Showing 181 open source projects for "find"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1

    Netviz

    Netviz is a Python app designed to monitor devices on the user's LAN.

    Netviz (short for NETwork VIsualiZer) is a Python program I cobbled together for a user to monitor devices on the user's LAN or a small section of the Internet. Essentially, it's a pretty interface for information on the MAC addresses and IPs of those devices. The range to search can be set either by the boundaries of the user's LAN using the "Find Range" button or through user-typed IPs. Also, there is a list of tracked MACs. If any of these tracked MACs appears on the LAN, the program shows...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 2

    WhitewallManager

    Whitelist manager

    WhitewallManager is a whitelist manager. It aims to be a web based administration tool for administrators using a default-deny approach to the security of the network they are responsible for. Default-deny is a superior model for network security as compared to default-allow, which is how the security model of most local area networks is modeled. Default-deny disallows all but access granted to resources which you specifically allow. The advantage to this is that any new resources which...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Open Nod32 Keyfinder

    Open Nod32 Keyfinder

    Find licences for your ESET anti-virus fast and easy.

    Apply the KISS Rule. KEEP IT SIMPLE STUPID! Find your ESET Smart Security and ESET Nod 32 Anti-Virus Licences (Username and password). Just like that, you press a button and you see the list of usernames and passwords ready for you to copy them. This proyect was born as "Elemental Nod32 Keyfinder". It was my first time with Regular Expressions and it was a total success :D Now i have decided to release it with a gorgeous GPL v3 (or higher) so you can undersand how this works...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    SXMD

    SXMD

    MultiDistribution with Diagnostics, Recovery, Backup, Cleaning.. tools

    The SXMD (" like Security-X MultiDistribution ") use syslinux, grub4dos and others bootloaders to recover a crashed boot or run many GNU / Linux utilities. The first category is "Antivirus" with editors like Antivir, AVG, Comodo, DrWeb, FSecure, Kaspersky, Panda, VBA ... The second is composed by GNU/Linux's Distro: DSL, CorePlus (+Qemu Starter), Slacko, Slax Custom, Slitaz & XPuD ... After, you can find very good Recovery and Partitioning tools : Redo Backup, Parted Magic...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Let your volunteer coordinators do their best work. Icon
    Let your volunteer coordinators do their best work.

    For non-profit organizations requiring a software solution to keep track of volunteers

    Stop messing with tools that aren’t designed to amplify volunteer programs. With VolunteerMatters, it’s a delight to manage everything in one place.
    Learn More
  • 5
    Dequiem

    Dequiem

    Python DDoS Tool

    Dequiem is a DDoS tool written in python 2.7
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    CavitySearch is a Bash script which utilizes several methods of assessing the capabilities of Bluetooth devices. Most of the information can be gathered without pairing with the target device or alerting the end user. CavitySearch will report running services, Device Name, Device Address, Device Type, open RFCOMM Channels "ports", open L2CAP PSMs "ports", device manufacturer, supported protocols, and more. It is also able to help find "hidden" services running on the device.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Pimp

    Pimp

    GNU Privacy Guard password's archive manager

    Pimp (Pimp is a manager for passwords) Pimp is a comfortable password manager i made up for security reason (it uses GnuPG) and because i need a universal password manager which let me have passwords in the clipboard (without typing anything (key loggers)) and use them also in my browser (which i think the default keyrings do not). It's simple and it's a Bash script (easy to read and modify to fit your personal needs). Hope you like it and find it useful!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Web Crawler Security Tool

    A web crawler oriented to information security.

    Last update on tue mar 26 16:25 UTC 2012 The Web Crawler Security is a python based tool to automatically crawl a web site. It is a web crawler oriented to help in penetration testing tasks. The main task of this tool is to search and list all the links (pages and files) in a web site. The crawler has been completely rewritten in v1.0 bringing a lot of improvements: improved the data visualization, interactive option to download files, increased speed in crawling, exports list of...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    ADC

    ADC

    configuration auditing and security policy compliance

    ADC is a tool that helps security administrators to maintain policy compliance of configurations and policies on numerous systems. ADC is similar to OpenAudit or OCS, however ADC is designed to collect arbitrary data (not limited to PC inventory), thus it helps information security experts control configurations and policies on remote servers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Business Continuity Solutions | ConnectWise BCDR Icon
    Business Continuity Solutions | ConnectWise BCDR

    Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

    Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
    Learn More
  • 10

    mod_detect

    Detects changes to your Website, finds malware

    I have several websites and some time ago I found code in one of my websites that I did not create. One of those scripts was able to send spam and the other one had some malware code in it. Now you can argue that my website was just not safe enough because who ever placed this code had been able to get in. That is true and the ideal situation is to have such a safe website that nobody can break in. But sometimes this is hard to achieve. mod_detect was developed to at least find code...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Nast is a packet sniffer and a LAN analyzer. It sniff packets and save data in files, checks NIC in promisc mode,build LAN hosts list, find a gw,performs a port scanning, catchs daemon banner etc... It also provides a GTK/ncurses interface.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12

    Cryptkeeper

    Cryptkeeper Secuirty tool

    In this program you will find tools like : Rawdata tool , file encryption , text encryption , program updater , program protecter , password manager , program settings , defult settings , settings viewer and the last is the file hashing. the file hashing you can use 6 hashing types for the file encryption 1 since i ran out of time for it , and the text encryption has 17 different types 12 encrypt and 5 hashing types. some uses encryption keys and some dont. there are AES , 4DES...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    mOTP4dotNet

    A Mobile One Time Passwords implementation in Visual Basic .Net

    A Mobile One Time Passwords implementation in Visual Basic .Net, written because I was able to find a reasonable MOTP client for just about every conceivable platform except Windows desktop! Learn more about MOTP at http://motp.sourceforge.net/
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14
    Safe3WVS is one of the most powerful web vulnerability scanner with AI on-the-fly web spider crawling technology,especially web portals ,it is the most fast tool to dig such as sql injection, upload vulnerability, and more.http://www.safe3.com.cn/en
    Leader badge
    Downloads: 23 This Week
    Last Update:
    See Project
  • 15
    A Windows software to find the prime numbers and save them, also features an ability to check whether the given number is prime or not.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Japps Password Creator
    This small application helps you to create passwords with different strength. Also this is a testproject, to find out how great options sourceforge has. :)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    For security reason you should remove all users and groups not used on a linux-system. This script will help you to find out which ones.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    PHP file monitoring program under LAMP environment without inotify。
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A program that uses the ICMPv4/v6 protocol to find and map which hosts are up in a network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Heuristic password brute force cracking. Project blather attempts to find a middle ground between brute force password cracking and dictionary attacks using language heuristics.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    The Ubuntu Malware Removal Toolkit is an Ubuntu-based LiveCD focused on Windows malicious software removal. The purpose of this distribution is to create a portable environment that will make it easier to remove malware from infected Windows systems
    Downloads: 9 This Week
    Last Update:
    See Project
  • 22
    In this project we present myEchelon, an intelligent system capable of carrying out the various stages of an Information Security Audit.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    This program is used as a tool to check for ASCII code and strip it out to a new file to recover documents that got corrupted or find hidden data in viruses that contain text by the virus writer or spies puting comments in images or other files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Dr. HydeFile hide files in a big crowd of files. Filesize: 1 KB - 20KB Number of Files: 500 - 20.000 Files Can you find a file in this crowd?
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    application that scans USB devices in order to find hidden and malicious code that might harm your computer
    Downloads: 0 This Week
    Last Update:
    See Project