Showing 46 open source projects for "fly"

View related business solutions
  • Save hundreds of developer hours with components built for SaaS applications. Icon
    Save hundreds of developer hours with components built for SaaS applications.

    The #1 Embedded Analytics Solution for SaaS Teams.

    Whether you want full self-service analytics or simpler multi-tenant security, Qrvey’s embeddable components and scalable data management remove the guess work.
    Try Developer Playground
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    Alan Framework

    Alan Framework

    A C2 post-exploitation framework

    ... or from a traffic dump. Communication performed via HTTP/HTTPS. No external dependencies or libraries need to be installed. A powerful command shell. The agent configuration can be updated on the fly (you can change port and protocol too).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located...
    Leader badge
    Downloads: 146 This Week
    Last Update:
    See Project
  • 3

    DavUtils

    Powerful webdav client and sync tools with client-side AES encryption

    DavUtils is a collection of easy to use WebDAV client tools. The built-in client-side encryption allows you to encrypt and decrypt files on the fly with AES. Currently two command line tools are available: dav is a multipurpose WebDAV client that can be used like the standard unix tools ls, mkdir and rm. The other tool is dav-sync that can synchronize local files with a WebDAV server. It is very flexible and configurable and has advanced data safety features to prevent data loss...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    LibNetBlock - A Network Blocking Library

    LibNetBlock - A Network Blocking Library

    A library for blocking access to network on-the-fly

    LibNetBlock is a library that on-the-fly (by preloading) prevents a program under its control to use the network, to help to keep the user's privacy, prevent data leakage and virus spreading. You can think of LibNetBlock as a simple layer-7 (L7) firewall that simply blocks the network access for the program it controls. There is NO NEED to rebuild your software, because LibNetBlock is a pre-loadable library, meaning you just need to RUN the software with LibNetBlock loaded. LibNetBlock...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
    Get started free
  • 5

    Compare Backup Drive Hashes

    A spreadsheet to aid in detecting ransomware-corrupted files

    This project offers an Excel spreadsheet, available for download through the Files tab (above). The spreadsheet allows the user to compare two sets of file hashes, such as the hashes for files on two different data drives. The spreadsheet's Instructions tab provides step-by-step guidance through that comparison process. The purpose of the file hash comparison is to identify files whose contents have changed. For example, the files on an up-to-date data drive may be compared against the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    LibSecRm - Secure Removal Library

    LibSecRm - Secure Removal Library

    A library for secure deleting data on-the-fly

    LibSecRm (LIBrary for SECure ReMoval) is a set of replacements for these standard C functions which cause data removing from files. The data is first securely wiped on-the-fly, to protect the user's privacy, then the original functions are called. There is NO NEED to rebuild your software, because LibSecRm is a pre-loadable library, meaning you just need to RUN the software with LibSecRm loaded. LibSecRm is also a development library. The following wiping methods are supported: Gutmann...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    LibHideIP - An IP-hiding library

    LibHideIP - An IP-hiding library

    A library for hiding the local IP address from applications.

    LibHideIP is a library that on-the-fly (by preloading) prevents programs from knowing your IP address. This makes them unable to know and reveal your location, thus helping keep the user's privacy. There is NO NEED to rebuild your software, because LibHideIP is a pre-loadable library, meaning you just need to RUN the software with LibHideIP loaded. LibHideIP is also a development library. See the project homepage https://libhideip.sourceforge.io and the project Wiki in the menu above.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    Naeon is a secure cloud storage solution that uses unbreakable military-grade encryption and zero-knowledge privacy to protect confidential data in an untrusted environment. The data are encrypted using the AES 256-bit encryption algorithm with a randomly generated 128-character passphrase. Then, it is split into small pieces called chunks, which are obfuscated by adding random data to each chunk to make them unreadable and indecipherable to unauthorized individuals or processes. The...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    WipeFreeSpace

    WipeFreeSpace

    Secure wiping/shredding of free disk space with many methods

    ..., Schneier, DoD. Additionally, WipeFreeSpace can finalize wiping the filesystem by writing blocks of zeros, which is friendly for sparse files, virtual systems and other places where zeroed-out space is not physically allocated. See the project homepage https://wipefreespace.sourceforge.io and the project Wiki in the menu above. To prevent clear-text data from being left on the drive in the first place, you can use LibSecRm (https://libsecrm.sourceforge.io), which wipes the data on-the-fly.
    Leader badge
    Downloads: 38 This Week
    Last Update:
    See Project
  • Secure remote access solution to your private network, in the cloud or on-prem. Icon
    Secure remote access solution to your private network, in the cloud or on-prem.

    Deliver secure remote access with OpenVPN.

    OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
    Get started — no credit card required.
  • 10
    Atricore’s JOSSO is an open source and commercially supported Internet Single Sign-On (FSSO) solution for point-and-click and standards-based (SAML2) Internet-scale SSO implementations. For more information contact us at : http://www.josso.org
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11

    ProxyCrypt

    Encrypted volumes through command line

    ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. See the features below. It works as a "proxy" for the ImDisk Virtual Disk Driver. The latter is included in the full package and does not require installation. See...
    Downloads: 18 This Week
    Last Update:
    See Project
  • 12
    lua-resty-auto-ssl

    lua-resty-auto-ssl

    On the fly (and free) SSL registration and renewal inside OpenResty

    On the fly (and free) SSL registration and renewal inside OpenResty/nginx with Let's Encrypt. This OpenResty plugin automatically and transparently issues SSL certificates from Let's Encrypt (a free certificate authority) as requests are received. By default, resty-auto-ssl will not perform any SSL registrations until you define the allow_domain function. You may return true to handle all possible domains, but be aware that bogus SNI hostnames can then be used to trigger an indefinite number...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    WiFi-Pumpkin

    WiFi-Pumpkin

    WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack

    The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. It comes stuffed with features, including rogue Wi-Fi access points, deauth attacks on client APs, a probe request and credentials monitor, transparent proxy, Windows update attack, phishing manager, ARP Poisoning, DNS Spoofing, Pumpkin-Proxy, and image capture on the fly. moreover, the WiFi-Pumpkin is a very complete framework for auditing...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 14

    ET-Explorer

    replacement for the standard windows explorer.

