Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Try Retool free
Outgrown Windows Task Scheduler?
Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.
Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
...Licensed Apache License, Version 2.0;
This is lightweight bitmessage client writing in java.
Supported platform:
Android,Linux,Windows
PS: If you liked this programm, buy the author a coffee https://www.buymeacoffee.com/fenenkoG
Open Source Security tool to audit hashed passwords.
...Supported algorithms:
MD5
MD4
SHA-256
SHA-512
MD5CRYPT
SHA1
ORACLE-10G
ORACLE-11G
NTLM
LM
MSSQL-2000
MSSQL-2005
MSSQL-2012
MYSQL-322
MYSQL-411
POSTGRESQL
SYBASE-ASE1502
INFORMIX-1170
To see syntax examples: https://sourceforge.net/p/jbrute/wiki/Examples
To see last news: https://sourceforge.net/p/jbrute/blog
FAQ: https://sourceforge.net/p/jbrute/wiki/FAQ/
General questions: jbrute-users@lists.sourceforge.net
(you can suscribe to mailing list at https://lists.sourceforge.net/lists/listinfo/jbrute-users)
Author: Gonzalo L. Camino
Icon Art: Ivan Zubillaga
Made in: Argentina :)
...Because there are no start scripts, yet, you have to start Fileprivacy from console by typing:
java -jar Fileprivacy-1.0_<version>.jar
####### ALSO NOTE #######
The author of this software is not responsible for the safety of your data. There is no guarantee that one or more of the implemented algorithms cannot be compromised.