Showing 1106 open source projects for "mp.3"

View related business solutions
  • Business Continuity Solutions | ConnectWise BCDR Icon
    Business Continuity Solutions | ConnectWise BCDR

    Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

    Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
  • Tigerpaw One | Business Automation Software for SMBs Icon
    Tigerpaw One | Business Automation Software for SMBs

    Fed up with not having the time, money and resources to grow your business?

    The only software you need to increase cash flow, optimize resource utilization, and take control of your assets and inventory.
  • 1
    2Pix
    2Pix integrates with Windows to allow you to easily encrypt and hide files in bitmap images, a process called steganography (not to be confused with stenography). Data is stored in the low-order bits of each pixel of an image, so the file is completely hidden from view. Version 1.1 now provides plausible deniability because no unencrypted signature is stored in the image header. It should be impossible to prove an image contains a hidden file (if you use a strong password and only use 1 or 2...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Mantra on Chromium

    Mantra on Chromium

    Chromium based portable browser for pentesters

    MoC is a chromium based portable browser with collection of open source extensions meant for penetration testers, web application developers and security professionals etc.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    SuStorID is an advanced Intrusion Detection System (IDS) for web services, based on machine learning. Its name comes from the term “Su Stori”, which in Sardinian language means “The Falcon”. It’s version is experimental, but demonstrates a number of interesting features, that can be readily exploited to detect and act against web attacks. SuStorID can be coupled with modsecurity, the well known web application firewall, to gather training data and provide for real-time counteractions. So,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Password Cracker
    Crack the encrypted passwords (MD5,SHA, etc....)
    Downloads: 5 This Week
    Last Update:
    See Project
  • Finance Automation that puts you in charge Icon
    Finance Automation that puts you in charge

    Tipalti delivers smart payables that elevate modern business.

    Our robust pre-built connectors and our no-code, drag-and-drop interface makes it easy and fast to automatically sync vendors, invoices, and invoice payment data between Tipalti and your ERP or accounting software.
  • 5

    S-Log

    Um software de monitoramento (Controle parental) simples e eficiente!

    S-Log é um programa desenvolvido por Renan Cavalieri (Tec Dicas) com código fonte aberto, o programa tem o objetivo de monitorar tudo que foi digitado no teclado, útil para país descobrirem conversas ou comportamentos estranhos de seus filhos que navegam na Internet. A ferramenta é desenvolvida como base um Keylogger, porem não é um vírus (confira o código fonte caso tenha dúvidas), pois funciona de forma controlada e totalmente invisível ao usuário final, utilizando somente o modo...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Effacor

    Protect sensitive data that has been deleted from recovery.

    When a file is deleted from a device the space for that file is merely de-allocated. In short: The DATA contained in that file still remains, and can be recovered. This can quickly become a security concern. There are various areas of business where this scenario is unacceptable: HIPAA Protected Medical Information, and Financial Data amongst them. Client Data must be protected from recovery in the event of theft. Blue-Pencil was created to fulfill that. "Blue-Pencil" protects...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    jPass

    jPass

    Cross-platform password manager

    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Halo LFS

    Antivirus Linux distro

    There are Linux antivirus distros available, but they are meant to scan a Windows system, not a Linux system. Halo, when finished, will scan a Linux system for viruses, as well as include security auditing tools for additional tests of the system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This project aims at developing a easy software for the protection of SCP-ECG files and also control the access to the protected files.
    Downloads: 1 This Week
    Last Update:
    See Project
  • HRSoft Compensation - Human Resources Software Icon
    HRSoft Compensation - Human Resources Software

    HRSoft is the only unified, purpose-built SaaS platform designed to transform your complex HR processes into seamless digital ones

    Manage your enterprise’s compensation lifecycle and accurately recognize top performers with a digitized, integrated system. Keep employees invested and your HR team in control while preventing compensation chaos.
  • 10
    Obfuscapery
    Obfuscapery - an email obfuscator that combines human interaction, the power of JQuery, and the nearly mystical properties of the XOR bitwise operator. The result is a simple, lightweight and portable plug-in.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Jumping Spider is a privacy tool to insure that files in a certain computer are free from sensitive and private data. This project still in the pre-alpha phase.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    HTTPBrute is used to calculate HTTP Digest Access Authentication as per RFC 2617. The tool will be able to perform brute force attacks to retrieve a lost password for a given Authentication response. MD5 is the only hashing algorithm implemented.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    IdentityTrust is a library that allows you to express trust criteria for identity providers and the attributes that they can assert in a fine granular and customizable way.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    REAPER Forensics
    Rapid Evidence Acquisition Project for Event Reconstruction (REAPER) - Open Source forensic environment for the complete automation of the digital investigation process. At its core is Debian Live and the Open Computer Forensics Architecture (OCFA).
    Downloads: 6 This Week
    Last Update:
    See Project
  • 15
    Mpctp is a tool for raw packets manipulation of the TCP/IP family that allows a large number of options. It is able to send certain types of packets to any specific target and manipulate various of its fields at runtime.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    CookieMonster that demonstrates HTTP session hijacking attacks. It sniff your network interface and hijack all cookie. The hijacked cookies can be edit and/or injected in your Firefox. It include a arp poisoning tool.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Network management and control with AAA (tacacs+ and in future radius) with some cluster facility - share critical information (active users, active devices) across a bundle of servers. CLI and Web control and telnet-like interface for external programs. This project will continue development (if I will have time) at github https://github.com/rvolkov/tacppd
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Basic Portscanner based on C++
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    USB Autorun Protector
    USB Autorun Protector is a free software to protect you from any kinds of autorun viruses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    This project will serve as a central hosting/bug tracking center for modifications to the SmoothWall.org firewall distribution. Support and information for the "mods" posted here can be found on the SmoothWall.org forums, the SmoothWall.org IRC server, or
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A 3 phase sudoku solver class. Where the last phase is a brute force solution.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    This is a program built on top of Python, Scapy, and Scapy EIGRP to aid in auditing the security of EIGRP implementations. Read the white-paper at https://docs.google.com/document/d/1ZVNwi5KRkbY_PxMoODTvwSh3qpzdqiRM9Q4qppP2DvE/edit?pli=1
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    HcryptoJ (Historical cryptology in Java) is a Java based programming library for implementing and analyzing historical ciphers. HcryptoJ is designed to support research and teaching in historical cryptography and computer science. Licensed under GPL.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    A simple applicatrion to calculate a Random Password starting from mouse movements.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Japps Password Creator
    This small application helps you to create passwords with different strength. Also this is a testproject, to find out how great options sourceforge has. :)
    Downloads: 0 This Week
    Last Update:
    See Project