Showing 58 open source projects for "shell"

View related business solutions
  • CompAccelerator Icon
    CompAccelerator

    CompAccelerator is a highly configurable compensation solution designed from the HR perspective.

    Created by HR professionals that have spent years experiencing the pains of compensation processes, CompAccelerator is designed to solve the problems that you face every day. Deliver the actions you need, on the layout you want, with the calculations you need, all in a fraction of the time. Schedule a demo today and see how sophisticated functionality in an easy to use interface can save your team from the perils of compensation management.
    Learn More
  • Contractor Foreman is the most affordable all-in-one construction management software for contractors and is trusted by contractors in more than 75 countries. Icon
    Contractor Foreman is the most affordable all-in-one construction management software for contractors and is trusted by contractors in more than 75 countries.

    For Residential, Commercial and Public Works Contractors

    Starting at $49/m for the WHOLE company, Contractor Foreman is the most affordable all-in-one construction management system for contractors. Our customers in 75+ countries and industry awards back it up. And it's all backed by a 100 day guarantee.
    Learn More
  • 1
    duply (simple duplicity)
    Duply is a shell front end for the duplicity backup tool https://duplicity.us . It simplifies the usage by implementing backup job profiles, batch commands and more. Secure backup to non-trusted file spaces made easy.
    Leader badge
    Downloads: 85 This Week
    Last Update:
    See Project
  • 2
    BIP39-XOR

    BIP39-XOR

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array ("seed")

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array (so-called "seed phrase") using exclusive OR (XOR)/Vernam cipher (a.k.a. One Time Pad). If not input by a user, an encryption key is automatically generated at random. Encryption with such a key preserves integrity of BIP-39 checksums of all keys (that's distinct while also compatible with SeedXOR implementation).
    Downloads: 10 This Week
    Last Update:
    See Project
  • 3
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    Naeon is a data encryption and sharding method designed to secure data in potentially untrusted off-site storage locations. It uses AES-256 encryption with a randomly generated passphrase, followed by obfuscation techniques to make the encrypted file unidentifiable. The data is then sharded into one private chunk containing the encryption key and part of the data, and multiple public chunks. Each chunk is renamed using its SHA-512 hash, and all chunks are timestamped equally. A filename...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    antigift

    antigift

    antigift is simple cross-platform, files & folders encryption tool

    antigift could be used for encryption files & folders on USB-flash or HDD partition. Works on Linux (including Android), Windows, Mac OS X, FreeBSD, DragonFly BSD and other on OSes. Do not required installation. Include WIPE tool for wiping free space and tool for recovery forgotten key. See documentation at http://sourceforge.net/p/antigift/wiki/Home/ antigift простой и кросс-платформенный инструмент для шифрования файлов и папок(с ccrypt в качестве основы) Подробности см. на...
    Downloads: 0 This Week
    Last Update:
    See Project
  • MRO and Flight Operations Software Icon
    MRO and Flight Operations Software

    For Aircraft operators, MRO's, OEM's and Airworthiness Organisations

    The culmination of over 30 years of experience, ENVISION utilises the most up-to-date technologies to empower aviation decision-makers by providing them with helpful and informative data that adds value to their organisation. ENVISION is web-based and device-agnostic so can be used anywhere, anytime. It also supports offline capability allowing you to continue working, even when you don’t have an internet connection. Our solution comprises of 9 modules that can either be purchased separately or together as part of an integrated solution. ENVISION can interface with numerous external systems, so when you implement you don’t have to start from scratch.
    Learn More
  • 5
    Cardano SL

    Cardano SL

    Cryptographic currency implementing Ouroboros PoS protocol

    Cryptographic currency implementing Ouroboros PoS protocol. The cardano-node is the top level for the node and aggregates the other components from other packages: consensus, ledger and networking, with configuration, CLI, logging and monitoring. The node no longer incorporates wallet or explorer functionality. The wallet backend and explorer backend are separate components that run in separate external processes that communicate with the node via local IPC. The new Cardano implementation...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    foo crypt, A Tale of cynical cyclical encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    httpshell is an interactive https command exploit to test the perimeter security of your network. This is a customized HTTPS encrypted reverse shell. It illustrates how easy to bypass any perimiter firewall and IPS by simply encrypting the data. To list all connecting clients: sulod -l To interact with existing client sessions: sulod -i <number> by Nelson Maligro
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    ssh-utils

    ssh-utils

    Support Tools for OpenSSH with multiple agents

    The ssh-utils package provides tools and extensions for the application of SSH. Current contained tools: - ssh-agent-manage.sh The management of the parallel SSH access by multiple agents, sessions, and keys. - ssh-pk-type.sh Displays private key type. - ssh-pk-asn1.sh Displays the private key as ASN.1.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    netseed

