Showing 33 open source projects for "infected data recovery"

View related business solutions
  • Omnichannel contact center platform for enterprises. Icon
    Omnichannel contact center platform for enterprises.

    For Call centers or BPOs with a very high volume of calls

    Deliver a personalized customer experience with every interaction, across every channel, with uContact, net2phone’s cloud contact center solution.
  • The Voice API that just works | Twilio Icon
    The Voice API that just works | Twilio

    Build a scalable voice experience with the API that's connecting millions around the world.

    With Twilio Voice, you can build unique phone call experiences with one API, to create, receive, control and monitor calls with just a few lines of code. Create an engaging voice experience that you can quickly scale and modify with a wide array of customization options and resources.
  • 1
    SimpleX

    SimpleX

    The first messaging platform operating without user identifiers

    ... user profile identifiers, providing better meta-data privacy than alternatives. Many communication platforms are vulnerable to MITM attacks by servers or network providers. To prevent it SimpleX apps pass one-time keys out-of-band when you share an address as a link or a QR code. Double-ratchet protocol. OTR messaging with perfect forward secrecy and break-in recovery. NaCL cryptobox in each queue to prevent traffic correlation between message queues if TLS is compromised.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 2
    pdfcrack is a command line, password recovery tool for PDF-files.
    Leader badge
    Downloads: 599 This Week
    Last Update:
    See Project
  • 3
    WipeFreeSpace

    WipeFreeSpace

    Secure wiping/shredding of free disk space with many methods

    WipeFreeSpace is a program to securely erase/wipe/overwrite/shred the free space on file systems WITHOUT DESTROYING EXISTING FILES, to prevent recovery of deleted sensitive data. This allows protecting the user's privacy when e.g. selling the drive or the whole computer. The following filesystems are supported: - Ext2/3/4, - NTFS, - XFS, - ReiserFSv3/4, - FAT12/16/32, - MinixFS1/2, - JFS, - HFS/HFS+, - OCFS. The following wiping methods are supported: Gutmann-like, random...
    Leader badge
    Downloads: 27 This Week
    Last Update:
    See Project
  • 4
    Secure Password Manager

    Secure Password Manager

    Application to generate, store, and manage passwords with encryption

    Secure Password Manager is a portable application designed to securely generate, store, and manage passwords using advanced encryption techniques to protect sensitive data. This practical, efficient, and simple application ensures that your passwords are always safe and easily accessible. To learn more, visit our website at https://securepassapp.netlify.app/ Key features include: Robust Password Generation: Create strong passwords using a combination of letters, numbers, and special...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Tigerpaw One | Business Automation Software for SMBs Icon
    Tigerpaw One | Business Automation Software for SMBs

    Fed up with not having the time, money and resources to grow your business?

    The only software you need to increase cash flow, optimize resource utilization, and take control of your assets and inventory.
  • 5
    Polarity Browser

    Polarity Browser

    A fast, secure, stable web browser powered by Chromium and Trident.

    Polarity is a dual engine browser powered by both Chromium and Trident that focuses on system efficiency by bringing low RAM and low CPU usage. This browser was also programmed to be optimized for Windows with an Android version available. Browse the web with an uncomplicated UI that is highly customizable with themes, apps, and extensions from the Polarity Store, GreasyFork, OpenUserJS, and UserStyles. Polarity also comes with a built in password manager which safely encrypts all data...
    Downloads: 78 This Week
    Last Update:
    See Project
  • 6

    Ransomware Recovery Tool

    Why pay Ransom when you have Ransomware Recovery Tool for decryption

    ... by encrypting lots of valuable data. But with this, Ransomware Recovery tool, now you can recover files infected by Ransomware and other viruses. This recovery tool is one of the best solution to recover & restore corrupt, damaged and inaccessible data with great efficiency. Ransomware Recovery Tool can recover deleted & corrupted files, images, videos, data in original state. With high end algorithm and two recovery modes, it recover maximum possible data from you corrupted FAT & NTFS drives
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Network Tracking Database

    Network Tracking Database

    Track your ARP/MAC table changes and so much more

    The Network Tracking Database (NetDB for short) tracks all changes to the MAC address tables on your switches and the ARP tables on your routers over time stored in MySQL. It supports extensive switch, VLAN and vendor code reports from a CLI or Web App. NetDB can generate CSV reports, track the usage of static IP addresses, record neighbor discovery data and much more. There is now a VM "appliance" with easier upgrades available in the Files section. See the http
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8

    [C#] Secure Shredder Console

    A console file shredder that supports many algorithms.

    There are many ways to delete a file, whether you want it to be secure or not, fast or not. Since nowadays, we use computers to store data (including confidential ones), we want to totally delete a file with no traces for any file recovery solution. The program supports Zero Data 1 Pass, British HMG IS5-Baseline 1 Pass, Russian GOST P50739-95 2 Passes, British HMG IS5-Enhanced 3 Passes, US DoD 5220.22-M / Canadian RCMP DSX 3 Passes, German VSITR 7 Passes, Bruce Schneier's 7 Passes, Canadian...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    General software and open source projects
    Downloads: 4 This Week
    Last Update:
    See Project
  • EBizCharge Payment Platform for Accounts Receivable Icon
    EBizCharge Payment Platform for Accounts Receivable

    Getting paid has never been easier.

