21 projects for "wxdev-c" with 2 filters applied:

  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Vibes don’t ship, Retool does Icon
    Vibes don’t ship, Retool does

    Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.

    Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
    Build apps that ship
  • 1
    SSHGuard

    SSHGuard

    Intelligently block brute-force attacks by aggregating system logs

    SSHGuard protects hosts from brute-force attacks against SSH and other services. It aggregates system logs and blocks repeat offenders using several firewall backends, including iptables, ipfw, and pf.
    Leader badge
    Downloads: 112 This Week
    Last Update:
    See Project
  • 2
    ophcrack

    ophcrack

    A Windows password cracker based on rainbow tables

    Ophcrack is a Windows password cracker based on a time-memory trade-off using rainbow tables. This is a new variant of Hellman's original trade-off, with better performance. It recovers 99.9% of alphanumeric passwords in seconds.
    Leader badge
    Downloads: 3,348 This Week
    Last Update:
    See Project
  • 3

    Primes

    Calculate primes by using extremely fast sorting

    This project considers the problem of calculating primes as a sorting problem. It includes the most efficient tree-based sorting algorithm that is possible and shows that finding a new prime can be done by sorting the differences between the previous primes in the right way. Unfortunately it has turned out that going this way is even more slowly than trying to find primes by brute force. So it can only be used as a test with heavy load for the sorting algorithm, which can be used for...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Solution to the classic riddle suppossedly proposed by Einstein. This solution is for the variant proposed by http://www.2ddepot.com/games/whoownsthefish/ (Spanish, no smoking references) Method is simple brute force for every permutation. In a intel core i5 M 560 @ 2.67GHz, program terminates in 2 minutes.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 5

    Khembalancer

    Software to balance a chemical equation (redox too)

    Balacing a chemical equation using the Laplace's rule to solve a system of linear equations or using the brute-force method. Khembalancer 2.5.5 received the "100% Free" award and that means Khembalancer does not contain any viruses, spyware, trojans and backdoors. For more information see: http://www.softpedia.com/progClean/Khembalancer-Clean-207422.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    pngacidbath is the one true PNG image brute force compressor. While other tools simply run down a list of "intelligent" compressor algorithms (some known as zlib methods), pngacidbath tries every byte combination to come up with THE smallest file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    md5 hash bruteforce for MPI clusters with mpich2 architecture
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Computer chess engine written using Qt4, which works under Knights, Jose, Arena and other chess board GUI games. Uses bitboard game representation and alpha beta brute-force search to analyse chess positions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    BruteNet is a system of the distributed brute force and distributed calculations built on user extensions capable to solve a great number of problems related to the partition on a lot of machines.With sample extention you can distribute brute md5-hash
    Downloads: 0 This Week
    Last Update:
    See Project
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 10
    BRUTALIS - BRUTeforce ALternative Is Stupid. Brutalis generate brute force passwords. It can be integrated in any command line for an attack and support resume, character panel, minimum and maximum length, special separating characters and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Secwatch is an intrusion detection system using log analysis to detect service scan and other brute-force attempts on a server or other computer using system logs and will create temporary firewall rules to block offending IPs
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Bruteblock allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attacker's IP into IPFW table effectively blocking them. Addresses are removed from the table after expiration period
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Valkyries is a parallel programming project designed for and developed on a Beowulf cluster to crack several UNIX systems' passwords by brute-force. Currently implemented system cracks only numerical passwords but it's being developed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Strength in numbers. Existing products we're involved in include port to Linux of Tony Forbes' MFAC for brute-force factorization of MM61 for relatively small factors, and further development and improvement of Tim Charron's ECMnet distributed computing f
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    NBTView is a 'NetBIOS Swiss Army Knife' written in C, and usable under several UNIX-like systems. NBTView allows you to passively monitor NetBIOS intelligence (users logged in, shares, etc.), run queries against machines, and brute-force share passwords.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The John Darm project aims at developping a software that can tests a brute force attack on weak UNIX passwords. It s a multi-client application that dispatches the calculations between the different clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    dkbf is a distributed, keyboard, brute-force program for Linux clusters that attacks Windows NT Lanman and NT hashes using the Message Passing Interface (MPI).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Blaster Scan is a TCP port scanner. It can extract users exploiting vrfy or expn, check anonymous access on FTP, check brute force on FTP and POP3, extract daemons\' versions, and scan for CGI bugs. It also has a SYN port scan, the ability to ping hosts t
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    BFBTester is great for doing quick, proactive, security checks of binary programs. BFBTester will perform checks of single and multiple argument command line overflows and environment variable overflows. Versions 2.0-BETA and higher can also watch for tem
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • 21
    Cross-platform distributed password cracking tool, used to carry out brute-force attacks on common encryption protocols. Client/server based with administrative web interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next