Showing 91 open source projects for "cc-attack"

View related business solutions
  • Free CRM Software With Something for Everyone Icon
    Free CRM Software With Something for Everyone

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    Think CRM software is just about contact management? Think again. HubSpot CRM has free tools for everyone on your team, and it’s 100% free. Here’s how our free CRM solution makes your job easier.
    Get free CRM
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    This program creates an email mailto link and allows the user to include a subject, Cc and Bcc fields.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    ADAM is the Active Defense Algorithm and Model. It is a formally defined process of determining appropriate active response actions in the event of an attack. This implementation shows that active defense can be a legitimate and responsible security tool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    GPP is a General Purpose Proxy Java graphical application intended mainly for packet inspection and modification. It's main idea is to be a little user-friendly portable man-in-the-middle tool for security analysis. Later, some protocols should be added
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    JHoney is a honeypot tool for Linux written in Java. It simulates vulnerable net services to trick an attacker or trojan to attack them. The attacker IP is blocked once a service is attacked, and then the intruder cannot attack for example webservers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Save hundreds of developer hours with components built for SaaS applications. Icon
    Save hundreds of developer hours with components built for SaaS applications.

    The #1 Embedded Analytics Solution for SaaS Teams.

    Whether you want full self-service analytics or simpler multi-tenant security, Qrvey’s embeddable components and scalable data management remove the guess work.
    Try Developer Playground
  • 5
    Authorize.Net Payment Gateway Java Class. A general class that can be used to connect to Authorize.net for credit card transacitons.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    OyVey is an easy-to-use E-Commerce shopping cart application written in java targeted for non-J2EE java servlet engines such as Tomcat or Resin. Features include web services, discount management, inventory tracking, cc authorization, & a modifiable UI.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    TLogin is a java login applet for tomcat that uses a database to track login attempts and the source of those attempts. Tlogin provides features for preventing web based password guessing attack by placing temporary locks on the account after every fail
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    This project will be the candidate reference implementation (RI) and candidate technology compatibility kit (TCK) for JCP JSR188, the CC/PP Processing Java API: http://www.jcp.org/en/jsr/detail?id=188
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    C Tasks consists of Ant tasks that invoke C/C++ development tools. The tasks are based on the very general CC task from Ant Contrib project on SourceForge. A framework for applying XSL transforms to buildfiles to target different systems is provided.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    A Tetris Attack Clone. *Not* classic tetris. Online multiplayer and limited IRC-style chat and game control. Available as both a Java applet and Java application. Registered on www.jars.com.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    JXMail allows you to send email easily and cleanly from within a jsp, servlet, or any java class, without delving into the intricates of Java Mail. Supports multiple recipients, cc, bcc, file attachments and html formatted email.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Java-tradewars Attack Terminal - A helper for the popular text game TradeWars 2002 written in Java. This program can be used as an applet on a board website or as a stand alone program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Some informations: Pub-Monkey is written in C++ with CommonC++2 and will run only on POSIX conform OSs, but not on Windows(No CC++2). Java-Monkey is written in Java and needs FtpBean (http://www.geocities.com/SiliconValley/Code/9129/javabean/ftpbean/)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The aim of the project is to create a device delivery context api for web servers. Many existing devices don't have a CC/PP or UAProf profile.The project aims to extend Sun's JSR 188 reference implementation by using WURFL device repository.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    Avatar the mmorpg

    Avatar - The Last Airbender You are an element bender

    Avatar - The Last Airbender You are an element bender, you are one of the 4 factions in the world, Earth Air Fire Water, protect your homeland, learn all you can, and maybe you can become an Avatar and rule all 4 elements.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    AutoCloner4Oracle-SAP

    Oracle RDBMS B&R Cloning Installation Systemcopy

    This software help to clone complex Oracle Databases fast and with nearby no effort in EMC^2 Networker or IBM Tivoli environments. IT's also great for fast restore of database cause it generates required RMAN scripts for your needs. It also help to clone whole database with Backup plus Oracle Agents for OEM/GC/CC. It manages oratab file in AIX, Solaris and LINUX based environments and create a standard directory tree below ~/admin/$ORACLE_SID to have a look and feel for all of your...
    Downloads: 0 This Week
    Last Update:
    See Project