Showing 86 open source projects for "hide"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 1
    CTFd

    CTFd

    CTFs as you need them

    ...Challenge plugin architecture to create your own custom challenges. Static & Regex-based flags. Custom flag plugins. Unlockable hints. File uploads to the server or an Amazon S3-compatible backend. Limit challenge attempts & hide challenges. Automatic bruteforce protection. Individual and Team-based competitions. Have users play on their own or form teams to play together. Scoreboard with automatic tie resolution. Hide Scores from the public. Freeze Scores at a specific time. Scoregraphs comparing the top 10 teams and team progress graphs. Markdown content management system. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    Blokada Apps

    Blokada Apps

    Repo for Blokada apps

    ...For ultimate privacy protection, upgrade to Blokada Plus and connect through our VPN. Available in both Blokada 6 and Blokada 5. We use WireGuard®, the most advanced VPN protocol, to encrypt your network activity and hide your IP address.
    Downloads: 123 This Week
    Last Update:
    See Project
  • 3
    WindowTextExtractor

    WindowTextExtractor

    WindowTextExtractor allows you to get a text from any OS

    ...Show passwords stored behind asterisks (*****) from most of the windows apps. Show detailed window and process information. Show process environment variables. Show or hide almost any desktop window. Take a window screenshot. Record window stream in avi file. OCR support (including text, bar codes and QR codes) for Windows 10, 11. Launch WindowTextExtractor on your system. Now simply drag the 'Find window' button to get a window information, text, password or image.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    emp3r0r

    emp3r0r

    Linux/Windows post-exploitation framework made by linux user

    A post-exploitation framework for Linux/Windows. Initially, emp3r0r was developed as one of my weaponizing experiments. It was a learning process for me trying to implement common Linux adversary techniques and some of my original ideas. So, what makes emp3r0r different? First of all, it is the first C2 framework that targets Linux platform including the capability of using any other tools through it. Take a look at the features for more valid reasons to use it.
    Downloads: 19 This Week
    Last Update:
    See Project
  • Smart Business Texting that Generates Pipeline Icon
    Smart Business Texting that Generates Pipeline

    Create and convert pipeline at scale through industry leading SMS campaigns, automation, and conversation management.

    TextUs is the leading text messaging service provider for businesses that want to engage in real-time conversations with customers, leads, employees and candidates. Text messaging is one of the most engaging ways to communicate with customers, candidates, employees and leads. 1:1, two-way messaging encourages response and engagement. Text messages help teams get 10x the response rate over phone and email. Business text messaging has become a more viable form of communication than traditional mediums. The TextUs user experience is intentionally designed to resemble the familiar SMS inbox, allowing users to easily manage contacts, conversations, and campaigns. Work right from your desktop with the TextUs web app or use the Chrome extension alongside your ATS or CRM. Leverage the mobile app for on-the-go sending and responding.
    Learn More
  • 5
    Laravel CSP

    Laravel CSP

    Set content security policy headers in a Laravel app

    ...This can be a security problem. Imagine one of your JavaScript dependencies sends all keystrokes, including passwords, to a third party website. It's very easy for someone to hide this malicious behaviour, making it nearly impossible for you to detect it (unless you manually read all the JavaScript code on your site). For a better idea of why you really need to set content security policy headers, read this excellent blog post by David Gilbertson. Setting Content Security Policy headers helps solve this problem. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    GopenPGP V3

    GopenPGP V3

    A high-level OpenPGP library

    ...This library lets developers perform key generation, message encryption and decryption, digital signing, and signature verification with straightforward functions that hide much of the boilerplate and nuance typically required when working directly with OpenPGP implementations. Built on top of a forked version of the Go crypto library, gopenpgp supports current OpenPGP RFC standards and includes examples for working with password-based encryption and PGP keys, as well as detached and inline signatures. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    BleachBit

