Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.
Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
Build an app in Retool
Find Hidden Risks in Windows Task Scheduler
Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
Help to convert text into secret codes , so that you can mail,chat and transfer text securely to prevent hacking.
How to use :
Step one - Open Endico 14
Step two - Decide what to do (Text Encode/Text Decode)
Step three - If You Selected Text Encode -> Then Type/Copy/Open .txt file to convert.
Step four - Copy the converted text into clipboard to chat,mail,print process etc.
Step five - If you want to Decode the code the again follow step two.
Step six - ...
Encryption/Decryption tool for words/hash/digits/encoded text
Word Cipher - KRIEG Technologies
Developed by: Northumber, KRIEG Technologies
This application is developed for encode/decode words and translate them into commons encryption languages but also ancient ciphering language.You can encrypt/decrypt words or text or digits into:
----- Text Ciphering -----
Albam Latin (Temurah)
Atbash Latin (Temurah)
Avgad Latin (Temurah)
Caesar Cipher
Flipped Text
----- Text Rotation -----
ROT5 (Digits)
ROT13 (Text)
ROT18 (Text &...
Decrypts and encrypts substitution, transposition and vigenere ciphers
Change log 1.01:
1)Error fixed on clicking solve and arrow buttons in the vigenere decoder
2)Error fixed when number of columns exceeds text length in substiution cipher
3)Can now handle variable block length when changing columns
4)Multiple identicle conversion values onn the frequency analysis page now not allowed
This project is near its final stages but there may still be improvements to be made. If you could write some form of review or send me an email with advice I would...
ActiveLock is an open-source copy protection, software licensing framework for all development enviroments supporting COM+ architecture. Core DLL available in VB2008 and VB6. Samples in C++, C#, Excel/Access VBA and keygens in PHP, ASP.NET available.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Fractal Encryption was once a dream, this is a quest to find the ultimate encryption layers behind the FES Protocol Released in ANTdb 2005.. It in it own base is the module to drive geometric fractal interlaced data.
WPACrackGUI es un entorno gráfico de crackeo de redes WPA con john.
WPACrackGUI es un programa que mediante a la generación asistida de john puede crackear redes WPA sin ningún problema simplemente clickeando unas veces.
SOLEid is a multi-purpose file protector that helps users to easily protect their files with different protection measures. The ones that are included till date are: password protection, hardware id lock, username and process protection.
Inferno is a simple and fast program that can securely delete files using the same methods as the U.S. Department of Defense. Inferno can also securely delete internet and windows history. Also it can even encrypt and decrypt your private files.
Secure and customizable compute service that lets you create and run virtual machines.
Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
BinaryPix is a Tool to create "Binary-Visual" Code out of ASCII-Text Then it places it on a choosen picture. Then you are able to water-mark your pictures with the "binary-hidden" code.
This is a collection of vb class modules written in native VisualBasic. They provide the following functionality: Processing of very large integer numbers, hashing algorithms, prime number handling and an implementation of the RSA algorithm.
Ascii based Encryption/Decrypt Software. Allows you to Encrypt/Decrypt Ascii and Ascii based files. Passwords can be of any length. Simple and easy User Interface. Allows other VB6 developers to encrypt in thier programs. (v2 only)
Lanchat is a Client/Server instant messenger chat service for network/internet use. Builds upon the many features of modern IM environments while implementing some unique ideas. Supports text formatting, blocking/banning, direct connections and much more
SFV.net is a sfv (Simple File Verificator) file creator and validator application. All code written by vb.net and requires .net framework for run or compile
An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
CryptoTW provides a win32 DLL that acts as an interface between the GPG.EXE from gnupg.org and a win32 program. Programming automated systems against the GPG.EXE is challenging. By solving the problem once, as a DLL, many developers can benefit.
The Leeter is an easy-to-use and convinient program to easily write hardly understandable text. While this is mainly not the intention of normal chatters it may be a nice joke to try out on friends. Provides 5 different options to scramble up your text.
The FreePKI project aims to create practical, interoperable & free code and services for Certificate and Registration Authorities based on the X.509 standard, including nearly zero-cost ID verification through a PGP-like web of trust scoring system.
The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.