Showing 44 open source projects for "disable-ver"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    YouTube Music

    YouTube Music

    YouTube Music Desktop App bundled with custom plugins

    ...Allows setting global hotkeys for playback (play/pause/next/previous) + disable media osd by overriding media keys + enable Ctrl/CMD + F to search + enable Linux mpris support for media keys + custom hotkeys for advanced users.
    Downloads: 155 This Week
    Last Update:
    See Project
  • 2
    BlockTheSpot

    BlockTheSpot

    Video, audio & banner adblock/skip for Spotify

    ...The tool focuses primarily on performance and ad suppression rather than cosmetic changes, ensuring that playback remains uninterrupted. It includes configurable options that allow users to enable or disable features dynamically, often through developer settings or configuration files. The project operates at a low level by modifying application components, which makes it effective but also susceptible to breaking when Spotify updates its software. It has gained popularity as a workaround for ad-supported tiers, though it requires manual installation and maintenance.
    Downloads: 150 This Week
    Last Update:
    See Project
  • 3
    Laravel Socialite

    Laravel Socialite

    Laravel wrapper around OAuth 1 & OAuth 2 libraries

    Laravel Socialite provides an expressive, fluent interface to OAuth authentication with Facebook, Twitter, Google, LinkedIn, GitHub, GitLab and Bitbucket. It handles almost all of the boilerplate social authentication code you are dreading writing. Laravel Socialite provides an expressive, fluent interface to OAuth authentication with Facebook, Twitter, Google, LinkedIn, GitHub, GitLab and Bitbucket. It handles almost all of the boilerplate social authentication code you are dreading...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    apk-mitm

    apk-mitm

    Application that automatically prepares Android APK files for HTTPS

    Inspecting a mobile app's HTTPS traffic using a proxy is probably the easiest way to figure out how it works. However, with the Network Security Configuration introduced in Android 7 and app developers trying to prevent MITM attacks using certificate pinning, getting an app to work with an HTTPS proxy has become quite tedious.
    Downloads: 13 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    USB Raptor

    USB Raptor

    Lock and unlock your computer using USB flash drives as keys

    ...If this specific file is found the computer stays unlocked otherwise the computer locks. To release the system lock user must plug the USB with the file in any USB port. Alternative the user can enable (or disable) two additional ways to unlock the system such is network messaging or password. Features • Automated USB lock and unlock function • Lock file contents are encrypted • Password to override lock (can be enabled by user) • Network command to override lock (can enabled by user) • USB drive serial number check (can be enabled by user) • Unique key for each system (can be enabled by user) • Status report function
    Leader badge
    Downloads: 1,184 This Week
    Last Update:
    See Project
  • 6
    BunkerWeb

    BunkerWeb

    Next-generation and open-source Web Application Firewall (WAF).

    Being a full-featured web server (based on NGINX under the hood), it will protect your web services to make them "secure by default". BunkerWeb integrates seamlessly into your existing environments (Linux, Docker, Swarm, Kubernetes, …) and is fully configurable (don't panic, there is an awesome web UI if you don't like the CLI) to meet your own use-cases . In other words, cybersecurity is no more a hassle.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Password-Manager

    Password-Manager

    Online keepass-like tool to manage password. client-side AES encrypt!

    ...In trusted computers, user can enable a PIN to login faster. PIN verification is complicated and involves both server and client. Though PIN is only 4 digits, it's still safe (server will disable PIN upon 3 errors) You can import CSV file including your account and passwords from other password managers to this one. Tags and search are supported now. Installation: https://github.com/zeruniverse/Password-Manager/wiki/Installation Upgrade: https://github.com/zeruniverse/Password-Manager/wiki/Upgrade-Password-Manager For demo, please visit: http://phppasswordmanager.sourceforge.net/ You can access the database for this demo at: https://mysql-p.sourceforge.net with login user: p2663268ro and password:12345678
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Hidden Gestione Password

    Hidden Gestione Password

    permette di salvare i codici segreti e le password

    MiCla Hidden "Gestione Password" permette di salvare tutti i codici segreti e le password che si hanno in possesso, compreso codici di accesso con scadenze. La finestra principale mostra la lista delle schede salvate in archivio "Schede Salvate", cliccando una voce, verrà mostrtato il contenuto nei vari campi. Utilizzare le scelte ("Modifica" e "Nuova") del menù principale per modificare o inserire una scheda (vedi Scheda Dati). MiCla Hidden conserva i dati in un archivio codificato con...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Password generator

    Password generator

    Software per generare password casuali di lunghezza variabile

    Software per generare password casuali di lunghezza variabile, in varie modalità e affidabilità, inoltre può attingere ai vocaboli di alcune lingue per ottenere chiavi di accesso più pratiche. Sistemi operativi supportati : Windows™ x86 / 64bit
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 10
    Private File

    Private File

    Container software to encrypt files.

