Showing 15 open source projects for "cc attack software"

View related business solutions
  • Multi-Site Network and Cloud Connectivity for Businesses Icon
    Multi-Site Network and Cloud Connectivity for Businesses

    Internet connectivity without complexity

    As your users rely more and more on Cloud and Internet-based technologies, reliable internet connectivity becomes more and more important to your business. With Bigleaf’s proven SD-WAN architecture, groundbreaking AI, and DDoS attack mitigation, you can finally deliver the reliable internet connectivity your business needs without the limitations of traditional networking platforms. Bigleaf’s Cloud Access Network and plug-and-play router allow for limitless control to and from anywhere your traffic needs to go. Bigleaf’s self-driving AI automatically identifies and adapts to any changing circuit conditions and traffic needs—addressing issues before they impact your users. Bigleaf puts you in the driver’s seat of every complaint and support call with full-path traffic and network performance data, delivered as actionable insights, reports, and alerts.
  • Business Continuity Solutions | ConnectWise BCDR Icon
    Business Continuity Solutions | ConnectWise BCDR

    Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

    Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
  • 1
    ZAP

    ZAP

    The OWASP ZAP core project

    The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by a dedicated international team of volunteers. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. It's also a great tool for experienced pentesters to use for manual security testing. ZAP is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications...
    Downloads: 67 This Week
    Last Update:
    See Project
  • 2
    Novel Insight Inner Circle

    Novel Insight Inner Circle

    Graphical message and file encryption tool

    Novel Insight Inner Circle is a message and file encryption tool for Windows. The software is developed in Java and requires 64bit Java JRE. The encryption uses AES-256 twice so it is harder to crack than the industry standard pure AES 256bit implementation (theoretical key size is 512 bit). The software writes encrypted data in ASCII text format which can be cut'n'pasted to messaging apps or to emails and back to Inner Circle when decrypting data. IMPORTANT: The software requires new OpenJDK...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    SoundForce Beta

    SoundForce Beta

    Sound Amplifier for Equalizer APO

    ! IMPORTANT : To install SoundForce, refer to the Installation Guide on tab "Files". SoundForce is a beautiful GUI based on EqualizerAPO. It actually is a sound amplification software. It is developed only for Windows so far, and supports Windows Vista and later. License: GNUv2, CC Developer: Antonis Chamilos
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    Java-based Open Source WAF (Web Application Firewall) to include inside a web application in order to protect it against attacks like Cross-Site Request Forgery (CSRF), Parameter Manipulation and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cybersecurity Management Software for MSPs Icon
    Cybersecurity Management Software for MSPs

    Secure your clients from cyber threats.

    Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
  • 5
    DroidVulMon

    DroidVulMon

    This project is to monitor vulnerability of Android based smartphone

    This project is to monitor vulnerability of Android based smartphone by collecting user's events activated inside of mobile smart work devices. We want to develop an Android Vulnerability Monitoring system (DroidVulMon) by collecting and aggregate diverse events activated from user's mobile device for detecting malicious attacks such as mobile exploits. We provide open source S/W with overall common modules such as collecting events and detecting malicious events.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Tower of Zaldagor

    Tower of Zaldagor

    The classic intelligent role playing game

    Tower of Zaldagor is a roleplaying game (RPG) where you need to use your wits and skills to complete challenges. Blade Kahn, a king of Sonthalas, has lost his daughter to the Great White Dragon: Zaldagor. She has been kidnapped by humanoids. You have been picked among the elite to return his daugther safely. Engage into an epic story where Gods change the future and demons interfere with the present. Download and discover the beginning of an epic story. The Android version is now available!...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    CC-XJC is a JAXB 2.0 XJC plugin for adding a copy constructor to schema derived classes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Cruisecontrol Config and Monitor Tool
    A rich client application for configuring and monitoring Cruisecontrol server(s).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    SeaMonster - Security Modeling Software
    SeaMonster is a security modeling tool for threat models. It supports notations that security experts and analyzers are already familiar with, namely attack trees and misuse cases, and can connect to a repository for model sharing and reuse.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Automated RMM Tools | RMM Software Icon
    Automated RMM Tools | RMM Software

    Proactively monitor, manage, and support client networks with ConnectWise Automate

    Out-of-the-box scripts. Around-the-clock monitoring. Unmatched automation capabilities. Start doing more with less and exceed service delivery expectations.
  • 10
    MCC is a UML model consistency checker, built as a plug-in for Poseidon for UML, based on description logics. Provides automated consistency checking of UML models.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    TLogin is a java login applet for tomcat that uses a database to track login attempts and the source of those attempts. Tlogin provides features for preventing web based password guessing attack by placing temporary locks on the account after every fail
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    C Tasks consists of Ant tasks that invoke C/C++ development tools. The tasks are based on the very general CC task from Ant Contrib project on SourceForge. A framework for applying XSL transforms to buildfiles to target different systems is provided.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The aim of the project is to create a device delivery context api for web servers. Many existing devices don't have a CC/PP or UAProf profile.The project aims to extend Sun's JSR 188 reference implementation by using WURFL device repository.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Avatar the mmorpg

    Avatar - The Last Airbender You are an element bender

    Avatar - The Last Airbender You are an element bender, you are one of the 4 factions in the world, Earth Air Fire Water, protect your homeland, learn all you can, and maybe you can become an Avatar and rule all 4 elements.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    AutoCloner4Oracle-SAP

    Oracle RDBMS B&R Cloning Installation Systemcopy

    This software help to clone complex Oracle Databases fast and with nearby no effort in EMC^2 Networker or IBM Tivoli environments. IT's also great for fast restore of database cause it generates required RMAN scripts for your needs. It also help to clone whole database with Backup plus Oracle Agents for OEM/GC/CC. It manages oratab file in AIX, Solaris and LINUX based environments and create a standard directory tree below ~/admin/$ORACLE_SID to have a look and feel for all of your...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next