Showing 4 open source projects for "mp.3"

View related business solutions
  • ContractSafe: Contract Management Software Icon
    ContractSafe: Contract Management Software

    Take Control Of Your Contracts Without Wrecking The Budget

    Ditch those spreadsheets, shared drives & crazy-expensive solutions with too many bells & whistles. ContractSafe offers the simplest way to manage your contracts efficiently without breaking the bank.
  • Event Management Software Icon
    Event Management Software

    Ideal for conference and event planners, independent planners, associations, event management companies, non-profits, and more.

    YesEvents offers a comprehensive suite of services that spans the entire conference lifecycle and ensures every detail is executed with precision. Our commitment to exceptional customer service extends beyond conventional boundaries, consistently exceeding expectations and enriching both organizer and attendee experiences.
  • 1
    The Best Keylogger

    The Best Keylogger

    The Best Keylogger software is a convenient utility.

    The Best Keylogger software is a convenient utility that lets you keep track of all activity or logs on your computer, either visibly or invisibly. Download and try All in One Keylogger free of charge and get full access to all product functions for a 3-day trial period. - http://www.thebestkeylogger.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    ICRON's Keyloger

    Version one of ICRON's Basic Keylogger

    This is just an extremely basic key-logger.The source code is up so have fun. This key-logger stores it's logs inside of a text file known as Logs.txt. Later versions will contain a couple perks. I will release them in the coming weeks. This is for educational purposes only. I do not condone any nefarious uses for said keylogger. DO NOT USE ON ANY SYSTEM THAT IS NOT YOUR OWN. Also you must inform all users of said computer (if their are multiple accounts) that you will be using said program....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Skope Surveillance Suite [DEPRECATED]

    Skope Surveillance Suite [DEPRECATED]

    Monitor Activity on your Computer by Auto Screenshot Capture

    **NOTE: This project is deprecated due to obsolete code. If you are interested, a replacement project was started at github.com/gundermanc/skope-3. It is incomplete, but mostly functional. I am looking for developers to take over this project. Welcome to Skope. Skope is the intuitive, user friendly, and free open source monitoring solution from Gundersoft. Not just a keylogger, Skope is literally a "Skope" into your computer's usage. During the Skope setup, you are prompted to type...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    S-Log

    Um software de monitoramento (Controle parental) simples e eficiente!

    S-Log é um programa desenvolvido por Renan Cavalieri (Tec Dicas) com código fonte aberto, o programa tem o objetivo de monitorar tudo que foi digitado no teclado, útil para país descobrirem conversas ou comportamentos estranhos de seus filhos que navegam na Internet. A ferramenta é desenvolvida como base um Keylogger, porem não é um vírus (confira o código fonte caso tenha dúvidas), pois funciona de forma controlada e totalmente invisível ao usuário final, utilizando somente o modo...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • Previous
  • You're on page 1
  • Next