Search Results for "cc attack software" - Page 3

Showing 184 open source projects for "cc attack software"

View related business solutions
  • Control remote support software for remote workers and IT teams Icon
    Control remote support software for remote workers and IT teams

    Raise the bar for remote support and reduce customer downtime.

    ConnectWise ScreenConnect, formerly ConnectWise Control, is a remote support solution for Managed Service Providers (MSP), Value Added Resellers (VAR), internal IT teams, and managed security providers. Fast, reliable, secure, and simple to use, ConnectWise ScreenConnect helps businesses solve their customers' issues faster from any location. The platform features remote support, remote access, remote meeting, customization, and integrations with leading business tools.
  • Manage your IT department more effectively Icon
    Manage your IT department more effectively

    Streamline your business from end to end with ConnectWise PSA

    ConnectWise PSA (formerly Manage) allows you to stop working in separate systems, and helps you build a more profitable business. No more duplicate data entries, inefficient employees, manual invoices, and the inability to accurately track client service issues. Get a behind the scenes look into the award-winning PSA that automates processes for each area of business: sales, help desk, support, finance, and HR.
  • 1
    DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES !!! ONLY FOR PENTESTING PURPOSES !!!
    Downloads: 23 This Week
    Last Update:
    See Project
  • 2
    Sudomy

    Sudomy

    Sudomy is a subdomain enumeration tool to collect subdomains

    ... method. Sudomy utilize Gobuster tools because of its highspeed performance in carrying out DNS Subdomain Bruteforce attack (wildcard support). The wordlist that is used comes from combined SecList (Discover/DNS) lists which contains around 3 million entries. By evaluating and selecting the good third-party sites/resources, the enumeration process can be optimized. More results will be obtained with less time required.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Novel Insight Inner Circle

    Novel Insight Inner Circle

    Graphical message and file encryption tool

    Novel Insight Inner Circle is a message and file encryption tool for Windows. The software is developed in Java and requires 64bit Java JRE. The encryption uses AES-256 twice so it is harder to crack than the industry standard pure AES 256bit implementation (theoretical key size is 512 bit). The software writes encrypted data in ASCII text format which can be cut'n'pasted to messaging apps or to emails and back to Inner Circle when decrypting data. IMPORTANT: The software requires new OpenJDK...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    The Lounge

    The Lounge

    The website for The Lounge

    The Lounge is a web IRC client. This website is built using Jekyll. Push notifications, link previews, file uploads, and more bring IRC to the 21st century. Remain connected to IRC servers while you are offline. Forget about bouncers. Resume where you left off on any device. The client works smoothly on every desktop, smartphone, and tablet. The Lounge is open source and licensed under the MIT license. It doesn't matter what OS you use. The Lounge just works wherever Node.js runs. Supports...
    Downloads: 0 This Week
    Last Update:
    See Project
  • RMM Software | Remote Monitoring Platform and Tools Icon
    RMM Software | Remote Monitoring Platform and Tools

    Best-in-class automation, scalability, and single-pane IT management.

    Don’t settle when it comes to managing your clients’ IT infrastructure. Exceed their expectations with ConnectWise RMM, our MSP RMM software that provides proactive tools and NOC services—regardless of device environment. With the number of new vulnerabilities rising each year, smart patching procedures have never been more important. We automatically test and deploy patches when they are viable and restrict patches that are harmful. Get better protection for clients while you spend less time managing endpoints and more time growing your business. It’s tough to locate, afford, and retain quality talent. In fact, 81% of IT leaders say it’s hard to find the recruits they need. Add ConnectWise RMM, NOC services and get the expertise and problem resolution you need to become the advisor your clients demand—without adding headcount.
  • 5

    QVASIMODO's String Tools

    This project is a quick way of applying macros to a portion of text.

    ... sequentially, in the order they are listed. So, each command will operate on the result of the previous command. You can easily copy, paste, load and save both the source and the result texts. This program is written in Lazarus (FreePascal). The only non-standard library used is Zeos, but the program can be easily adapted to use Lazarus' native database components. This is free software, distributed under a CC BY-SA 4.0 Attribution-ShareAlike 4.0 International License.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    c

    c

    Compile and execute C "scripts" in one go!

    I love C for its raw speed (although it does have its drawbacks). We should all write more C. With this shell script, you can compile and execute C "scripts" in one go! (Oh yeah, and it works for C++ too.) First of all, I want to clarify why this is not the same as tcc -run. TCC is a compiler. We all know that. TCC will perform its own set of optimizations, just as GCC will perform its own and Clang will perform its own. The purpose of this script is to give a simple front-end to your...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Password Generator

    Password Generator

    Using our program, you can create a strong password with ease.

    Using our program, you can create a strong password with ease. One of the best features of this program is that it enables you to save any password that you create in a file with the time and date . Here are some tips . To prevent your passwords from being hacked by social engineering, brute force or dictionary attack method, and keep your online accounts safe, you should notice that:1. Do not use the same password, security question and answer for multiple important accounts.2. Use a password...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    ZeroDdos
    Welcome. Thank you for downloading this program. Thank's For Using App Zero Thanks To : Mr.SL3ND3RM4N - For Support Me DDOS-Zero-ddos
    Downloads: 8 This Week
    Last Update:
    See Project
  • 9
    Hyenae NG

    Hyenae NG

    Advanced Network Packet Generator

    Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pattern based address randomization and flood detection breaking mechanisms. *** Please check out the latest source from my GitHub repository and check the Build informations. https://github.com/r-richter/hyenae-ng/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • 10
    WiFi-Pumpkin

    WiFi-Pumpkin

    WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack

    The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. It comes stuffed with features, including rogue Wi-Fi access points, deauth attacks on client APs, a probe request and credentials monitor, transparent proxy, Windows update attack, phishing manager, ARP Poisoning, DNS Spoofing, Pumpkin-Proxy, and image capture on the fly. moreover, the WiFi-Pumpkin is a very complete framework for auditing...
    Downloads: 39 This Week
    Last Update:
    See Project
  • 11
    waircut

    waircut

    WPS wireless protocol audit software for Windows

    Wireless Air Cut is a WPS wireless, portable and free network audit software for Ms Windows. It is used to check the security of our wps wireless networks and to detect possible security breaches. You can check if the router has a generic and known wps pin set, if it is vulnerable to a brute-force attack or is vulnerable to a Pixie-Dust attack. You can see the Installation instructions on Wiki. ------- Wireless Air Cut es un software de auditoria del protocolo WPS en redes wireless, portable...
    Leader badge
    Downloads: 6,878 This Week
    Last Update:
    See Project
  • 12
    EmojiOne Color SVGinOT Font

    EmojiOne Color SVGinOT Font

    EmojiOne Color SVGinOT Font

    A color and B&W emoji SVGinOT font built from EmojiOne artwork with support for ZWJ, skin tone diversity and country flags. The font works in all operating systems, but will currently only show color emoji in Firefox, Thunderbird, Photoshop CC 2017, and Windows Edge V38.14393+. This is not a limitation of the font, but of the operating systems and applications. Regular B&W outline emoji are included for backward/fallback compatibility. SVG in Open Type is a standard by Adobe and Mozilla...
    Downloads: 66 This Week
    Last Update:
    See Project
  • 13
    PGIIXUA

    PGIIXUA

    PGIIXUA allows to generate network traffic right of your Android

    PGIIXUA allows to generate network traffic right of your Android smartphone. THERE ARE NO VIRUSES, THE SYSTEM JUST DETECTS SUCH TOOLS THAT WAY! Malware detected (wanted feature): 'a variant of Android/HackTool.Loicdos.B application': What does it mean? This tool is based on the 'Low Orbit Ion Canon', but more powerful as for the advanced changes that were made on the software. What is Low Orbit Ion Canon? Low Orbit Ion Cannon (LOIC) is an open-source network stress testing and denial...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    UDPStressTest

    UDPStressTest

    A Desktop app for network stress testing, TCP-Ping and icmp ping.

    Easy to use GUI app. *It reads your active and Up NIC and gets some info about it. * You can see your machine IP Address, gateway, subnet mask. * You can ping any ip address you want and get measure of TTL. * It gets the available range of IP's in your local network. * When you start the test you see testing throughput as a graph against time also total size of packet sent in (MB). *You can use it as DOS attack tool. *Every action done on the app is logged in XML file as data source (only...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    MariaMole

    MariaMole

    An advanced IDE for Arduino development

    MariaMole is an advanced IDE for Arduino developers. Features like color-themes, fully-configurable building process, multi-project workspace, etc, are available This project is distributed under the license CC-By SA 3.0. This project uses an open-source library called Scintilla, for the syntax-highlighting code editor. You can get Scintilla licensing from here: http://www.scintilla.org/License.txt
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16

    CC Classes And Objects

    Curtailed N Concise Classes / Objects

    To generate classes and objects which contain only those functions which are actually used in processing a webpage request. Visit http://plscis.blogspot.in or http://pls-e.in for more details.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    TopMaze

    TopMaze

    Auto discover and map all software components within seconds

    TopMaze disrupts the market with the world first real-time, software-based, topology mapping service for IT. We created the ability to map all the software elements that interact within servers in one precise image. We also provide it free.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    InTheDark

    The best/new dos/ddos software NOW!

    InTheDark is the best for slowing down a website/IP address. If you're looking for FREE software with regular updates INSTALL NOW!
    Downloads: 20 This Week
    Last Update:
    See Project
  • 19
    aeneas

    aeneas

    Automagically synchronize audio and text (aka forced alignment)

    aeneas is a Python/C library and a set of tools to automagically synchronize audio and text (aka forced alignment). aeneas automatically generates a synchronization map between a list of text fragments and an audio file containing the narration of the text. In computer science this task is known as (automatically computing a) forced alignment.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    Mail Alert Simple Mailer

    Mail Alert Simple Mailer

    Mail Alert Simple Mailer

    Mail Alert Simple Mailer is a simple command-line utility designed for IT administrators for sending e-mail from Microsoft Windows OS. It can be executed from command line, Windows batch file or PowerShell scripts. My main reason for writing this software was to handle events generated by Dell OpenManage Server Administrator (OMSA), APC PowerChute and Windows Events to send hardware status and alerts like temperature alerts, UPS battery status, powerline status and RAID controller alerts from...
    Leader badge
    Downloads: 17 This Week
    Last Update:
    See Project
  • 21
    FoxNuke

    FoxNuke

    A Proffesional Stress-Testing(ddos) tool for pentesters

    The FoxNuke program is written in python and uses Firefox in order to complete the distributed denial of service attack feature. Multiple headers are used from the Firefox browser, along with a personal configuration option for the Opera browser. The FoxNuke Program is still underdevelopment as of 8/24/17, full release is set to come out sometime during 2017-2018. If you would like to participate in the TESTING of this program and would like to help report bugs, etc. then please email...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    SoundForce Beta

    SoundForce Beta

    Sound Amplifier for Equalizer APO

    ! IMPORTANT : To install SoundForce, refer to the Installation Guide on tab "Files". SoundForce is a beautiful GUI based on EqualizerAPO. It actually is a sound amplification software. It is developed only for Windows so far, and supports Windows Vista and later. License: GNUv2, CC Developer: Antonis Chamilos
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • 23
    Mpge

    Mpge

    Mpge

    Mpge is a wrapper of meterpreter (msfconsole, msfpayload and msfencode) of Metasploit Framework directly integrated with Mac OS X Snow Leopard 10.6.8 and with OS X Mavericks 10.9. With Mpge is possible make trojan horse files for Microsoft Windows, Linux and Mac OS X 10.3 Panther, OS X 10.4 Tiger, OS X 10.5 Leopard and OS X Montain Lion 10.8.1 for all Mac OS X is possible make a trojan horse files contains a reverse shell into files .pkg and files .app. I used three real Mac OS X: Attacker:...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Betwixt

    Betwixt

    Web debugging proxy based on Chrome DevTools network panel

    Betwixt will help you analyze web traffic outside the browser using familiar Chrome DevTools interface. Download the latest release for your operating system, build your own bundle or run Betwixt from the source code. In order to capture traffic, you'll have to direct it to the proxy created by Betwixt in the background.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    Syn Flooder is ip disturbing testing tool , you can test this tool over your servers and check for there protection , This is a beta version .
    Leader badge
    Downloads: 10 This Week
    Last Update:
    See Project