Showing 91 open source projects for "cc-attack"

View related business solutions
  • Let your volunteer coordinators do their best work. Icon
    Let your volunteer coordinators do their best work.

    For non-profit organizations requiring a software solution to keep track of volunteers

    Stop messing with tools that aren’t designed to amplify volunteer programs. With VolunteerMatters, it’s a delight to manage everything in one place.
  • Email and SMS Marketing Software Icon
    Email and SMS Marketing Software

    Boost Sales. Grow Audiences. Reduce Workloads.

    Our intuitive email marketing software to help you save time and build lasting relationships with your subscribers.
  • 1
    ZAP

    ZAP

    The OWASP ZAP core project

    The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by a dedicated international team of volunteers. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. It's also a great tool for experienced pentesters to use for manual security testing. ZAP is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications...
    Downloads: 105 This Week
    Last Update:
    See Project
  • 2
    Proxyee

    Proxyee

    HTTP proxy server,support HTTPS & websocket

    Proxyee is a JAVA-written HTTP proxy server library that supports HTTP, HTTPS, and WebSocket protocols, and supports MITM (Man-in-the-middle), which can capture and tamper with HTTP, and HTTPS packets. The CA certificate (src/resources/ca.crt) from the project needs to be imported to a trusted root certificate authority. The CA certificate (src/resources/ca.crt) from the project needs to be imported to a trusted root certificate authority. You can use the CertDownIntercept interceptor to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    CC Mode is a GNU Emacs and XEmacs mode for editing C and other languages with similar syntax; currently C++, Objective-C, Java, CORBAs IDL, Pike, and AWK. It is a standard package in both GNU Emacs and XEmacs.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4

    DVB Inspector

    DVB transport stream analyzer written in java

    DVB Inspector is a java program to analyze captured DVB-streams. It is not a real time tool that can interact with PC-TV DVB hardware directly. You have to use another program to record a Transport stream. It can show the logical structure of the DVB SI and PSI data. It can also show bit rate usage data. Support for for DSM-CC Object carousels, teletext, DVB subtitles Version control has moved to https://github.com/EricBerendsen/dvbinspector . New versions will be available for download here...
    Leader badge
    Downloads: 53 This Week
    Last Update:
    See Project
  • Claims Processing solution for healthcare practitioners. Icon
    Claims Processing solution for healthcare practitioners.

    Very easy to use for medical, dental and therapy offices.

    Speedy Claims became the top CMS-1500 Software by providing the best customer service imaginable to our thousands of clients all over America. Medical billing isn't the kind of thing most people get excited about - it is just a tedious task you have to do. But while it will never be a fun task, it doesn't have to be as difficult or time consumimg as it is now. With Speedy Claims CMS-1500 software you can get the job done quickly and easily, allowing you to focus on the things you love about your job, like helping patients. With a simple interface, powerful features to eliminate repetitive work, and unrivaled customer support, it's simply the best HCFA 1500 software available on the market. A powerful built-in error checking helps ensure your HCFA 1500 form is complete and correctly filled out, preventing CMS-1500 claims from being denied.
  • 5
    TravBot | Free Travian Bot

    TravBot | Free Travian Bot

    A simple free travian bot

    ... determine how often and the bot can also stop farming farms that are being defended and save you some troops that way. Supports proxies. The bot also has a builder that allows you to create unlimited build queues to upgrade your villages and build new buildings. There are more features like attack warnings and troop training. Offical site: https://travbot.eu/ Join the discord channel for more information and support! - - https://discord.gg/SVaZx3A - -
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Novel Insight Inner Circle

    Novel Insight Inner Circle

    Graphical message and file encryption tool

    ... OpenJDK 16 (Not Oracle's J2RE 1.8) to run. Install, for example, AdoptOpenJDK for Windows. NOTE: By using encryption twice the implementation is (in theory) vulnerable to Meet-In-The-Middle attack reducing key size to 256bit but the attack still requires 2^256 bytes of memory making it impossible in practice.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Google2SRT

