Showing 34 open source projects for "long file path"

View related business solutions
  • Build on Google Cloud with $300 in Free Credit Icon
    Build on Google Cloud with $300 in Free Credit

    New to Google Cloud? Get $300 in free credit to explore Compute Engine, BigQuery, Cloud Run, Vertex AI, and 150+ other products.

    Start your next project with $300 in free Google Cloud credit. Spin up VMs, run containers, query exabytes in BigQuery, or build AI apps with Vertex AI and Gemini. Once your credits are used, keep building with 20+ products with free monthly usage, including Compute Engine, Cloud Storage, GKE, and Cloud Run functions. Sign up to start building right away.
    Start Free Trial
  • Cut Your Data Warehouse Bill by 54% Icon
    Cut Your Data Warehouse Bill by 54%

    Migrate from Snowflake, Redshift, or Databricks with free tools. No SQL rewrites.

    BigQuery delivers 54% lower TCO with serverless scale and flexible pricing. Free migration tools handle the SQL translation automatically.
    Try Free
  • 1
    ntfy

    ntfy

    Utility for sending notifications, on demand and when commands finish

    ntfy brings notification to your shell. It can automatically provide desktop notifications when long-running commands finish or it can send push notifications to your phone when a specific command finishes. The install technique in the quickstart is the suggested method of installation. It can be installed in a virtualenv, but with some caveats, Linux notifications require system-site-packages for the virtualenv and OS X notifications don’t work at all. ntfy has support for automatically...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    StatiCrypt

    StatiCrypt

    Password protect a static HTML page

    StatiCrypt uses AES-256 and WebCrypto to encrypt your HTML file with your long password and return a static page including a password prompt and the javascript decryption logic that you can safely upload anywhere (see what the page looks like). This means you can password protect the content of your public static HTML file, without any back-end - serving it over Netlify, GitHub pages, etc. You can encrypt a file online in your browser (client side).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    UACMe

    UACMe

    Defeating Windows user account control

    Run executable from command line, akagi32 [Key] [Param] or akagi64 [Key] [Param]. First parameter is a number of methods to use, second is an optional command (executable file name including full path) to run. The second parameter can be empty - in this case, the program will execute elevated cmd.exe from the system32 folder. Since 3.5.0 version all "fixed" methods are considered obsolete and removed altogether with all supporting code/units. If you still need them. This tool shows ONLY popular UAC bypass method used by malware, and re-implement some of them in a different way improving original concepts. ...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 4
    Zeek

    Zeek

    Zeek is a powerful network analysis framework

    Zeek has a long history in the open source and digital security worlds. Vern Paxson began developing the project in the 1990s under the name “Bro” as a means to understand what was happening on his university and national laboratory networks. Vern and the project’s leadership team renamed Bro to Zeek in late 2018 to celebrate its expansion and continued development.
    Downloads: 14 This Week
    Last Update:
    See Project
  • Deploy Apps in Seconds with Cloud Run Icon
    Deploy Apps in Seconds with Cloud Run

    Host and run your applications without the need to manage infrastructure. Scales up from and down to zero automatically.

    Cloud Run is the fastest way to deploy containerized apps. Push your code in Go, Python, Node.js, Java, or any language and Cloud Run builds and deploys it automatically. Get fast autoscaling, pay only when your code runs, and skip the infrastructure headaches. Two million requests free per month. And new customers get $300 in free credit.
    Try Cloud Run Free
  • 5

    pwmd

    Serves XML element content over a UDS or TLS.

    Pwmd allows a (libpwmd) client to store and retrieve data in an encrypted XML file via an element path. An element path is a TAB delimited string where each element name is a depth of the element tree similar to how a filesystem hierarchy is organized. Each element of the element path may also contain an ACL to limit client access to an element path; beit a client connecting over UDS or TLS. An element may also contain a "target "attribute that resolves to another element path in the XML document similar to a symbolic link in a filesystem. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    safelock-cli

    safelock-cli

    ⚡Fast files encryption CLI built with GO

    Fast files encryption (AES-GCM) package and command-line tool built for speed with Go ⚡ Examples: - Encrypt a path with default options > safelock-cli encrypt path_to_encrypt encrypted_file_path - Decrypt a file > safelock-cli decrypt encrypted_file_path decrypted_files_path - If you want it to run silently with no interaction > echo "password123456" | safelock-cli encrypt path_to_encrypt encrypted_file_path --quiet
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Pasword generator RORG

    Pasword generator RORG

    Securely generate passwords using UTF16 and Random.org

    This application offers the ability to generate passwords using atmospheric noise withthe service random.org or fully local key creation. The application generates random characters from the entire UTF-16 range and converts them into one long string. INSTALATION: No installation is needed. Simply extract the folder PR-RORG.zip and use it. The application keeps its settings (including the API key) in its folder located within C: Program Files. Frequently asked questions (FAQs) in file FAQ.txt
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8

    ProxyCrypt

    Encrypted volumes through command line

    ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. See the features below. It works as a "proxy" for the AIM driver or the ImDisk driver. AIM driver is included in the full package. See the documentation for more informations...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 9
    garysfm

    garysfm

    An advanced file manager with qss themes and iso and folder previews

    garysfm which stands for Gary's File Manager is a file manager with some advanced features. Those features include bulk renaming and folder image previews. I has rather advanced search functions, tab browsing with persistence between launches. It remembers your folder sorting and view options in icon view. It also remembers your active tabs between sessions. It has progress dialog while doing large operations like copying large files, and folders with many files. python version works on...
    Downloads: 13 This Week
    Last Update:
    See Project
  • Catch Bugs Before Your Customers Do Icon
    Catch Bugs Before Your Customers Do

    Real-time error alerts, performance insights, and anomaly detection across your full stack. Free 30-day trial.

    Move from alert to fix before users notice. AppSignal monitors errors, performance bottlenecks, host health, and uptime—all from one dashboard. Instant notifications on deployments, anomaly triggers for memory spikes or error surges, and seamless log management. Works out of the box with Rails, Django, Express, Phoenix, Next.js, and dozens more. Starts at $23/month with no hidden fees.
    Try AppSignal Free
  • 10
    Robolinux

    Robolinux

    Announcing Robolinux Cinnamon 14.1

    ...We are proud that it comes with Enoch AI which is TOTALLY 100% PRIVATE, FREE, HONEST & UNCENSORED built into Robolinux Cinnamon 14.1 The Robolinux 14.1 version with rock solid Long Term Support through 2034! requires users to set secure boot in their BIOS. It is currently available in the Cinnamon desktop flavor. we will release series 14 Xfce version in the next two months.For more information please see Readme file. Warmest regards John Martinson Robolinux.org
    Leader badge
    Downloads: 114 This Week
    Last Update:
    See Project
  • 11
    JVerifier An hash code verifier JVerifier is a command line application that verify checksums from a GNU-style file. Source code available on https://github.com/davidesestiliwork/JVerifier2 Usage: param 1: file name, param 2: algorithm, param 3: baseDir Example: java -jar JVerifier2.jar SHA1SUMS SHA-1 /home/davide Note: this program requires GnuPG to work properly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    DeepBlueCLI

    DeepBlueCLI

    PowerShell Module for Threat Hunting via Windows Event Logs

    DeepBlueCLI is a PowerShell-centric threat-hunting toolkit built to extract, normalize, and flag suspicious activity from Windows event logs and Sysmon telemetry. It parses common sources—including Windows Security, System, Application, PowerShell logs, and Sysmon event ID 1—then applies a rich set of detection heuristics for things like suspicious account changes, password guessing and spraying, service tampering, PowerShell obfuscation and download-string usage, long or unusual command...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    dirsearch

    dirsearch

    Web path scanner

    An advanced command-line tool designed to brute force directories and files in webservers, AKA web path scanner. Wordlist is a text file, each line is a path. About extensions, unlike other tools, dirsearch only replaces the %EXT% keyword with extensions from -e flag. For wordlists without %EXT% (like SecLists), -f | --force-extensions switch is required to append extensions to every word in wordlist, as well as the /. To use multiple wordlists, you can separate your wordlists with commas. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 14
    kraken.js

    kraken.js

    An express-based Node.js web application bootstrapping module

    ...Kraken builds upon express and enables environment-aware, dynamic configuration, advanced middleware capabilities, security, and app lifecycle events. kraken-js is used just like any normal middleware, however it does more than just return a function; it configures a complete express 4 application. kraken loads configuration files, routes, and registers middleware so this directory is the path against all relative paths are resolved. The default value is the directory of the file that uses kraken, which is generally index.js (or server.js). Using environment suffixes, configuration files are applied and overridden according to the current environment as set by NODE_ENV.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    keysniffer

    keysniffer

    Linux kernel mode debugfs keylogger

    ...So the module now supports a module parameter codes which shows the keycode shift_mask pair in hex (codes=1) or decimal (codes=2). You can lookup the keycodes in /usr/include/linux/input-event-codes.h. The keypress logs are recorded in debugfs as long as the module is loaded. Only root or sudoers can read the log. The module name has been camouflaged to blend-in with other kernel modules. You can, however, execute a script at shutdown or reboot (the procedure would be distro-specific) to save the keys to a file. DISCLAIMER: keysniffer is intended to track your own devices and NOT to trespass on others. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 16
    ddos is made with the command of the old programming language this file does not contain viruses because the file is created manually per command with a plot config that can open it freely how it works is easy to just target the ip that you want to hack not long after the server will experience an exception to the site big site
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    SecSy: Security-oriented Log Synthesis

    SecSy: Security-oriented Log Synthesis

    Tool for synthesizing business process logs.

    SecSy is a tool for security-oriented log synthesis. Besides basic synthesis properties (cases per day, office hours, randomized activity duration, ...), its detailed parameter setting for simulating business processes also allows to specify data usage (objects + access modality), actors for process activities and access control constraints for task/object permissions. It is also capable of enforcing/violating specific security properties on process traces, such as SoD/BoD, Unauthorized...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Kypeless

    Kypeless

    Fully decentralised secure p2p communication program

    Kypeless encapsulates strong symmetric and asymmetric cryptography so you can get the benefits of secure communication following some simple steps. Right now, Kypeless is unstable pre-alpha software, published only for testing purposes. Kypeless allows you to exchange instant messages, long not-so-instant messages and files, but a lot more features are planned to be implemented later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    FileGrab

    FileGrab

    Capture newly created files in Windows filesystems

    FileGrab is a tool that monitors a Windows filesystem for newly created files and copy those files to another location. It can be useful for honeypots, malware analysis, investigation scenarios and so on.
    Downloads: 35 This Week
    Last Update:
    See Project
  • 20
    SimpleHasher

    SimpleHasher

    Simple Hasher is a Hashing utility for verifying integrity of files.

    Simple Hasher is a Hashing utility for verifying integrity of files using a wide range of supported algorithms: CRC32, ED2K, MD4, MD5, RIPEMD160, SHA1, SHA256, SHA384, SHA512 and WHIRLPOOL512. All processed files are logged and ready for export to a number of different verification file formats Like SFV, MD5SUM, SHA1SUM. Multiple hash types can be generated simultaneously per file. Handy hash and file comparison functions, such as comparing calculated hashes will make this task as...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    ESSPEE - Penetration Testing & Forensics

    ESSPEE - Penetration Testing & Forensics

    (Android Forensics & Malware Analysis Included)

    ESSPEE - Extreme Security Scanning Penetration testing & Exploitation Environment Ubuntu 12.04 LTS (Precise Pangolin) is purposefully selected as the base Operating System to obtain supports from Ubuntu for a long duration (till Apr 2017). It is packed with featured security tools with very less resource consumption and higher degree of stability. Thanks to Back Track, Blackbuntu, CAINE and DEFT and many others for inspiration. Being a sole developer to this distro, I wish it...
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    wavsep

    wavsep

    Web Application Vulnerability Scanner Evaluation Project

    ...This evaluation platform contains a collection of unique vulnerable web pages that can be used to test the various properties of web application scanners. Visit WAVSEP homepage to learn more: https://code.google.com/p/wavsep/ The project includes the following test cases: Path Traversal/LFI: 816 test cases (GET & POST) Remote File Inclusion (XSS via RFI): 108 test cases (GET & POST) Reflected XSS: 66 test cases, implemented in 64 jsp pages (GET & POST) Error Based SQL Injection: 80 test cases, implemented in 76 jsp pages (GET & POST) Blind SQL Injection: 46 test cases, implemented in 44 jsp pages (GET & POST) Time Based SQL Injection: 10 test cases, implemented in 10 jsp pages (GET & POST)
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Fileprivacy

    Fileprivacy

    Fileprivacy easily encrypts your files

    ...Since Fileprivacy is coded in Java it should run on all popular operating systems. #######BETA 2####### Bugfix - Beta 1 stopped working if filename was too short or long - added .exe file ####### NOTE ####### This is an early beta implying there are some issues left. The Keygenerator stops working if you change the algorithm after setting the keylength. It has to be restarted for further use. Because there are no start scripts, yet, you have to start Fileprivacy from console by typing: java -jar Fileprivacy-1.0_<version>.jar ####### ALSO NOTE ####### The author of this software is not responsible for the safety of your data. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    Hydrocon IRC Bot

    irc bot multi-threaded, ddos, code execution, and more

    Hydrocon IRC bot public 1.7 this is a IRC bot that is compiled with codeblocks and the mingw32 compiler. It is fully multi-threaded melts on execution, runs on start up. it has great stability and efficiency . also has the ability to execute remote code and and execute cmd commands along with ddos and more, 16 option's in total. updates coming soon.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB