Showing 4 open source projects for "dvda-author"

View related business solutions
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    HackBrowserData

    HackBrowserData

    Decrypt passwords/cookies/history/bookmarks from the browser

    ...It supports the most popular browsers on the market and runs on Windows, macOS and Linux. This tool is limited to security research only, and the user assumes all legal and related responsibilities arising from its use! The author assumes no legal responsibility! Installation of HackBrowserData is dead-simple, just download the release for your system and run the binary.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    Fileprivacy

    Fileprivacy

    Fileprivacy easily encrypts your files

    ...Because there are no start scripts, yet, you have to start Fileprivacy from console by typing: java -jar Fileprivacy-1.0_<version>.jar ####### ALSO NOTE ####### The author of this software is not responsible for the safety of your data. There is no guarantee that one or more of the implemented algorithms cannot be compromised.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    FileCrypter

    You do not want people snooping around in files? Use this now!

    You do not want people snooping around in files? Use this now! Even I (the author) can not decrypt your files. The program speaks for itself. And I do not need to tell you how it works because it is very simple.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Tread AES Encryption Decryption

    AES Encryption Decryption

    Usage: ---------------------------------------------------- TreadAES.exe {key} {input_path} {output_path} {mode} TreadAES.exe test ---------------------------------------------------- key = hexidecimal key e.g 0x00112233445566778899aabbccddeeff input_path = input file output_path = output file mode = 'encrypt' or 'decrypt' Note: paths are absolute test mode will run unit tests only Files are not to be overwritten Author: Hayden Virtue 2012 Implementation of Nov 2001 Unclassfied AES standard http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Previous
  • You're on page 1
  • Next