    Google2SRT

    Download, save and convert multiple subtitles from YouTube videos

    Google2SRT allows you to download, save and convert multiple subtitles and translations from YouTube and Google Video to SubRip (.srt) format, which is recognized by most video players. You can download XML subtitles or simply type video's URL, Google2SRT will do the rest.
    Leader badge
    Downloads: 102 This Week
    Last Update:
    See Project
  • 8
    Bat Attack

    Bat Attack

    Bat Attack is a cool classical 8bit game to save wife from the Bats

    Bat Attack is a cool classical 8bit game with bats instead and a lot of comic blood and gore and comical media with a funny story mode. The story starts when the main character 'Dave' is driving on his honeymoon with his wife Betty when an Evil bat swoops down and take his dearly beloved off. You have to get Betty back by using the guns available to your disposable. When the bats are killed they make a mess all over the ground and sometimes drop weapons they have devoured. There are three...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Music + Video + Animation Maker & App

    Music + Video + Animation Maker & App

    Why Music + Video + Animation Maker & App is Fun?

    .... Visualization (Slideshow / Animation) of Streams (Radio: asx, pls, m3u etc.) and News Feeds (RSS, XML) This Program is protected by 1st abstract & reg. International and root sec. laws as is comes free of use like that. Give your answers alike vaks@ccwf[.]cc[.]utexas[.]edu about Ani Magix or issue your activation phase of performer@df(.)lth.s(e)
    Downloads: 0 This Week
    Last Update:
    See Project
  • Finance Automation that puts you in charge Icon
    Finance Automation that puts you in charge

    Tipalti delivers smart payables that elevate modern business.

    Our robust pre-built connectors and our no-code, drag-and-drop interface makes it easy and fast to automatically sync vendors, invoices, and invoice payment data between Tipalti and your ERP or accounting software.
  • 10
    Our idea is to deploy a society of computational agents that collaborate in order to achieve the shared goal of decrypting a chunk of ciphertext or recovering a password from an hash by means of a dictionary-based attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    NitsLoch is an RPG inspired by several old computer games. You can collect weapons and items and attack enemies in different cities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    mirplant

    miRPlant: An Integrated Tool for Identification of Plant miRNA

    please cite: An J, Lai J, Sajjanhar A, Lehman ML, Nelson CC: miRPlant: an integrated tool for identification of plant miRNA from RNA sequencing data. BMC bioinformatics 2014, 15(1):275. We will create index for you if you tell us your interested plants (j.an@qut.edu.au).
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    Cracx

    Cracx

    simple and light-weight archive password cracker

    Cracx allows you to crack archive passwords of any encryption using 7-zip, WinRAR or a custom command, via Brute Force or Dictionary attack. Note: You must NOT use this program with files you don't have the rights to extract/open/use them! Currently, the program requires a current version of either 7-zip or WinRAR to be installed, but you can also use it to bruteforce basically anything that is executably via command-line with custom parameters. On an i7 CPU, it runs approximately 30...
    Downloads: 18 This Week
    Last Update:
    See Project
  • 14
    SoundForce Beta

    SoundForce Beta

    Sound Amplifier for Equalizer APO

    ! IMPORTANT : To install SoundForce, refer to the Installation Guide on tab "Files". SoundForce is a beautiful GUI based on EqualizerAPO. It actually is a sound amplification software. It is developed only for Windows so far, and supports Windows Vista and later. License: GNUv2, CC Developer: Antonis Chamilos
    Leader badge
    Downloads: 6 This Week
    Last Update:
    See Project
  • 15

    Owasp Zap Live CD

    Owasp Zap Live CD

    A live CD, live DVD, or live disc is a complete bootable computer installation including operating system which runs in a computer's memory.This live CD contains the Owasp Zap vulnerability test solution, the OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    AlarmS Am

    AlarmS Am

    A simple Alarm / Timer / Reminder

    To Run This you will need Java 8 It is a simple Alarm App. Icon by Baianat (http://www.flaticon.com/authors/baianat) from www.flaticon.com licensed by CC 3.0 BY (http://creativecommons.org/licenses/by/3.0/)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Online Zombie Game

    Online Zombie Game

    Online Zombie Game is a medieval-zombie apocalypse rpg game.

    Online Zombie Game. Control your character through medieval zombie apocalypse! * You have 4 attributes (Health,Attack,Defence,Critical Rate) * Train your character to get stronger. * Hunt in 11 different areas to get experience,golds,diamonds. * 50+ zombie types with different attributes. * Flexible choice of hunting time. (From 1 minute to 8 hours!) * Challange other players in the Arena , get weekly rewards. * Buy weapons/armors to prepare for fight. * Upgrade your trading ship...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    OWASP Zed Attack Proxy

    OWASP Zed Attack Proxy

    Find web application vulnerabilities the easy way!

    The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. Note that this project is no longer used for hosting the ZAP downloads. You should download ZAP via https://github.com/zaproxy/zaproxy/wiki/Downloads Please see the homepage for more information about OWASP ZAP
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A Transport Stream analyser for the Brazilian D-TV system (SBTVD / ISDB-Tb). It shows in a GUI the SI/PSI structure of the stream in a tree-view, bitrate statistics for each ES, specific Closed Caption, EPG and DSMCC carroussel decoding plus more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Aurora Game Hub

    Aurora Game Hub

    Experience your PC Games Beautifully. Try it, we think you'll like it.

    ... Consoles we can make something pretty cool. This is still a work in progress! So if you find any bugs please go here to report them: http://www.auroragamehub.com/support Thank you for your time! -- CC BY-NC-ND 3.0
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    AESTextCrypt

    AESTextCrypt

    Encrypt and decrypt text using AES 256 bit encryption

    ...-stretching and an adaptive key setup phase, the complexity (number of rounds) of which is automatically set to match the processing power of the encrypting computer. This makes it highly resistant to dictionary attack. AESTextCrypt is written in Java, so can be run on all desktop platforms - Windows, Mac and Linux.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22

    Old School Tool

    Old School gaming tool for GMs of AD&D/OSRIC.

    A java based tool that takes load off the AD&D or OSRIC GM by being able to quickly load creatures encountered and manage the combat quickly without having to reference attack matrix, hd calculations or other charts and tables. With the press of a few buttons a GM can create an encounter and then cycle through the rounds of combat easily finding the AC the creature hit, damage done and other basic information. Does NOT require a network connection to work and should run on just about any...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    FALCON - Text Search Java Project

    FALCON - Text Search Java Project

    JSON based text search Java Project

    ... Processing, Information Extraction and Question-Answering Architecture. ---------------------- - Latest Version - ---------------------- Details of latest version can be found on project website - http://geekdadaji.com --------------------------- - CONTACT DETAILS - --------------------------- CREATOR : SWAPNIL A JADHAV (saj1919) EMAIL ID : dadajibudhau@gmail.com WEBSITE : http://geekdadaji.com LICENSE : CC BY-NC 4.0
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Java-based Open Source WAF (Web Application Firewall) to include inside a web application in order to protect it against attacks like Cross-Site Request Forgery (CSRF), Parameter Manipulation and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Revenssis Ethical Hacking Suite

    Revenssis Ethical Hacking Suite

    Fully featured network, wireless and web app pentesting suite.

    Nicknamed as the "Smartphone Version of Backtrack", Revenssis Penetration Suite is a set of all the useful types of tools used in Computer and Web Application security. Tools available in it include: Web App scanners, Encode/Decode & Hashing tools, Vulnerability Research Lab, Forensics Lab, plus the must-have utilities (Shell, SSH, DNS/WHOIS Lookup, Traceroute, Port Scanner, Spam DB Lookup, Netstat... etc). All these fitting in an application approx. 10MB (post installation).
    Downloads: 17 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next