Showing 40 open source projects for "windows key finders"

View related business solutions
  • An All-in-One EMR Exclusively for Therapy and Rehab. Icon
    An All-in-One EMR Exclusively for Therapy and Rehab.

    Electronic Medical Records Software

    Managing your therapy and rehab practice is a time-consuming process. You spend hours on paperwork, billing, scheduling, and more. Raintree’s Therapy & Rehab EHR is here to help you manage your practice more efficiently. With our all-in-one solution, you’ll get the tools you need to streamline your therapy and rehab practice, improve patient care, and get back to doing what you love.
  • Securden Privileged Account Manager Icon
    Securden Privileged Account Manager

    Unified Privileged Access Management

    Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.
  • 1
    This is a project to provide anonymous (although highly inefficient) IP networking It utilises public key cryptography to identify and communicate with nodes, and uses mechanisms to thwart traffic analysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Network Keylogger
    Network Keylogger is a program that sends every key pressed in a computer to another computer, via TCP/IP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    An advanced tool to manage dial-up connection (Internet Key connection). With EasyConnector you can automatically reconnect on connection loss or disconnect after a slot of time you decide on the interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    WMI Monitoring
    WMI Monitoring is web base monitoring computer system in windows platform. This sofware can monitoring registry key and running process in computer, audit software and hardware. WMI Monitoring come with jscript as client side and php as server side.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Simplify Purchasing For Your Business Icon
    Simplify Purchasing For Your Business

    Manage what you buy and how you buy it with Order.co, so you have control over your time and money spent.

    Simplify every aspect of buying for your business in Order.co. From sourcing products to scaling purchasing across locations to automating your AP and approvals workstreams, Order.co is the platform of choice for growing businesses.
  • 5
    I initially created this project to access to POP3 server through paranoic proxy . I found a way to answer the problem : SSH tunnels. I decided to refocus the project to a new goal: provide a front end to have a USB key portable SSH tunnel environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Wep key changer (wepkc) is a client/server application that allows you to protect your ad-hoc (point to point) Wireless network when you are unable to use (due to software or hardware limitations) sophisticated protocols like WPA.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it's based on wepattack and GPL licensed
    Leader badge
    Downloads: 49 This Week
    Last Update:
    See Project
  • 8
    CMS, webcommerce, intranet information, simple update, file/document/mp3 archivies, next release run from USB key
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    ethereal patch and external plugin to enable ssl decryption for ssl v3 tls v1 sessions with RSA key exchange
    Downloads: 3 This Week
    Last Update:
    See Project
  • Safety Management Platform | SafetyIQ Icon
    Safety Management Platform | SafetyIQ

    Keep your workers safe, no matter where they are

    SafetyIQ is revolutionizing the way businesses approach safety. As a leading provider of comprehensive workplace safety software, we cater to four key areas: Mobile Worker Safety, EHS (Environment, Health, and Safety), Fatigue Management, and Training. Our platform is designed to safeguard your workers, no matter their location or task, ensuring all-around safety compliance. Unlike most safety software providers that only react to incidents or implement proactive measures, SafetyIQ introduces a third pillar to safety management - predictive analytics. We transform the untapped wealth of safety data within your organization into actionable insights to inform safety strategies, mitigating risks even before they aris
  • 10
    ssh port forwarding - this java application creates multiple port forwarding tunnels to remote hosts, using SSH2 logins with public key or user/password. This provides secure access for mobile devices that support a java VM.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Ikedectypt is a perl script to decrypt IKEv1 packets in libpcap formatted trace file. You can use Ethereal(http://www.ethereal.com) to analyze decrypted trace. Key information(first initialization vector, skeyid_e) is needed to be supplied by user.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    YAWCU is a wireless LAN (WLAN) capture + WEP cracking utility. It can crack 64/128 Bit WEP keys on IEEE 802.11b/g networks by monitoring WLAN traffic and computing the resulting WEP key once enough packets have been gathered
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    AirSnort is a wireless LAN (WLAN) tool which cracks encryption keys on 802.11b WEP networks. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.
    Leader badge
    Downloads: 285 This Week
    Last Update:
    See Project
  • 14
    PoorMan'sSMS is simple to use script application for tracking software inventory (installed software) on small and medium sized MS Windows networks. It produces per machine and summary reports based on contents of Uninstall registry key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Trace2ip is to hold one trace of all connections IP, memory the information into the file. The file to have like unique key ip_source and like associate data header IP. Alternative Key:Audit, Trace, Monitor, Dump, IP.
    Downloads: 0 This Week
    Last Update:
    See Project