Showing 5 open source projects for "stealth"

View related business solutions
  • Small Business HR Management Software Icon
    Small Business HR Management Software

    Get a unified timekeeping, scheduling, payroll, HR and benefits portal with WorkforceHub.

    WorkforceHub is the instantly useful, delightfully simple to use, small business solution for tracking time, scheduling and hiring. It scales as your business grows while delivering the mission-critical features an organization needs. It is tailored to, built for, and priced for small business employers.
  • Cybersecurity Management Software for MSPs Icon
    Cybersecurity Management Software for MSPs

    Secure your clients from cyber threats.

    Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
  • 1

    The Endling's Artifice

    Stealth/action shoot-em up game

    The Endling's Artifice is a tactical stealth/action game. It is a reboot of the Intruder's Thunder series. You can play the game as a stealth game, sneaking past enemy NPCs, or as a shoot-em up action game, killing everything that gets in your way. It's entirely up to you. This game features a rendering engine that uses LWJGL. The game can be played in full-screen or an 800x600 window. Custom levels can be created by using the IT4LevelEditor, and played in the game.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Intruder's Thunder 3: Shadow Destiny

    Intruder's Thunder 3: Shadow Destiny

    2D tactical stealth/action game

    Intruder's Thunder 3: Shadow Destiny is the sequel to Intruder's Thunder 2. It features an overhauled graphics engine, a new soundtrack, new game mechanics, new levels, and a unique story. The Intruder's Thunder games have been in development since 2011, and the third installment is by far the best one yet. Download the full version today and try it out!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    PBM stealth

    Data hiding in bi-level pbm images

    Implementation of block parity for hiding data in bi-level pbm images in java. Increasing the security of stenography by using a random symmetric key for embedding and extraction of data from image. The project also has a PBM viewer in java and ascii viewer which shows the pbm images in ascii format.This project uses binary coded pbm images. Research paper : http://arxiv.org/abs/1304.1683 Key mechanism is not functional and program have bugs which are to be fixed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Intruder's Thunder 2

    Stealth/Action game written in Java

    Intruder's Thunder 2 is a stealth/action game written in Java. It is the direct sequel to my first game, Intruder's Thunder. It comes with a level editor so anybody can create their own levels.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Pimberly PIM - the leading enterprise Product Information Management platform. Icon
    Pimberly PIM - the leading enterprise Product Information Management platform.

    Pimberly enables businesses to create amazing online experiences with richer, differentiated product descriptions.

    Drive amazing product experiences with quality product data.
  • 5
    iNetmon Portable
    iNet Portable boasts a confluence of innovative technologies coupled with many years of research undertaken in the area of network monitoring. It is aimed to take the burden of network administrators.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next