    Don’t let unpaid invoices limit your business’s growth. EBizCharge plugs directly into the tools your business already uses to speed up payment collection.
  • 10

    USBizmo

    USB Gizmo for Dummies

    USB Gizmo for Dummies USBizmo is capable of restoring hidden files and directories from any USB devices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    fzRec

    FileZilla Password Recovery Tool

    Recover stored FileZilla passwords. Source: https://github.com/uberalles/fzRec
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    JDownloader Password Decryptor Portable

    JDownloader Password Decryptor Portable

    Decrypts JDownloader ejs files (works with Beta install too)

    JDownloader Password Decryptor Portable is the SecurityXploded's JDownloader Password Decryptor packaged with a PortableApps.com launcher as a portable app, so you can extract passwords from your JDownloader from this program on your iPod, USB flash drive, portable hard drive, etc. It has all the same features as JDownloader Password Decryptor, plus, it leaves no personal information behind on the machine you run it on, so you can take it with you wherever you go.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    USBRescueX

    USBRescueX

    Rescue and clean your hard disk or USB memory, delete broken shortcuts

    USBRescuex in its version 2.1 is a computer program category in utility software for files and folders, which its main function is the recovery of hidden files, read-only and corrupted our device (either USB memory devices, removable storage or hard disk). Besides recover those important files for you , eliminates the famous RECYCLER virus , which is the basis of other USB flash drives for viruses , this virus is the main wrongdoer in your USB/Storage Device/Device Storage space Removable...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 14

    An Open Source Knowledge Base System

    An open source, web based, platform independent knowledge base system.

    ... modify their own data unless user is admin or moderator, default users can't delete anything. Moderator is more restricted then admin but less restricted then default user. Supported data export formats: .doc .xls .csv .pdf and .xml. Printing and exporting can be done from any part of the site. single articles or multiple items from the list view. Multiple report types to keep track of your site. Change password support, Password recovery by user name or email support
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    cyphertite

    cyphertite

    Secure, encrypted, zero-knowledge online data backup.

    Introducing Cyphertite 2.0: An all new look and feel in Windows! Cyphertite is a tar-like secure remote archiver. It deduplicates, compresses, and encrypts data prior to transmission, providing total privacy while reducing unnecessary wire traffic. It seamlessly supports IPv6 and IPv4 on a variety of platforms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ErAce

    ErAce

    erase hard drive, wipe hdd

    ErAce is software that will over write hard drive 1-100 times. So it fulfils strictest security standards i.e. DOD 5220.22-M. In that way it is impossible to recover data. If You delete files and empty recycle bin it is possible to recover data with recovery software. ErAce will write whole hard disk and put it to zero at last cycle. After process hard drive looks like it was just came out of factory. ErAce works on Pentium or higher and AMD equivalent systems. It works even Intel based Mac...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Secure Shredder

    Secure Shredder

    Simple application which replaces the lower-level data of the target.

    Simple application which replaces the lower-level data of the target file completely.Which makes the data recovery difficult in another level.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    HFV (Hidden Folder Virus) Cleaner Pro

    HFV (Hidden Folder Virus) Cleaner Pro

    A Small Utility programmed to destroy Win32:Atraps-PZ[Trojan]

    .... This is where HFV comes to help...Simply paste the location of your Infected directory on the box & click Delete virus to get rid of virus. As a safety precaution, keep this software backed up on system as well since the virus which hides all files and creates a shortcut can also hide this software as well. P.S.It can also be used to hide your private data from Neighbors and Roommates;)
    Downloads: 114 This Week
    Last Update:
    See Project
  • 19
    IOS6 and recent iTunes updates have broken a few features. We have made some partial fixes, but they are not complete. If you'd like to help support our development, or take over the development please let us know. Explore the internal file structure of your iphone (or of a seized phone in the case of forensic teams) using either the iphone's own backup files or (for jail broken iphones) ssh. Viewing of plist, sqlite, and hex are supported. IOS 5 is now supported iOS 6 only partially...
    Leader badge
    Downloads: 47 This Week
    Last Update:
    See Project
  • 20

    SBCD

    partitioning backup recovery and all kind of boot loaders

    partitioning backup recovery and all kind of boot loaders
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Effacor

    Protect sensitive data that has been deleted from recovery.

    When a file is deleted from a device the space for that file is merely de-allocated. In short: The DATA contained in that file still remains, and can be recovered. This can quickly become a security concern. There are various areas of business where this scenario is unacceptable: HIPAA Protected Medical Information, and Financial Data amongst them. Client Data must be protected from recovery in the event of theft. Blue-Pencil was created to fulfill that. "Blue-Pencil" protects sensitive...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    pgpry is a Pthread-based password recovery program for private OpenPGP keys. Numerous options for restricting the key space are offered, including regular expression filtering and prefix/suffix filters.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    eEvidence Analyzer is an open source digital forensic analysis toolkit.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    This program is used as a tool to check for ASCII code and strip it out to a new file to recover documents that got corrupted or find hidden data in viruses that contain text by the virus writer or spies puting comments in images or other files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    File Nuke
    File Nuke, the Nuclear File Shredder! Whipe out suspicious data forever with this nuclear file removal tool ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next