    BleachBit

    deletes junk files to free disk space and improve privacy

    BleachBit frees disk space and maintains privacy. Cleans cache, Internet history, temporary files, logs, cookies, Firefox, Google Chrome, Flash, Windows, Linux, and more. Downloads are at www.bleachbit.org and source code is at GitHub.
    Leader badge
    Downloads: 850 This Week
    Last Update:
    See Project
  • 8
    Seed Tag

    Seed Tag

    Hide your SEED phrase in a fake SEED phrase

    use only v5! ru: хотелось железный кошелёк, но у них один недостаток — кто его в держит в руках, того и деньги. Эта программа попытка сделать что-то вроде brainwallet, можно используя три ключа (число, пароль и адрес почты) превратить свою сид-фразу в бессмысленную сид-фразу, которую уже можно записать на железный кошелёк/армейский жетон(dog tag). Настоящего шифрования здесь нет, но от честных людей может помочь. Pack your seed phrase into fake phrase using three keys (some number,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    SCLAlertView

    SCLAlertView

    Beautiful animated Alert View written in Swift

    Animated Alert View written in Swift, which can be used as a UIAlertView or UIAlertController replacement. Since UIAlertView is deprecated and UIAlertController only works on iOS 8.x or above, if you have a Swift project where you want to support iOS 7.x too, SCLAlertView is an ideal substitution. I tried to build an easy to use API, while beeing flexible enough for multiple variations, but I'm sure there are ways of improving and adding more features, so feel free to collaborate with ideas,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Nonprofit Budgeting Software Icon
    Nonprofit Budgeting Software

    Martus Solutions provides seamless budgeting, reporting, and forecasting tools that integrate with accounting systems for real-time financial insights

    Martus' collaborative and easy-to-use budgeting and reporting platform will save you hundreds of hours each year. It's designed to make the entire budgeting process easier and create unlimited financial transparency.
    Learn More
  • 10
    WindowTextExtractor

    WindowTextExtractor

    Gets a text from any window of an operating system including passwords

    WindowTextExtractor allows you to get a text from any window of an operating system including microsoft office programs, console windows and any window with support of Microsoft UI Automation (UIA). It can recover password stored behind asterisks (*****) from most of the windows apps.
    Downloads: 39 This Week
    Last Update:
    See Project
  • 11
    Simple Clipboard Logger

    Simple Clipboard Logger

    AutoSaves any text clipboard data into a single TXT file

    ...Its a fully offline python program that works in your windows tray, that lets you access the TXT file any time you need. Sadly, its worth mentioning that keyloggers that hackers use to steal data work with the same method as this program, except they hide it and send the data online, so this program may result in a false positive with your installed antivirus. You'll need to create an exception to let this program not get quarantined by accident. Source code is included with the program and this program will never send your data anywhere or record it anywhere else than that single TXT file so I assure you it is safe - you can check the source code yourself.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    bitcrypt

    bitcrypt

    BitCrypt is a free ultra-strong encryption that hides text in bitmaps.

    ...The program processes a user-supplied text encrypting it with the Rijndael cipher and storing it in a user-selected bitmap image. This later step is called steganography, which means "to hide invisibly". If you intend to store sensitive information invisibly, you may encrypt it with BitCrypt and keep it in a picture image. Alternatively, if you intend to pass information to another party, you may encrypt it using BitCrypt and publish it as a part of a website. In this manner, another party can access it without anyone realizing that information is transmitted. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Safe Locker

    Strong Folder/File hider for your windows using AES Encryption.

    This software allows you to hide folders and files securely. you can also save your notes with security. This software provides extra layer of security using AES 256 Encryption. Note: This will not encrypt your folder or files which you are hiding, this is only affect the Notes you are storing using this software. The Video shown below is for the Version 1.4.4 We recently upgraded the version to 4.0.0. with increased security and few animation to make app more interactive. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Casper-fs

    Casper-fs

    Casper-fs is a Custom LKM generator to protect and hide files.

    Casper-fs is a Custom Hidden Linux Kernel Module generator. Each module works in the file system to protect and hide secret files.The motivation: An attacker can read every file in your machine in a bad situation. But if you have a Casper-fs custom module, the attacker will not find the hidden kernel module that has functions to turn any file invisible and protect to block read/remove/edit actions. My beginning purpose at this project is to protect my server, which is to protect my friends' machines. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Stegofierfx

    Stegofierfx

    It is a simple and user friendly application to hide messages in image

    Stegofier is a simple and user friendly interface to hide and retrieve message inside any Image file (Specifically for Portable Network Graphics (.PNG) files) with a support for range of Devices and Operating Systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    MaskPhish

    MaskPhish

    Introducing "URL Making Technology" to the world

    MaskPhish is not any Phishing tool. It's just a proof of concept of "URL Making Technology". It is a simple Bash Script to hide phishing URLs under a normal-looking URL (google.com or facebook.com). It can be integrated into Phishing tools (with proper credits) to look the URL legit. Hiding phishing links in normal-looking trust-able links is a bigger part of social engineering. By using this method the attacker owns the trust of the victim, and the victim treats the phishing link as a normal link because the top-level domain (like Google, YouTube, New York Times, etc) is considered clean.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 17

    maskphish

    MaskPhish: First ever URL masking tool for Phishing

    MaskPhish can hide any URL to another URL. We can make https://ngrok.io/4GTJ78C [Example Link] to https://google.com/live-football@is.gd/6hts4 [Example Link] For more Cybersecurity information visit https://www.kalilinux.in
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Nothing Private

    Nothing Private

    A proof of concept that any website can identify and track you

    This project is a proof of concept that any website can identify and track you, even if you are using private browsing or incognito mode in your web browser. Many people think that they can hide their identity if they are using private browsing or incognito mode. This project will prove that they are wrong.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    Whonix

    Whonix

    Whonix is an Anonymous Operating System.

    THIS IS NOT WHONIX'S HOMEPAGE. Please go to: https://www.whonix.org/ (This is only Whonix's sourceforge must-have project page.) Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Steganograph

    Steganograph

    Hide your text message's inside a image

    This software let's you hide text message's inside a image .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Piens
    Piens is a multifunctional batch-based Program. You can do many useful things with it. Its not a malware. Its just get detected because a batch file which was convertet to exe. (CMLINE.exe)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    ...The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The system will deny the pings, scan nmap and any type of test that is made to the system, Protecting from the core The mechanism of the system will prevent the retrieval of information or any forence attempt by creating a different identity at each beginning of the system and permanently erasing the previous identity with a click on you can hide your activity, delete safely with different modules, each identity is different to avoid the digital forensic analysis. advanceatz6x2ozf.onion / Site
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23

    Encryption tool for configuration files

    Encryption tool for configuration files

    Encryption tool for configuration files Encryption tool to encrypt NET configuration files, automate this task in a simple and fast way, so you can hide the most sensitive information from "appSettings" support any type of NET config file. you dont need to do anything extra in your NET application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Zipped Steganography

    Zipped Steganography

    Hide files into ZIP archives

    Hide files into ZIP archives. Support Password protect mode for ZIP archives. Auto attaching ZIP file into Outlook
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    URC ACCESS MODES v3.0

    URC ACCESS MODES v3.0

    Provides control of Various Functions with pasword protected interface

    With URC ACCESS MODES v3.0 we can have complete protection & control for our desktop/laptop with a password protected interface it has 6 best tools which includes : USB Tool & CD/DVD Tool, Registry(regedit.exe) Tool & Command Prompt(cmd.exe) Tool, Group Policy Tool(gpedit.msc) & Task Manager Tool(taskmgr.exe), With USB & CD Tools , Data Theft is Eliminated , No one can access our data without our permission since we can disable USB Mass Storage Devices such as Pen Drives ,...
    Downloads: 10 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next