    This application is a replacement for the standard windows explorer. When I began working with Windows 7 I noticed that some of the features I liked from XP were missing. After trying many freeware replacements and not finding any of them having all the features I needed, I decided to develop my own explorer replacement.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    dotNet Disk Imager

    dotNet Disk Imager

    Lightweight RAW and ZIP disk images reader and writer to USB or SD

    IMPORTANT!!! Since this is new software, your web browser, operating system or even possibly antivirus software may report security alerts against this tool. Please ignore that messages until this tool gets widely spread. This program is highly inspired by Win32 Disk Imager and sort of copies it's function. However, I've added some features, like verification of readed/writed image file and the most important is on the fly support for zipped images. Another features worth mentioning...
    Downloads: 36 This Week
    Last Update:
    See Project
  • 16
    SQUEEZER

    SQUEEZER

    Squeezer framework, build serverless dApps

    Squeezer is a platform that empowers new-entry blockchain developers to build serverless dApps simply as dead. The main usage of the ChainKit is to unify top blockchains interfaces into a single normalized API interface, therefore you can build blockchain dApps easily without digging into blockchain complex infrastructure. Bi-directional on-chain transactions (inbound and outbound). Build dApps connecting to smart contracts using chain kit agnostic connector. Quick intuitive code deployments...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    leet

    leet

    Leet is CCEx's software application for on-the-fly encryption (OTFE).

    The name leet stands for "Linux exquisite encryption tool", it will be a software application for on-the-fly encryption, similar in its functionality to TrueCrypt. The goal of leet however is to be simpler and as user friendly as possible, making encryption and securing of information accessible to anybody, even those who don't necessarily have any prior knowledge of data securing, algorithms and encryption. However it's not targeted at this group of users only, part of the ambition...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    LazLock

    LazLock

    Free, cross platform, portable password manager.

    The latest version of LazLock is at https://github.com/cyberfilth/LazLock/releases A free, lightweight, portable password manager for Windows & GNU/Linux that encrypts your data with 128 bit AES encryption. LazLock also includes a password generator which allows you to create more secure passwords. A plain text version of your data is never written to disk as all decryption is done in memory. LazLock is truly portable, no installation is required so it can be run from a USB...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    Bias :: Versatile Information Manager
    Bias is a cross-platform versatile information management application / Organizer
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    MITMf

    MITMf

    Framework for Man-In-The-Middle attacks

    ... by the various plugins, it also contains a modified version of the SSLStrip proxy that allows for HTTP modification and a partial HSTS bypass. As of version 0.9.8, MITMf supports active packet filtering and manipulation (basically what better filters did, only better), allowing users to modify any type of traffic or protocol. The configuration file can be edited on-the-fly while MITMf is running, the changes will be passed down through the framework.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 21

    TCP-IP Proxy with ISO8583 Decoder

    TCP-IP man-in-the-middle proxy

    TCP-IP man-in-the-middle proxy with ISO8583 decoder. Users specify the port to receive the message and the address and port of the destination message. The message has 2 byte header length followed by data. It is possible to change the message from the listening side to the sender side on the fly and vice versa. Cryptography enables to adjust message hash on the fly to accommodate changes made on the injected messages.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    CrococryptQuerl

    CrococryptQuerl

    CrococryptQuerl is a web-based file encryption & transfer tool

    CrococryptQuerl =============== CrococryptQuerl (CQuerl) is a web-based open-source file encryption and file exchange tool. If you trust the application service provider which is running CrococryptQuerl, it can be seen as an "anonymous & encrypted safe deposit box for computer files". ---INTRO--- The encryption is done on-the-fly using the user's password. Of course, this requires a trusted TLS/SSL connection to the server running CQuerl. The user provides a file and password...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    hsencfs

    hsencfs

    High Security Encrypting File System

    HSENCFS is a user space encrypting file system. Simple to set up, seamless to use, fast, safe, secure and maintenance free. It will encrypt data on the fly written to it, decrypt data read from it. HSENCFS uses only storage space for actual data stored, no pre-allocation needed. It is fast enough for real time Video Encryption. HSENCFS is classified as a variable key length encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Fleeting Password Manager

    Fleeting Password Manager

    Fleeting Password Manager generates and manages passwords.

    Fleeting Password Manager is a simple program that generates highly secure pseudo-random passwords from the given master password, URL/ID (e.g. facebook, www.facebook.com, google, my_server..) and user name. The user needs to remember only her master password to recover other passwords. Passwords are always regenerated on-the-fly from the given login data when needed and are never saved. In other words, Fleeting Password Manager combines the password creation and management. The length...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    JCryptor

    JCryptor is an encrypting tool based on the Caesar-cipher.

    JCryptor uses the Caesar-cipher to encrypt keystrokes on-the-fly. It can also be used to decrypt an encrypted text easily. Caesar-cipher is a simple encryption algorithm, developed by Julius Caesar, to encrypt his correspondence with Cicero in the ancient world. Therefore it uses a simple character substitution method to replace a given character by another. A keyshift of thirteen is called ROT13. ROT13 can be decrypted by encrypting it again with ROT13. Even today this simple method is used...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next