    Software contenitore per crittare file. E' possibile creare un albero di cartelle e gestirle a proprio piacimento, i file inseriti nel programma vengono automaticamente crittati e mostrati come in esplora risorse. Tutti i dati crittati vengono gestiti da un file salvato in una posizione decisa dall'utente. E' possibile gestire più archivi, e salvarli su pen-drive o altro supporto removibile. . Container software to encrypt files. It is possible to create a tree of folders and manage them...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Backup timer

    Backup timer

    software per effettuare backup temporizzati

    software per effettuare backup temporizzati in modo automatico. Ha la possibilità di gestire fino ad un massimo di 5 backup contemporaneamente, ogniuno indipendente dall'altro. Se viene abilitato almeno un backup, questo programma viene lanciato automaticamente ad ogni avvio del computer, così ogni giorno e nel modo stabilito, effettua il/i backup in modo automatico. Quando è ridotto ad icona nella taskbar può essere aperto il programma facendo doppio click sull'icona, o aprendo un semplice...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Enigma critta file

    Enigma critta file

    Software per crittare qualsiasi tipo di file con una chiave privata

    Enigma critta file è un software nato per crittare qualsiasi tipo di file con una chiave privata o pubblica. Per chiave privata si intende una parola o frase (max 127 caratteri) che viene utilizzata dal programma per crittare/decrittare il file selezionato, impostata dall'utente nell'aposita casella. Per chiave pubblica si intende un modo per crittare un file senza conoscere la chiave. Una volta crittato un file con una chiave pubblica non sarà più possibile decrittarlo, solo chi ha...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    vulnerable-AD

    vulnerable-AD

    Create a vulnerable active directory

    ...It builds a domain controller (or augments an existing AD installation) with a variety of common misconfigurations and intentional weaknesses so practitioners can exercise attack techniques such as Kerberoast, AS-REP roast, DCSync, Pass-the-Hash, Silver/Golden Ticket attacks, and more. The project can create user objects with default or weak passwords, inject passwords into object descriptions, disable SMB signing, and manipulate ACLs to reproduce real-world privilege escalation and persistence scenarios. A convenience wrapper and examples make it straightforward to deploy in a local lab: you can install AD services, run the script on a domain controller, and generate hundreds of vulnerable accounts and conditions for testing. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Personal Privacy

    Personal Privacy

    Program to manage privacy on Windows

    Program to manage privacy on Windows by deleting files really permanently, deleting temporary files no longer needed, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    CloseTheDoor
    CloseTheDoor indentifies all the listening ports TCP/UDP over IPv4/v6 and the associated program files. This will help you to detect security holes and close backdoors when you want to prevent remote attacks.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 16
    Codex - Password Manager

    Codex - Password Manager

    Administrador de contraseñas para todas sus cuentas. Fácil y seguro.

    ...La idea principal es diseñar una forma fácil y segura de administrar sus cuentas web, con herramientas como ezLink y copiar / pegar doble clic hace que su fecha sea más segura de usar, ver y guardar. Está hecho en C ++ y se actualizará pronto para la gestión web y más.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    SSL Kill Switch 2

    SSL Kill Switch 2

    Blackbox tool to disable SSL certificate validation

    Blackbox tool to disable SSL/TLS certificate validation - including certificate pinning - within iOS and macOS applications. Once loaded into an iOS or macOS application, SSL Kill Switch 2 will patch low-level functions responsible for handling SSL/TLS connections in order to override and disable the system's default certificate validation, as well as any kind of custom certificate validation (such as certificate pinning).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    waircut

    waircut

    WPS wireless protocol audit software for Windows

    ...Puede comprobar si el router tiene establecido un pin wps genérico y conocido, si es vulnerable a un ataque por fuerza bruta o si es vulnerable a un ataque Pixie-Dust. Ver Instrucciones de instalación en la wiki.
    Leader badge
    Downloads: 3,426 This Week
    Last Update:
    See Project
  • 19
    Oryon OSINT Browser

    Oryon OSINT Browser

    Portable Open Source Intelligence (OSINT) Web Browser

    ...To safely use all Oryon Browser options, it is recommended that you take the following steps: 1. Check your browser privacy settings. Reset all settings if necessary or make the necessary changes. 2. Disable browsing history (extension: History On / Off) 3. Enable free proxy (extension: Hotspot Shield Free VPN Proxy) 4. Create a dedicated gmail account 5. Create dedicated accounts on Facebook and Twitter 6. Take a look at the collection of links 7. Check out the Oryon Tools bookmarklet 8. Check installed add-ons (extensions: Context, Extension Manager) 9. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 20
    Anti-Adblock Killer

    Anti-Adblock Killer

    Keep your Ad-Blocker active, when you visit a website and it asks you

    Helps you keep your Ad-Blocker active, when you visit a website and it asks you to disable. Composed of a user script «AakScript» written in javascript and a filter list «AakList» using the same syntax as lists AdBlock and AdBlock Plus, the two are complementary and unlock different website. Check if you have only one Adblocker enabled. (Adblock, Adblock Plus or uBlock Origin). Check if the script manager is enabled (Greasemonkey, Tampermonkey, NinjaKit, etc...).
    Downloads: 7 This Week
    Last Update:
    See Project
  • 21
    URC ACCESS MODES v3.0

    URC ACCESS MODES v3.0

    Provides control of Various Functions with pasword protected interface

    With URC ACCESS MODES v3.0 we can have complete protection & control for our desktop/laptop with a password protected interface it has 6 best tools which includes : USB Tool & CD/DVD Tool, Registry(regedit.exe) Tool & Command Prompt(cmd.exe) Tool, Group Policy Tool(gpedit.msc) & Task Manager Tool(taskmgr.exe), With USB & CD Tools , Data Theft is Eliminated , No one can access our data without our permission since we can disable USB Mass Storage Devices such as Pen Drives , Hard Disk etc whereas your USB Peripheral Devices will work normal including USB Mouse, Keyboard, Webcam etc Also Virus Problem is Eliminated since no data is transferred it protects us from Viruses With Registry & Command Prompt Tools , Unauthorized Code Execution is Eliminated since we can disable command prompt & registry no one can write commands/registry entries manually and execute it Also Protection From Hackers since they can execute some codes via command prompt which may retrieve our data
    Leader badge
    Downloads: 34 This Week
    Last Update:
    See Project
  • 22
    Mouse Lock

    Mouse Lock

    Locks your computer and see if anyone was trying to guess the password

    Feel like locking your mouse when you are away? Well... you can! Mouse Lock dims your desktop (or set to solid black background) while sucking your mouse cursor to the centre of the screen! The password window also acts like an inescapable mouse trap. Neat! (No mouse is harmed during the production of this software.) If you encounter any bugs, please contact me at wongchoonjie (at) gmail (dot) com. If you really like Mouse Lock, please consider donating ;)...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23

    LockyMonitorConsole

    Console app to check if files has been changed by crypto ransomware

    ...Don't use it in productive environments to prevent data loss! The Software comes without any warranty. If files has been changed it send a email and shutdown or disable the network interfaces of the host. It runs under the user account and monitor drives which are connected to a server share. Works with remote to local Symlinks on a server share. Can map and monitor drives by using the subst or net use command. Can monitor multiple folders or drives. It communicates with a Windows LockyDisconnectService to disable all physical Network Interfaces (NICs). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    LockyService

    Windows Service to monitor file events for crypto ransomware

    ...Don't use it in productive environments to prevent data loss! The Software comes without any warranty. When a alarm is triggerd it send a email and shutdown the host or disable the network interfaces. The alarm can be triggerd if locky extensions were found. Or if files were probably encrypted (big file entropy level). Or if a file event counter exceeds the allowed number of events in a certain periode of Time. Or if the the file extension does not represent a valid file because it has been encrypted. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    lshell is a shell coded in Python, that lets you restrict a user's environment to limited sets of commands, choose to enable/disable any command over SSH (e.g. SCP, SFTP, rsync, etc.), log user's commands, implement timing restriction, and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB