Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files" - Page 23

Showing 1555 open source projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

View related business solutions
  • Securden Privileged Account Manager Icon
    Securden Privileged Account Manager

    Unified Privileged Access Management

    Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.
    Learn More
  • The AI-powered unified PSA-RMM platform for modern MSPs. Icon
    The AI-powered unified PSA-RMM platform for modern MSPs.

    Trusted PSA-RMM partner of MSPs worldwide

    SuperOps.ai is the only PSA-RMM platform powered by intelligent automation and thoughtfully crafted for the new-age MSP. The platform also helps MSPs manage their projects, clients, and IT documents from a single place.
    Learn More
  • 1
    Kamus

    Kamus

    An open source, git-ops, zero-trust secret encryption and decryption

    An open source, GitOps, zero-trust secrets encryption and decryption solution for Kubernetes applications. Kamus enables users to easily encrypt secrets that can be decrypted only by the application running on Kubernetes. The encryption is done using strong encryption providers (currently supported: Azure KeyVault, Google Cloud KMS, Amazon Web Services KMS, and AES).
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    Buster

    Buster

    OSINT tool for discovering information linked to email addresses

    ...It helps investigators, security researchers, and penetration testers discover publicly available information related to email addresses and usernames. It can analyze an email address to identify associated social media accounts, references across the web, and potential data breaches linked to that email. It also performs reverse WHOIS lookups to discover domains that may have been registered using a specific email address. In addition to investigating existing addresses, Buster can generate possible email combinations and usernames based on personal details such as a person’s name, birthdate, or additional hints. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    7zSFX Constructor
    7zSFX, Constructor, SFX, Crypto, Vip, Key, Full
    Downloads: 8 This Week
    Last Update:
    See Project
  • 4
    CTS Surveyor

    CTS Surveyor

    Foot traffic and facial analytics for your business and home

    Surveyor is a software solution that monitors its environment via camera and gathers demographic information about the public in the surrounding area, providing important statistics such as number of people passing by as well as providing facial analytics to classify the pedestrians based on their age and gender. The statistical data is stored in a local database and is made available via RESTful API’s, and easy integration with other applications can be accomplished via a WebSocket interface that provides live notifications about people in the camera’s field of view At the moment, the solutions is available for Windows only, with Linux version coming soon – please see our User Guide at http://caerustech-solutions.com/demo/User_Guide.pdf Sample Python client: https://github.com/CaerustechSolutions/cts-surveyor-pyclient Contact Us: http://caerustech-solutions.com/contact-us/
    Downloads: 1 This Week
    Last Update:
    See Project
  • Get full visibility and control over your tasks and projects with Wrike. Icon
    Get full visibility and control over your tasks and projects with Wrike.

    A cloud-based collaboration, work management, and project management software

    Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
    Learn More
  • 5

    sls

    SLS Team Java Library

    Java library with Cryptographic algorithms. Easy to use Crypto algorithms. Works on Windows, Linux, Android. No external lib dependencies, no useless abstractions, no 'crypto provider'. Elliptic curves was borrowed from BouncyCastle and simplified a lot. Most of EC classes are custom algorithms for certain curves. Can be easily deleted if u dont need them. With couple of classes u can parse and construct those ugly ASN.1 structures, look at RSA and EC key formats for example. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Secret File

    Secret File

    File Encryption/Decryption using password

    Secret File is a free and easy to use encryption/decryption app that can encrypt nearly any kind of file format using passwords. Files can be stored as personal or sent over the internet as confidential as the data of files are securely encrypted at the binary level itself and can be decrypted at any time and anywhere. You can also use multi-level protection for more secureness.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    AQUATONE

    AQUATONE

    A tool for domain flyovers

    ...Aquatone is designed to be as easy to use as possible and to integrate with your existing toolset with no or minimal glue. Aquatone is started by piping output of a command into the tool. It doesn't really care how the piped data looks as URLs, domains, and IP addresses will be extracted with regular expression pattern matching. This means that you can pretty much give it output of any tool you use for host discovery. Aquatone is now completely focused on screenshotting and reporting. I know a lot of people used Aquatone for its DNS enumeration capabilities and it was definitely very good at that when it was released. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    chords-malware-analyzer

    Chords is binary file strings extractor, with many formats supported.

    Chords is strings on steroids. Is able to extract strings from files just like strings, but it also supports windows wide string, base64 and hexadecimal strings (with decoding support) and automatic recognition of Indicators of Compromise (IOCs). It has been developed to support the malware analysis process, but is a general purpose tool.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Security Datasets

    Security Datasets

    Re-play Security Events

    Security‑Datasets is a community-driven repository maintained by the Open Threat Research Forge (OTRF) that curates publicly available malicious and benign datasets for threat-hunting, machine learning, event analysis, and cybersecurity research. Datasets include Windows events, logs, alerts, and simulated attack data to support detection engineering and academic research.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • 10
    CyberGod KSGMPRH

    CyberGod KSGMPRH

    Open-Source antivirus for Windows

    This is an effective tool which is capable of detecting thousands and thousands of malware in your PC, including the shortcut virus to nasty ransomware, The database is regularly updated. See the video for how to use this tool. Version: 1.3 MD5: 707D4BE2AA4547A542A7EEFDB7BC4C4D SHA-1: 899B80928DF59C5745B56480DAA6A51E7F65CB18A4 Source code MD5: 38B3A08D62E7ADD2EE30FCA375207499 IMPORTANT: =========== FULL VERSION :...
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    Treater Antivirus

    Treater Antivirus

    Cloud antivirus scanner based on machine detection

    ...Different verification options By default, the antivirus program has the most possible settings and will scan all dangerous and critical system directories that are prone to infection. Unknown objects will be filtered out, and then they will be loaded into the cloud for further analysis. The analysis of the transferred files is carried out with our own original development "COGA"
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12

    GentleGPG II

    PGP encrypt/decrypt data with easy drag and drop data handling.

    GentleGPG II is an easy to use PGP data encryption program. Two or more people can communicate securly using PGP encryption. This program was written with ease of use in mind and is fully portable. GentleGPG II makes encrypting and decrypting your email (or any other) messages easy by enabling you to drag a cursor to Retreive the data you wish to decrypt from another program's window, such as an email client.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ...Tiny Security Suite has: - File Encryption (AES and Triple DES) - Text Encryption (AES and Triple DES) - Shredder - Secure Folder (Folder Hider) - VPN (uses OpenVPN configuration files, need openVPN installed on computer) - Tor Browser - Firewall (Firewall PaPI)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Photon

    Photon

    Incredibly fast crawler designed for OSINT

    Photon is an extremely fast web crawler built specifically for OSINT and reconnaissance use cases. It is designed to extract URLs, endpoints, files, and other intelligence artifacts from target websites with minimal overhead. The crawler prioritizes speed and breadth, making it suitable for mapping web attack surfaces and discovering hidden resources. Photon is commonly used during early reconnaissance phases to build a comprehensive inventory of reachable assets. Its Python implementation makes it accessible for customization and integration into larger automation frameworks. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 15
    Offensive Web Testing Framework

    Offensive Web Testing Framework

    Offensive Web Testing Framework (OWTF), is a framework

    ...Demonstrate true impact despite the short timeframes we are typically given to test. The tool is highly configurable and anybody can trivially create simple plugins or add new tests in the configuration files without having any development experience. OWTF is developed on KaliLinux and macOS but it is made for Kali Linux (or other Debian derivatives).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    SafeBox

    SafeBox

    Truly anonymous and secure file sharing

    Anonymity No registrations. Immediately after installing the application, you can start sharing files. Strong cryptography Proven standards of cryptography (PGP, RSA 2048). There is not a single case of hacking data encrypted with PGP using full brute force or cryptographic algorithm vulnerability. Files are not stored in the cloud as soon as the recipient receives the file, it is instantly removed from the cloud. Thus, it is impossible to get files to anyone other than the addressee. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    VersionInfo

    VersionInfo

    Generate file version information

    This command-line utility produces a report of file information including version information where available. The reports can be useful for release information, manifests, and integrity verification.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18
    VenSafe

    VenSafe

    Free, secure, customizable and the best folder locker software!

    [UPDATE! - VenSafe 2.0.1.2) VenSafe, the best of its kind; A Folder/USB locker software by Rahul M. The all-new VenSafe is ready with its simple, smooth and friendly GUI. This version is far more secure comes with all kinds of bugs, bypasses and cheats fixed. The password can no longer be edited by others from outside. Everything's in the Settings. It's impossible to crack through your folder once it's locked. In case you forget you VenSafe password, you can request for a recovery...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19

    CryptoFlouze

    This software display the last prices of the top 20 cryptocurencies

    This software download and display the last prices of the top 20 cryptocurrencies on the market. All the data are updated at every run. The data is downloaded from : https://coinmarketcap.com/api/ For windows : Download this zip file, unzip everything in the same directory. The data are updated at every run. For other operating systems : Run it from the source. https://github.com/hamdyaea/CryptoFlouze Developer - Author Hamdy Abou El Anein
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    A USLESS KEYLOGGER |MZL

    A USLESS KEYLOGGER |MZL

    A keylogger that save your data with yourself and works

    A keylogger that save your data with yourself and works as backup of every text you write
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    pdf_encryptor

    Encrypt PDFs with Python and PyPDF2

    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    goRBAC

    goRBAC

    goRBAC provides a lightweight role-based access control (RBAC) in Go

    ...Although you can adjust the RBAC instance anytime and it's absolutely safe, the library is designed for use with two phases, preparing and checking. Also, you can implement gorbac.Role and gorbac.Permission for your own data structure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    NASH OS

    NASH OS

    Nash Operating System for Modern Ecommerce

    The all-built-in-one, automatic, ready-to-go out-of-box, easy-to-use state-of-the-art, and really awesome NASH OS! Over 25,000+ flexible features and controls and all scalable!! The most powerful solution ever built to instantly deliver new heights of online ecommerce enterprise to you.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    Universal Password Manager

    Universal Password Manager

    Store all your passwords in one secure encrypted database.

    Universal Password Manager allows you to store all your passwords in one highly secure encrypted database. Its strengths are simplicity, portability and security (uses 128bit AES encryption). UPM is available on Android, Windows, OS X & Linux.
    Leader badge
    Downloads: 29 This Week
    Last Update:
    See Project
  • 25
    Firefly

    Firefly

    A proxy software to help circumventing the Great Firewall

    Firefly is an agent used to access Great Firewall (GFW) blocked websites and applications. Under the default settings, Firefly only goes through VPN forwarding wall of IP traffic, IP wall straight. If you find a website or application you cannot access, Firefly flow mechanism can be built to distinguish between an error. In this case, you can choose to forward all traffic through the VPN, and then try again.
    Downloads: 3 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB