Showing 90 open source projects for "disk"

View related business solutions
  • OpenMetal is an automated bare metal and on-demand private cloud provider. Icon
    OpenMetal is an automated bare metal and on-demand private cloud provider.

    Large Scale. Cloud Native. Fixed Costs.

    OpenMetal is an automated bare metal and on-demand private cloud provider. Our mission is to empower your team with cost effective private infrastructure that outperforms traditional public cloud.
    Learn More
  • Powerful Business Process Automation Icon
    Powerful Business Process Automation

    With ThinkAutomation, you get an open-ended studio to build any and every automated workflow you could ever need.

    When a message is received ThinkAutomation automatically executes one or more Automations. Automations are created using an easy to use drag-and-drop interface to run simple or complex tasks. Automations can perform many business process Actions, including: updating company databases, CRM systems and cloud services, sending outgoing emails, Teams & SMS messages, document processing, custom scripting, integration and much more. Over 100 built-in actions are included, plus ThinkAutomation is extensible with Custom Actions.  
    Learn More
  • 1
    FinalCrypt

    FinalCrypt

    FinalCrypt - Unbreakable One-Time Pad Encryption

    Why FinalCrypt? 1. Most people choose Disk-Encryption as it's easier to unlock a whole drive, but Big-Brother or Malware can then also read all your files. Only use File-Encryption! 2. Most software uses recently broken AES encryption. 3. Soon The Shor's algorithm will instantly break all assymmetric encryption with Quantum Computers. 4. FinalCrypt uses Symmetric One Time Pad Encryption, which is the most unbreakable encryption there is. 5.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Xorin

    Xorin

    Xorin data erase & clone software

    Xorin is a secure drive erase program that provides the perfect solution to anyone who wants to secure their private data before selling or utilization their PC or drive storage. Xorin is also good in all situations where you want to ensure that deleted data stays deleted and that it can never be recovered. Xorin operates from its own Linux-based bootable environment, Linux or Windows operation system. Xorin supports all popular security methods and standards including DoD...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    ISP UNLOCKER

    ISP UNLOCKER

    Unlock Your ISP and access all your restricted websites

    Main Functions Links to official domain names only Users can visit linked sites or enter there on sites Easy and user-friendly interface All data is encrypted over the network Non-installer runs from CD HDD or USB Pen Auto updates System requirements Windows 7 SP1 (x86 and x64) Windows 8 (x86 and x64) Windows 8.1 (x86 and x64) Windows 10 (x86 and x64) .NET Framework 4.6.1 Requires Administrator Privileges Processor Intel or AMD x86 or 64 bit 1 GHz or faster processor 1GB of RAM At least 100 megabytes (MB) available space on the hard disk An active internet connection We have set a few website restrictions within the app for security reasons and to stop browser-based Bruteforce attacks all banks and payment gateways are restricted and will not load from within the app
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Invoke-PSImage

    Invoke-PSImage

    Encodes a PowerShell script in the pixels of a PNG file

    Invoke-PSImage is a PowerShell utility that hides, extracts, and optionally executes PowerShell payloads inside image files using simple steganography techniques. It can embed a script or binary blob into an image (commonly PNG or JPEG) and later recover that payload without leaving a separate file on disk, enabling in-memory execution workflows. The tool offers options for compression and encryption so the embedded content is both smaller and protected by a passphrase when required. It includes helpers to encode a payload into an image, decode an embedded payload back to readable form, and run the extracted content directly from memory to avoid touching disk.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Odoo Business Applications Icon
    Odoo Business Applications

    Odoo is a software suite to better manage and run your company.

    Odoo is a fully integrated, customizable, open-source software packed with hundreds of expertly designed business applications. Odoo’s intuitive database is able to meet a majority of business needs, such as: CRM, Sales, Project, Manufacturing, Inventory, and Accounting, just to name a few.
    Get Started
  • 5
    SSH MITM

    SSH MITM

    SSH man-in-the-middle tool

    ...A patch applied to the OpenSSH v7.5p1 source code causes it to act as a proxy between the victim and their intended SSH server; all plaintext passwords and sessions are logged to disk. Of course, the victim's SSH client will complain that the server's key has changed. But because 99.99999% of the time this is caused by a legitimate action (OS re-install, configuration change, etc), many/most users will disregard the warning and continue on. NOTE: Only run the modified sshd_mitm in a VM or container! Ad-hoc edits were made to the OpenSSH sources in critical regions, with no regard to their security implications. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    dotNet Disk Imager

    dotNet Disk Imager

    Lightweight RAW and ZIP disk images reader and writer to USB or SD

    ...Requires .NET Framework 4.6.1 (download here: http://go.microsoft.com/fwlink/?LinkId=671729 ) Supports Windows 7 and newer. If you need older Windows support, use Win32 Disk Imager. Please write a review.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 7
    PentestBox

    PentestBox

    A Portable Penetration Testing Distribution for Windows

    PentestBox is not like other Penetration Testing Distributions which runs on virtual machines. It is created because more than 50% of penetration testing distributions users uses windows. Source:- https://pentestbox.com/download_stats.txt So it provides an efficient platform for Penetration Testing on windows.
    Downloads: 508 This Week
    Last Update:
    See Project
  • 8
    LazLock

    LazLock

    Free, cross platform, portable password manager.

    The latest version of LazLock is at https://github.com/cyberfilth/LazLock/releases A free, lightweight, portable password manager for Windows & GNU/Linux that encrypts your data with 128 bit AES encryption. LazLock also includes a password generator which allows you to create more secure passwords. A plain text version of your data is never written to disk as all decryption is done in memory. LazLock is truly portable, no installation is required so it can be run from a USB drive. Unlike similar programs, there are no dependencies on the .NET Framework (Windows) or Mono (Linux) ------------------------------------- Easily Copy and Paste your login details into any website without having to manually type them out. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9
    OMEN

    OMEN

    OMEN: Ordered Markov ENumerator - Password Guesser

    ...OMEN consists of two separate program modules: createNG and enumNG. createNG calculates n-gram probabilities based on a given list of passwords and stores them on the hard disk. Based on these probabilities enumNG enumerates new passwords in the correct order (descending). Before one can generate any passwords, the n-gram probabilities have to be estimated using createNG. To calculate the probabilities using the default settings, createNG must be called giving a path to a password list that should be trained.
    Downloads: 3 This Week
    Last Update:
    See Project
  • The top-rated AI recruiting platform for faster, smarter hiring. Icon
    The top-rated AI recruiting platform for faster, smarter hiring.

    Humanly is an AI recruiting platform that automates candidate conversations, screening, and scheduling.

    Humanly is an AI-first recruiting platform that helps talent teams hire in days, not months—without adding headcount. Our intuitive CRM pairs with powerful agentic AI to engage and screen every candidate instantly, surfacing top talent fast. Built on insights from over 4 million candidate interactions, Humanly delivers speed, structure, and consistency at scale—engaging 100% of interested candidates and driving pipeline growth through targeted outreach and smart re-engagement. We integrate seamlessly with all major ATSs to reduce manual work, improve data flow, and enhance recruiter efficiency and candidate experience. Independent audits ensure our AI remains fair and bias-free, so you can hire confidently.
    Learn More
  • 10
    URC ACCESS MODES v3.0

    URC ACCESS MODES v3.0

    Provides control of Various Functions with pasword protected interface

    With URC ACCESS MODES v3.0 we can have complete protection & control for our desktop/laptop with a password protected interface it has 6 best tools which includes : USB Tool & CD/DVD Tool, Registry(regedit.exe) Tool & Command Prompt(cmd.exe) Tool, Group Policy Tool(gpedit.msc) & Task Manager Tool(taskmgr.exe), With USB & CD Tools , Data Theft is Eliminated , No one can access our data without our permission since we can disable USB Mass Storage Devices such as Pen Drives , Hard Disk etc whereas your USB Peripheral Devices will work normal including USB Mouse, Keyboard, Webcam etc Also Virus Problem is Eliminated since no data is transferred it protects us from Viruses With Registry & Command Prompt Tools , Unauthorized Code Execution is Eliminated since we can disable command prompt & registry no one can write commands/registry entries manually and execute it Also Protection From Hackers since they can execute some codes via command prompt which may retrieve our data
    Leader badge
    Downloads: 29 This Week
    Last Update:
    See Project
  • 11
    Snort add-on is a network intrusion detection system for ipcop version 2. Last version of IPCOP version 2.1.9 n.b: Snort add-on needs 700 Mo minimum free space disk.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    White Knight

    White Knight

    Machine Shutdown Security Tool

    Knock down your server into full disk encryption when a user attempts to physically attack your hardware via USB. This project seeks to provide a quick any easy low overhead solution that will shut your computer down to trigger your full disk encryption before an unsophisticated adversary has time to extract sensitive data. News: Alpha 0.04 Hotfix Update - Passwords now work!
    Downloads: 5 This Week
    Last Update:
    See Project
  • 13
    Darik's Boot and Nuke

    Darik's Boot and Nuke

    A hard drive disk wipe and data clearing utility

    Darik's Boot and Nuke ("DBAN") is a self-contained boot image that securely wipes hard disk drives (HDDs). DBAN is appropriate for personal use, bulk data destruction, or emergency data destruction for HDDs, but is not recommended for solid-state drives (SSDs), sanitization that requires auditable compliance documentation, or technical support.
    Leader badge
    Downloads: 3,300 This Week
    Last Update:
    See Project
  • 14
    SEWOL: Security-oriented Workflow Lib

    SEWOL: Security-oriented Workflow Lib

    Java Library for workflow handling

    SEWOL provides support for the handling of workflow traces. It allows to specify the shape and content of process traces in terms of entries representing the execution of a specific workflow activity. Currently it supports plain text, Petrify, MXML and XES log file types. In order to specify security-related context information, SEWOL provides access control models such as access control lists (ACL) and role-based access control models (RBAC). SEWOL uses and encloses the following...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    USB 007

    USB 007

    A spy for USB drives.

    The application refers to track what happen with your computer USB ports by which USB drive and when. USB 007 can track it in your presence or absence. After inserting a removable disk such as Pen drive, Memory card, External hard disk etc. USB 007 will track the drive name, drive insertion date-time, drive space info and the file-folders (include hidden) that the drive contains. You will also get the updated info before the drive removed. The 4 more important features are that ♦ Enabling & Disabling options of USB ports...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Encrypted Notepad
    UPDATE 2024: Get a new version here: https://github.com/ivoras/EncryptedNotepad2 "Encrypted Notepad" does only one thing, but aims to do it perfectly - a Notepad-like simple text editor where files are saved (and later loaded) encrypted with industrial strength algorithms. Available both for the desktop (as a Java application) and on Android. Unencrypted data is never stored on-disk. Source is released (on SourceForge) under the BSD license.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 17
    ViroFilT Pendrive Security ViroFilt Antivirus Software for Securing Pendrive and Entire Systems Prevent from the Shortcut Virus and Hidden Files/Folders Download Link Windows 8 32/64bit Version : http://goo.gl/Bn10Jq Windows 7 32bit only Click Here : http://goo.gl/EH5jkI Windows 7 64bit only Click Here : http://goo.gl/pfs7i3 Description : * Scan Entire System * Removable Disk Scanning with Automatically Detection * Removing Viruses & Trojans, Worms * Removing Unwanted Shortcuts LNK files in your Pendrive * Neutralize Hidden Folders & Files in Your Computer and Pendrive * Disable & Enable Task Manager Program * Disable & Enable Registry Editor * Disable & Enable Control Panel * Disable & Enable Command Prompt * Show Hidden Files Regards R.Sakthikumar(www.facebook.com/sakthi.kumar.it) Studying in diploma in Information technology 3year(2012-2015) A.D.J Dharmambal Polytechnic College Nagapattinam
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    BitKiller
    BitKiller securely shreds files and directories, removing them completely from your hard disk. It can quickly and efficiently overwrite files using anything from random data to the Gutmann method. It also changes filenames to make them harder to find. No setup or installation needed.
    Leader badge
    Downloads: 45 This Week
    Last Update:
    See Project
  • 19
    USBRescueX

    USBRescueX

    Rescue and clean your hard disk or USB memory, delete broken shortcuts

    USBRescuex in its version 2.1 is a computer program category in utility software for files and folders, which its main function is the recovery of hidden files, read-only and corrupted our device (either USB memory devices, removable storage or hard disk). Besides recover those important files for you , eliminates the famous RECYCLER virus , which is the basis of other USB flash drives for viruses , this virus is the main wrongdoer in your USB/Storage Device/Device Storage space Removable memory/disk hard, as the virus will hide all your files and folders , creating false shortcuts and reproducing more viruses to your computer and other USB/removable Devices/Hard Drives storage. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 20
    A tool to block viruses in USB flash/disk from auto-running. When a USB disk is inserted, this tool not only locks the "autorun.inf" file, but also locks all the autorun-related virus and other suspicious files.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 21

    GPM Clam AntiVirus

    Open Source Pinoy Antivirus

    A powerful OpenSource Antivirus for your PC, includes: explorer context menu extension, system cleaner, Tray Menu Mode, Integrated GUI, Fast Scanner, Real-Time Virus Scanner, Autorun.inf Removal Tool, Registry Virus Remover,Disk Cleaner Process Cleaner, Task Manager, Files & Folders Healer, USB Status Monitor, AdBlocker and uses the open source Clam AntiVirus engine.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    HP's Handy Program

    A Tidy Program, were computer tasks can be carried out efficiently.

    A Tidy Program, were computer tasks can be carried out easily and efficiently. My first program. There are options inside the program allowing you to perform maintenance tasks on your pc. Aswell as Usefull options. And some things if you are board.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    ErAce

    ErAce

    erase hard drive, wipe hdd

    ...In that way it is impossible to recover data. If You delete files and empty recycle bin it is possible to recover data with recovery software. ErAce will write whole hard disk and put it to zero at last cycle. After process hard drive looks like it was just came out of factory. ErAce works on Pentium or higher and AMD equivalent systems. It works even Intel based Mac computers. It needs 128 Mb of memory. With ErAce you can recycle, sell or throw away hard drive carefree. There is no way other people to recover data, pictures or documents from your disk
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    ...After the message is entered the ciphertext is displayed. Executing the program with command-line arguments causes bigram to generate a random bigram table to print to screen or save to disk depending on whether the -f filename argument was given. If the -p passphrase argument is given a specific table is generated and is repeatable each time the same passphrase is given. This program was written to supplement the Enigma Simulator by Dirk Rijmenants. http://users.telenet.be/d.rijmenants/en/enigmasim.htm Enigma message procedures: http://users.telenet.be/d.rijmenants/en/enigmaproc.htm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    HFV (Hidden Folder Virus) Cleaner Pro

    HFV (Hidden Folder Virus) Cleaner Pro

    A Small Utility programmed to destroy Win32:Atraps-PZ[Trojan]

    Many a times when we connect our PenDrive to a PC or Laptop, wedon't see our files and folders, instead see one or multiple shortcuts. Assuming these shortcuts as innocent, we launch them which in turn infects our PC or laptop with a virus which the geeks call Win32:Atraps-PZ[Trojan] Simply speaking, the shortcut creates a backdoor to your system so that it can access all your files,services and privileges within that system & all others connected to it without your...
    Downloads: 39 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB