Showing 5 open source projects for "auto key clicker"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 1

    usb-guard

    Turn any USB flash drive into a master key for your PC

    ... - High-Fidelity Lock Screen: Glassmorphism aesthetics with GPU-accelerated blur effects that blend seamlessly with your desktop wallpaper. - System Integration: Auto-mutes volume when locked, persists via Windows Registry, and covers all connected monitors. - Master Recovery Key: Exportable backup codes ensure you never get permanently locked out. - Lightweight: Runs efficiently using direct native APIs instead of heavy middleware, keeping resource usage minimal. Built with .NET 10, WPF, and Fluent Design. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 2

    ProxyCrypt

    Encrypted volumes through command line

    ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. See the features below. It works as a "proxy" for the AIM driver or the ImDisk driver. AIM driver is included in the full package. See the documentation for more informations...
    Downloads: 26 This Week
    Last Update:
    See Project
  • 3
    XORimg

    XORimg

    A secure open source tool for performing XOR operations on images

    XorImg Decryptor (Beta) A lightweight Windows utility designed to decrypt images encrypted via XOR operations, specifically compatible with files processed through xorimg.ru. This tool allows users to reconstruct original images by applying a stored XOR key, ensuring privacy and offline processing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    CryptX Project v3.56

    A Quick Encryption Program!

    ...Some Of It's Features Include: Interactive Interface Hashing Function: {HASH ONLY} SHA1 SHA256 SHA384 SHA512 MD5 RIPEMD160 Key Generation: MACTripleDES Key Generation MD4 Hashes: Base64: {Encrypt/Decrypt} With/Without Password Encoding: Binary {Encrypt/Decrypt} Checksum Hashes: SHA1 SHA256 SHA384 SHA512 MD5 RIPEMD160 Checksum Auto-Save Read An Encrypted Text File To Decrypt It Read A Plain Text File To Encrypt It Save The Encrypted/Decrypted Text And Of Course Its All Free! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Add Two Lines of Code. Get Full APM. Icon
    Add Two Lines of Code. Get Full APM.

    AppSignal installs in minutes and auto-configures dashboards, alerts, and error tracking.

    Works out of the box for Rails, Django, Express, Phoenix, and more. Monitoring exceptions and performance in no time.
    Start Free
  • 5
    OnAccessFileEncryption

    OnAccessFileEncryption

    EaseFilter OnAcess File Encryption SDK

    Transparent file encryption performs real-time I/O encryption and decryption of the files in any block data with 16 bytes. The encryption uses a 256 bits symmetric key to encrypt or decrypt the data with AES encryption algorithm. Auto file encryption protects data "at rest", meaning the transparent data and files encryption. It provides the ability to comply with policies which can be applied by users, processes and file type. This allows only authorized users and processes to access the encrypted files, unauthorized users and processes can’t access the encrypted files. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB