Project
  • Infoflo CRM Software Icon
    Infoflo CRM Software

    Focus less on your CRM and more on your business

    Infoflo is an easy to use CRM that is perfect for managing customer relationships and includes the most robust Outlook sync on the market! It is a fully integrated contact, relationship, email, calendar, document, sales, task management solution and VoIP. It includes a Quick Books, Outlook and Google Sync.
    Free Trial
  • 10
    Secret File

    Secret File

    File Encryption/Decryption using password

    Secret File is a free and easy to use encryption/decryption app that can encrypt nearly any kind of file format using passwords. Files can be stored as personal or sent over the internet as confidential as the data of files are securely encrypted at the binary level itself and can be decrypted at any time and anywhere. You can also use multi-level protection for more secureness.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11

    ParamIT

    a Toolset for Molecular Mechanical Force Field Parameterization

    ParamIT is a toolkit aiding the development of molecular mechanical force field parameterization of small, drag like, molecules within CHARMM general force field (CGenFF) protocol. The developed toolkit helps the researchers in following ways: 1) automating the creation of multiple input files for quantum and molecular mechanics programs, 2) automating the output analysis and 3) substitute the use of full MM programs with a faster specialized one. The developed tools include: 1) generator of molecule-water complexes with graphical user interface (GUI), 2) semi-automatic frequency analysis using symbolic potential energy distribution matrix and comparison of optimized internal coordinates, 3) GUI for charge fitting with three modes: manual, Monte-Carlo sampling or brute force, and 4) GUI for dihedral terms fitting. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    BLESS

    BLESS

    An SSH Certificate Authority that runs as an AWS Lambda function

    BLESS is an SSH Certificate Authority that runs as an AWS Lambda function and is used to sign SSH public keys. SSH Certificates are an excellent way to authorize users to access a particular SSH host, as they can be restricted for a single-use case, and can be short-lived. Instead of managing the authorized_keys of a host, or controlling who has access to SSH Private Keys, hosts just need to be configured to trust an SSH CA. BLESS should be run as an AWS Lambda in an isolated AWS account....
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    Photon

    Photon

    Incredibly fast crawler designed for OSINT

    Photon is an extremely fast web crawler built specifically for OSINT and reconnaissance use cases. It is designed to extract URLs, endpoints, files, and other intelligence artifacts from target websites with minimal overhead. The crawler prioritizes speed and breadth, making it suitable for mapping web attack surfaces and discovering hidden resources. Photon is commonly used during early reconnaissance phases to build a comprehensive inventory of reachable assets. Its Python implementation makes it accessible for customization and integration into larger automation frameworks. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 14
    Offensive Web Testing Framework

    Offensive Web Testing Framework

    Offensive Web Testing Framework (OWTF), is a framework

    ...Demonstrate true impact despite the short timeframes we are typically given to test. The tool is highly configurable and anybody can trivially create simple plugins or add new tests in the configuration files without having any development experience. OWTF is developed on KaliLinux and macOS but it is made for Kali Linux (or other Debian derivatives).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Xplico

    Xplico

    Xplico is a Network Forensic Analysis Tool (NFAT)

    Xplico is a Network Forensic Analysis Tool (NFAT). The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP, MGCP, MEGACO, RTP), IRC, WhatsApp... Xplico is able to classify more than 140 (application) protocols. Xplico cam be used as sniffer-decoder if used in "live mode" or in conjunction with netsniff-ng.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 16

    CryptoFlouze

    This software display the last prices of the top 20 cryptocurencies

    This software download and display the last prices of the top 20 cryptocurrencies on the market. All the data are updated at every run. The data is downloaded from : https://coinmarketcap.com/api/ For windows : Download this zip file, unzip everything in the same directory. The data are updated at every run. For other operating systems : Run it from the source. https://github.com/hamdyaea/CryptoFlouze Developer - Author Hamdy Abou El Anein
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    httpshell is an interactive https command exploit to test the perimeter security of your network. This is a customized HTTPS encrypted reverse shell. It illustrates how easy to bypass any perimiter firewall and IPS by simply encrypting the data. To list all connecting clients: sulod -l To interact with existing client sessions: sulod -i <number> by Nelson Maligro
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    iTelliHashCSV

    iTelliHashCSV

    Cryptographic Hashing Application for CSV Files

    iTelliHashCSV is a cryptographic “one-way” hashing application designed to securely protect sensitive or private information from disclosure. Proper use of this program allows organizations, businesses, and individuals (i.e., the data owners) to share complete/intact datasets containing sensitive data with others without actually disclosing the sensitive or private information. Additionally, if such datasets are subsequently modified or enhanced through value-added services or products provided by other organizations or individuals and then returned, the data owner retains the ability to “re-map” the hashed sensitive data values back to their original values.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    tinfoleak

    tinfoleak

    OSINT tool for extracting and analyzing Twitter intelligence data

    ...It also processes content such as hashtags, mentions, media files, and metadata to identify trends and relevant connections. Additional analysis features help uncover geolocation information, visited places, and user movement patterns when location data is available.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 20
    ParaCrypt

    ParaCrypt

    more convenient one-time-pad encryption.

    ParaCrypt is software for encrypting and decrypting data with one-time-pads. For convenience the one-time-encryption-pads are created using pre-shared unencrypted files as sources of entropy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    safelock

    safelock

    Basic AES files encryption tool

    Simple drag & drop file encryption tool. based on python and uses PyCrypto to encrypt the inputted files with AES encryption. Then sqlite database file is generated with a unique key to store the encrypted files and folders in binary blobs for later decryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    leet

    leet

    Leet is CCEx's software application for on-the-fly encryption (OTFE).

    ...The goal of leet however is to be simpler and as user friendly as possible, making encryption and securing of information accessible to anybody, even those who don't necessarily have any prior knowledge of data securing, algorithms and encryption. However it's not targeted at this group of users only, part of the ambition of this project is to reach companies, institutions, governments (etc...) as well.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    pydictor

    pydictor

    powerful and useful hacker dictionary builder for a brute-force attack

    ...You can use pydictor to generate a general blast wordlist, a custom wordlist based on Web content, a social engineering wordlist, and so on; You can use the pydictor built-in tool to safe delete, merge, unique, merge and unique, count word frequency to filter the wordlist, besides, you also can specify your wordlist and use '-tool handler' to filter your wordlist. You can generate highly customized and complex wordlists by modifying multiple configuration files, adding your own dictionary, using leet mode, filter by length, char occur times, types of different char, regex, and even add customized encode scripts in /lib/encode/ folder, add your own plugin script in /plugins/ folder, add your own tool script in /tools/ folder.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 24
    DeID Tool

    DeID Tool

    De-Identification tool to remove sensitive data

    This tool converts pipe separated text data into a csv file and also removes all the patient related sensitive data. It takes raw data as input from a text file and process the data thereby, generates a csv file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    PentDroid

    Small tool for apk operations required during android app pentesting

    Tools consist of mini modules which automates and reduces tester efforts for setting up the basic environment and typing long tool queries . For Installation guide refer : https://github.com/vishwaraj/PentDroid/blob/master/README.md
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB