Showing 1104 open source projects for "using"

View related business solutions
  • Build Secure Enterprise Apps Fast with Retool Icon
    Build Secure Enterprise Apps Fast with Retool

    Stop wasting engineering hours. Build secure, production-grade apps that connect directly to your company’s SQL and APIs.

    Create internal software that meets enterprise security standards. Retool connects to your business data—databases, APIs, and vector stores while ensuring compliance with granular permissions and audit logs. Whether on our cloud or self-hosted, build the dashboards and admin panels your organization needs without compromising on security or control.
    Learn More
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 1
    SecondFactor

    SecondFactor

    Two-Factor Authenticator for Windows.

    Need a two-factor authenticator for your computer? Tired of using your phone to log in to a website on your desktop? Introducing SecondFactor, a One-Time-Password Authenticator for Windows. SecondFactor supports Time-based One Time Passwords, which can be added directly, using a QR Code, or with an OTPAUTH URL. Your Secrets are stored securely for your local account, with the option to protect the program with a password for advanced security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    SecondFaqtor

    SecondFaqtor

    Two-Factor Authenticator for Linux.

    Need a two-factor authenticator for your computer? Tired of using your phone to log in to a website on your desktop? Introducing SecondFaqtor, a One-Time-Password Authenticator for Linux. SecondFaqtor supports Time-based One Time Passwords, which can be added directly, using a QR Code, or with an OTPAUTH URL. Your Secrets are stored securely for your local account, with the option to protect the program with a password for advanced security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Iron is synonym for chain and bar is a synonym for block. This project is to develop an SSI system using block chain protocol that can be used in authentication scenerios like games. It's not limited to games, just an example. see https://github.com/tatmanblue/ironbar
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Trias Concept Navigation is an interactive tool that allows the user to navigate through the concepts of a triadic dataset. In the preprocessing phase the user needs to use Trias or a different tool to generate the triconcepset and format it accordingly. Then, using the triconceptset as input, you can interactively navigate the triconcepts by adding constraints.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5

    libHDCP2

    HDCP 2.x framework in C

    Open source HDCP 2.x framework, written in C, using openSSL library
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Haley is a Steganography Tool written in C++ using Trolltech Qt4 Toolkit.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Time-stamp of a created file can be modified by attacker. This project is meant to track File timestamp values , using NTFS data structures rather than trusting the original time stamp modified by attacker.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A Gnome 2 Applet that listen,notify and log arp changes using arpwatch.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    LDAP Mobile Admin is an JavaME application to provides administration to an LDAP Server using the mobile Phone
    Downloads: 0 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 10
    Arduino Home System project aims to connect systems in the home and provide access and control of those systems. The initial goal of this project is to make a home security system using Arduinos and a Linux server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    spyse-subdomain-finder

    scrounges subdomains without the api from spyse cybersecurity search e

    We all know about the famous spyse.com this python3 scripts scrounges subdomains without the api. There is an option of getting the api, in fact that's what I recommend using the api they provide. Because this methods below may not bring out all subdomains as the api can and perhaps the portability also. https://www.nmmapper.com/sys/tools/subdomainfinder/ https://www.nmmapper.com/kalitools/theharvester/email-harvester-tool/online/ https://www.nmmapper.com/st/networkmapper/nmap/online-port-scanning/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Portable, optimised implementation of Bruce Schneier's 64-bit symmetric block cipher, Blowfish. Includes support for ECB, CBC, CFB, OFB and CTR block cipher modes, weak key detection and parallelisation using OpenMP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Huskarl is an alternative authentication and key exchange schema for Bluetooth devices.Huskarl produces secure shared link keys between two devices using public key cryptography.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Simple Encrypt

    Simple Encrypt combines RSA encryption with AES to encrypt text files.

    RSA (Rivest-Shamir-Adleman) is a public-key encryption algorithm with a typical key size of 1,024 to 4,096 bits. 2 large primes are required to generate the keys. AES (Advanced Encryption Standard) is based on Rijndael, secret-key encryption algorithm using a block cipher with key sizes of 128, 192, or 256 bits. Simple Encrypt will take a text file, generate keys and then encrypt it. The output is the ciphertext and keys. Note: Realistically, I will keep the algorithms simple(r) by having key sizes of 32 bits! Hopefully, I'll get round to developing a reasonably efficient class for larger numbers, but until then I am restricted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This is a PHP library that can be used to hide data (messages or files) in images using steganography techniques. The data in the image only exists symbolically and thus only you and the intended recipient will know of the existence of that hidden data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Open eSign allows software developers and technical parties in a company to create secure, online (web-based) forms and documents that follow a business process flow and enable legally recognized electronic signatures using digital signature technology.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Keylogger Hooks is a project designed to teach the implementation of keyloggers using hooks on Windows machines. Associated blog located at http://www.progproj.net.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Panel Management Messaging Panel web management e-mail servers. The system is written in PHP using Symfony 1.2 framework
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The iText based PDF sCramblEr allows you to encrypt a PDF using one or more public certificates of the addressees (one or more .cer files). For each .cer file, you can enforce specific PDF permissions: (dis)allow printing, (dis)allow modification,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    facial-recognition-authentication

    facial-recognition-authentication

    Enhanced WordPress login security with email, password, and facial rec

    This WordPress plugin adds an additional layer of security by requiring users to authenticate using their email, password, and facial recognition before accessing the login page. Ideal for high-security websites and those wanting to enhance user authentication beyond traditional login methods. With this plugin, you ensure that only authorized users can enter your WordPress site, minimizing the risk of unauthorized access. Protect your site and data with this triple-layer authentication system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A simple and incredibly powerful tool for scripting and fuzzing arbitrary network protocols written using the Chicken Scheme-to-C compiler.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    lrzip

    Long Range Zip

    Lrzip is a lossless compression application designed to scale with modern hardware resources using a variety of different back end compression algorithms with the ability to have unlimited size compression windows and optional high grade encryption. The larger the file the better the compression possible and the more powerful the hardware the faster it can compress with a heavily multithreaded design.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Revelation NT

    Re-implementation of the Revelation Password Manager in Java

    As the original Revelation Password Manager seems to be dormant, and Gnome 3 removed it's greatest feature, the taskbar applet, and having a lot of passwords in the revelation format, re-implementing the password manager in Java seemed like a good idea. YMMV. The goal is to have a common underpinning to allow quick addition of file formats, storage locations and platforms by using Java. Currently the most basic part of the original application, opening, looking at and searching in a revelation file work in SWT on linux and windows (haven't tried macos) and android.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Cryptofon

    Cryptofon

    Cryptofon - a safe phone with integrated encryption.

    The Cryptofon is designed to enable safe and secure communication trough a regular PSTN line. It supports narrowband connections (~2400 bit/s and lower).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Katyusha

    Katyusha

    Multiple Payload Launcher System

    ...: https://github.com/GenesisFoundationCore/Katyusha Katyusha, Multiple Payload DDoS Software, that uses images / gif files as Payloads in-order to flood a Group Chat / Discord Server with Messages and Images, Using Windows Clipboard it copies the "Payload" images to your clipboard so YOU don't have to. Why is it adfoc.us? This is so we can continue Developing Katyusha and Project Armageddon, Don't worry It's way Better than Linkvertise! But.. If you don't want to do that, You can Clone / Download the repository and Build the Application yourself if you don't like to wait, To Use Katyusha Launch cmd.exe and cd (Katyusha's Current Location) then Katyusha.exe (Directory) (mode) (option)
    Downloads: 0 This Week
    Last Update:
    See Project