Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files" - Page 18

Showing 1556 open source projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

View related business solutions
  • Data management solutions for confident marketing Icon
    Data management solutions for confident marketing

    For companies wanting a complete Data Management solution that is native to Salesforce

    Verify, deduplicate, manipulate, and assign records automatically to keep your CRM data accurate, complete, and ready for business.
    Learn More
  • Comet Backup - Fast, Secure Backup Software for MSPs Icon
    Comet Backup - Fast, Secure Backup Software for MSPs

    Fast, Secure Backup Software for Businesses and IT Providers

    Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
    Learn More
  • 1
    Shennina

    Shennina

    Automating Host Exploitation with AI

    ...Shennina is integrated with Metasploit and Nmap for performing the attacks, as well as being integrated with an in-house Command-and-Control Server for exfiltrating data from compromised machines automatically. Shennina scans a set of input targets for available network services, uses its AI engine to identify recommended exploits for the attacks, and then attempts to test and attack the targets. If the attack succeeds, Shennina proceeds with the post-exploitation phase. The AI engine is initially trained against live targets to learn reliable exploits against remote services. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    LEACrypt

    LEACrypt

    TTAK.KO-12.0223 Lightweight Encryption Algorithm Tool

    The Lightweight Encryption Algorithm (also known as LEA) is a 128-bit block cipher developed by South Korea in 2013 to provide confidentiality in high-speed environments such as big data and cloud computing, as well as lightweight environments such as IoT devices and mobile devices. LEA is one of the cryptographic algorithms approved by the Korean Cryptographic Module Validation Program (KCMVP) and is the national standard of Republic of Korea (KS X 3246). LEA is included in the ISO/IEC 29192-2:2019 standard (Information security - Lightweight cryptography - Part 2: Block ciphers). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    FileEncrypt

    FileEncrypt

    FileEncrypt is a lightweight software that can encrypt, decrypt files

    FileEncrypt is the easiest way to password protect and encrypt files of any type. Just select a file, type in a password, and click encrypt. That's it! This is the perfect tool for sending confidential information through email or even storing sensitive data on your computer.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    File-Splitter

    File-Splitter

    A simple tool for split, zip, and encrypt files

    Need a JDK to run, download it here: https://www.oracle.com/java/technologies/downloads/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • 5
    KeyHolder password manager

    KeyHolder password manager

    Store your passwords in an offline encrypted file!

    Need a JDK to run, download it here: https://www.oracle.com/java/technologies/downloads/
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Bitwarden Desktop Application

    Bitwarden Desktop Application

    Secure desktop password management application

    Bitwarden is an easy-to-use and secure desktop vault for managing passwords and other sensitive data. It helps individuals and teams share, store and sync sensitive data, and create and secure passwords. All data is fully encrypted before it even leaves your device, with end-to-end AES-256 bit encryption, salted hashing, and PBKDF2 SHA-256. Written using Electron and Angular, this native desktop application can be accessed on Windows, macOS and Linux desktops.
    Downloads: 33 This Week
    Last Update:
    See Project
  • 7
    messor-opencart

    messor-opencart

    Messor Security - IPS/WAF anti DDOS/bot and more for OpenCart3

    Messor Free open source extension for OpenCart to protect your store. Each network member collects intruders and attacks data and then sends it to central servers, as well as distributes the current database to the rest network participants. The current concept provides real-time protection of your store from the network attacks.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 8
    Clipboard Clearer

    Clipboard Clearer

    Helps in removing sensitive or other data from the clipboard.

    Clipboard Clearer helps in removing sensitive or other data from the clipboard. It creates an icon in the system tray for easy access.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9
    FileVerifier++
    FileVerifier++ is a Windows utility for calculating hashes using a number of algorithms including CRC32, MD5, SHA-1, SHA-256/224/384/512, WHIRLPOOL, and RIPEMD-128/160/256/320. Supported hash file formats include MD5SUM .MD5, SFV, BSD CKSUM, and others.
    Leader badge
    Downloads: 52 This Week
    Last Update:
    See Project
  • The full-stack observability platform that protects your dataLayer, tags and conversion data Icon
    The full-stack observability platform that protects your dataLayer, tags and conversion data

    Stop losing revenue to bad data today. and protect your marketing data with Code-Cube.io.