    A console script to provide functionality similar to ubuntu pollinate

    A console script to provide functionality similar to ubuntu pollinate and gather entropy from online sources to increase quality of randomness available to applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • The Easy Way To Build A Referral Program Icon
    The Easy Way To Build A Referral Program

    Referral Factory is the #1 referral software used by SMEs and Marketers.

    Referral Factory offers over 1000 pre-built referral program templates you can use as your own, or you can build your own referral program from scratch. You get unlimited referral campaigns on all plans, and brilliant support from their team of referral marketing experts.
    Learn More
  • 10
    Cassiopeia's BitMail

    Cassiopeia's BitMail

    Encrypting E-Mail Client

    ... ● POPTASTIC function (Chat over Email) ● Calendar widget functionality. ● Open Source. BSD License. "Cassiopeia is the tortoise of Momo, which can communicate through writing on her shell and guides into the future." - Wikipedia. Source from: https://sf.net/projects/spot-on/files/ & https://github.com/textbrowser/spot-on
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 12
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    ...MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that each ciphertext will differ radically from every other, even on the same message and identical key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Este é um projeto, onde estou criando um interface php para controle do servidor Radius, estou utilizando o freeradius. Ele ira contar com base de dados PostgresSql. Php e muitas funções rodando sobre o linux(Ubuntu server).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    AttackVector Linux

    AttackVector Linux

    linux distro for anonymized penetration based on Kali and TAILS

    AttackVector Linux is a new distribution for anonymized penetration and security. It is based on Kali and TAILS, which are both based on Debian. While Kali requires a modified kernel for network drivers to use injection and so forth, the Tor Project's TAILS is designed from the bottom up for encryption, and anonymity. Nmap can't UDP via Tor. The intention of AttackVector Linux is to provide the capability to anonymize attacks while warning the user when he or she takes actions that may...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    GPODCS is a Certification Authority developed in the ESA Grid Processing On Demand (gpod.eo.esa.int) project. It offers a PKI infrastructure and GSI authorization management. GPODCS is portable, reliable, easy to install, configure and personalize.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    SBCD

    partitioning backup recovery and all kind of boot loaders

    partitioning backup recovery and all kind of boot loaders
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    ENIGMA 2000

    ENIGMA 2000 is a reliable file encrypter for DOS shell

    ENIGMA 2000 is a symmetric cryptographic algorithm developed in C++ for Windows, to encrypt any file. It is not optimized for speed processing but it is extremly reliable. Tests state that a huge input file just with zeros, will return an output file whose frequency analysis is white noise. It uses six phases to encrypt any file and the phases sequence depends on the password. On phase 5, it uses the Rubik's cube paradigm to encrypt the data. It's extremly reliable and the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Skein 512-512 hash algorithm implemented in Bash. Prepare to have your CPU pegged, and for simple hash calculations to take around 10 seconds. Hit the Home tab for details.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Wifi Gateway
    Il Wifi-Gateway è un captive portal che permette l'accesso al network mediante vari metodi di autenticazione quali: CRS/CNS via IdPC, One-Time Password, Radius server, SMS ( tramite Skebby ). Il sistema è basato su CAS, NoCat e NoCatCAS.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    stlth (or "stealth") is a very simple script that uses cryptsetup to provide deniable encryption, or "steganography".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Sign APK (or JAR) archives by OpenSSL, using standard private keys and certificates instead of keytool-managed keystores.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A simple set of scripts and tools for creating and distributing PKI certs for libvirt servers and management clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    MS windows shell script to create simple certificate infrastructure. Handle self signed root certificate (CA), service certificates (https server for example) and user (personal) certificates.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A GnuPG Frontend GUI made in C#. It is compatible with PGP as well so it can be a very useful tool for encryption/decryption. It also incorporates a shell extension so it can be easy to right click and decrypt or decrypt.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Kojoney is an easy of use, secure, robust and powerfull Honeypot for the SSH Service written in Python. With the kojoney daemon are distributeds other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log fi
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next