Showing 2 open source projects for "ios security bypass"

View related business solutions
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • Trumba is an All-in-one Calendar Management and Event Registration platform Icon
    Trumba is an All-in-one Calendar Management and Event Registration platform

    Great for live, virtual and hybrid events

    Publish, promote and track your events more affordably and effectively—all in one place.
    Learn More
  • 1
    Bridge Designer and Contest

    Bridge Designer and Contest

    A national virtual bridge engineering contest for kids of all ages.

    **Unfortunately, the Bridge Contest is no longer operational. We hope the code base will be of use to others with similar projects in mind.** A national virtual bridge engineering contest with prizes for middle and high school kids, grades 6 to 12, but anyone can enter for fun. Based on the award-wining Bridge Designer client software, now open source through this project. Web site infrastructure supports worldwide participation in qualifying and semifinal rounds with a tiny...
    Leader badge
    Downloads: 2,488 This Week
    Last Update:
    See Project
  • 2
    myAuxiliary.rb

    myAuxiliary.rb

    msf post-exploitation auxiliary module

    This auxiliary module needs [metasploit] framework installed.. This module its a metasploit post-exploitation (after the targets get's exploited) auxiliary script, so we need to exploit a target first in order to use it. Affected platforms: Windows OS (all versions above windows vista) Read my WIKI for further info: https://sourceforge.net/p/myauxiliarymete/wiki/Home/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next