    Code-Cube.io detects issues instantly, alerts you in real time and helps you resolve them fast. No manual QA. No unreliable data. Just data you can trust and act on.
    Learn More
  • 10
    Horusec

    Horusec

    Open source tool that improves identification of vulnerabilities

    ...Currently, the languages for analysis are C#, Java, Kotlin, Python, Ruby, Golang, Terraform, Javascript, Typescript, Kubernetes, PHP, C, HTML, JSON, Dart, Elixir, Shell, Nginx. The tool has options to search for key leaks and security flaws in all your project's files, as well as in Git history. Horusec can be used by the developer through the CLI and by the DevSecOps team on CI /CD mats.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11

    BTS-SIO-SLAM-CYBER-INTERVENTION

    Cybersecurity intervention for BTS SIO SLAM

    You will find all the files to prepare a security intervention in a BTS SIO (SLAM - development part). This training aims to highlight the role of the developer in cybersecurity. Different software vulnerabilities are presented as well as the good practices that allow limiting them. To this goal, some aspects of a secure system design are addressed. Informations and documentation are here: https://sourceforge.net/p/bts-sio-slam-cyberintervention/wiki/Home/.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    Safe Locker

    Strong Folder/File hider for your windows using AES Encryption.

    This software allows you to hide folders and files securely. you can also save your notes with security. This software provides extra layer of security using AES 256 Encryption. Note: This will not encrypt your folder or files which you are hiding, this is only affect the Notes you are storing using this software. The Video shown below is for the Version 1.4.4 We recently upgraded the version to 4.0.0. with increased security and few animation to make app more interactive. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 13
    certstrap

    certstrap

    Tools to bootstrap CAs, certificate requests, and signed certificates

    ...The spaces will be preserved inside the fields of the generated files. certstrap requires either -common-name or -domain flag to be set in order to generate a certificate signing request.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    OneForAll

    OneForAll

    OneForAll is a powerful subdomain collection tool

    ...Built in Python, it aggregates results from numerous DNS, certificate transparency, search engine, and threat intelligence sources to uncover hidden subdomains. The tool is particularly notable for incorporating many Chinese data sources that are often missed by Western-focused recon tools, increasing discovery coverage. It supports brute-force subdomain discovery, recursive scanning, and takeover detection to help identify potential attack surfaces. OneForAll also performs validation and enrichment of discovered domains, producing structured outputs for further analysis. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    EncrypIT

    EncrypIT

    Program to quickly and easily encrypt or decrypt files or directories

    Program to quickly and easily encrypt or decrypt files or directories using Encrypting File System (EFS) as well as add and remove domain user EFS permissions to a file. There is also a button to view the info on an encrypted file as well as for backing up a users EFS PFX certificate.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16
    mkcert

    mkcert

    Zero-config tool to make locally trusted development certificates

    ...Managing your own CA is the best solution, but usually involves arcane commands, specialized knowledge and manual steps. mkcert automatically creates and installs a local CA in the system root store, and generates locally-trusted certificates. mkcert does not automatically configure servers to use the certificates, though, that's up to you. The CA certificate and its key are stored in an application data folder in the user's home. You usually don't have to worry about it, as the installation is automated, but the location is printed by mkcert -CAROOT.
    Downloads: 170 This Week
    Last Update:
    See Project
  • 17
    Lavarel-admin

    Lavarel-admin

    Tools to build a full-featured administrative interface

    ...With the help intervention/imageof powerful functions, you can crop, zoom, watermark, flip and other dozens of operations on uploaded pictures. Supports Eloquentmaking kind of data relationships to meet a variety of scenarios.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Passky Desktop Application

    Passky Desktop Application

    Simple, modern, lightweight and open-source password manager

    Passky is a free and open source password manager that is both powerful and easy to use. It is available in multiple languages as an application for Windows, macOS, Linux and Android, but also as an extension for Chrome, Firefox, Edge and Opera web browsers. This password manager helps you keep all your passwords safe : e-commerce sites, applications, social networks, games, etc. With Passky, you can create, manage and store up to 1000 passwords for free in a secure and encrypted way. Besides, Passky has a built-in random password generator to create strong passwords. ...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 19
    Bayes Anti-Spam

    Bayes Anti-Spam

    Anti Spam AddIn / Plugin for Outlook

    For Outlook I had been using the SpamBayes plugin for years in order to remove spam e-mails. However, with Outlook 365 the addin stopped working for me. This reimplementation enables you to mark e-mails as spam or valid. Based on your input the addin learns how to classify e-mails. If the addin detects spam then it will move the e-mail to a configurable folder in Outlook. E-mails for which the decision is uncertain will be moved to another configurable folder.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Hetty

    Hetty

    An HTTP toolkit for security research

    ...Intercept requests and responses for manual review (edit, send/receive, cancel) Scope support, to help keep work organized. Easy-to-use web-based admin interface. Project-based database storage, to help keep work organized.
    Downloads: 58 This Week
    Last Update:
    See Project
  • 21
    Node.js express.js MongoDB JWT REST API

    Node.js express.js MongoDB JWT REST API

    Node.js express.js MongoDB JWT REST API - Basic Project Skeleton

    This is a basic API REST skeleton written on JavaScript using async/await. Great for building a starter web API for your front-end (Android, iOS, Vue, react, angular, or anything that can consume an API) This project is created to help other developers create a basic REST API in an easy way with Node.js. This basic example shows how powerful and simple JavaScript can be. Do you want to contribute? Pull requests are always welcome to show more features. Custom email/password user system with basic security and blocking for preventing brute force attacks. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Pixload

    Pixload

    Image Payload Creating/Injecting tools

    Pixload is a collection of tools for creating and injecting payloads into image files using steganographic techniques to embed hidden content in common image formats. It supports BMP, GIF, JPG, PNG, and WebP formats and offers command-line utility for generating or modifying images with embedded payloads. If the target image exists, it can inject into it; otherwise, it generates a new one. Offers separate utilities per format (e.g., bmp.pl, gif.pl, jpg.pl, png.pl) for injection or creation. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    cloud_enum

    cloud_enum

    Multi-cloud OSINT tool for discovering public cloud resources

    ...It works by taking user-provided keywords and generating variations through mutation wordlists, then testing these combinations against common cloud service naming patterns. cloud_enum performs both HTTP probing and DNS lookups to identify resources such as storage buckets, cloud applications, and databases that may be exposed or accessible. cloud_enum uses concurrent processing to speed up scanning, enabling efficient enumeration of large numbers of possible resource names. It can identify both publicly accessible and protected resources, helping security researchers understand the external cloud footprint of an organization.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Kubernetes External Secrets

    Kubernetes External Secrets

    Integrate external secret management systems with Kubernetes

    ...The project extends the Kubernetes API by adding an ExternalSecrets object using Custom Resource Definition and a controller to implement the behavior of the object itself. An ExternalSecret declares how to fetch the secret data, while the controller converts all ExternalSecrets to Secrets. The conversion is completely transparent to Pods that can access Secrets normally. By default Secrets are not encrypted at rest and are open to attack, either via the etcd server or via backups of etcd data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Kraken tool

    Kraken tool

    Kraken: A multi-platform distributed brute-force password cracking

    ...Hashcat files can be downloaded from their home page.
    Downloads: 21 This Week
    Last Update:
    See Project