Showing 25 open source projects for "mi note 3"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    DDoS/Dos Attack Simulator

    DDoS/Dos Attack Simulator

    Distributed Denial of Service Attack Simulator

    ... Fixes. [ 2 ] Increase in Optimization. [ 3 ] DoS Attacks. Note: The following program is intended for educational purposes only. I ( Muhammad Sami Furqan ) am not responsible for any damage you do by utilizing this software. Read the License Agreement for more info about the Redistribution and Copyright of this Open-Source Program. Additionally, I strongly advise that you read the documentation thoroughly before attempting to use this program. Use this program at your own risk.
    Leader badge
    Downloads: 83 This Week
    Last Update:
    See Project
  • 2

    strobe

    STROBE cryptographic protocol framework

    Note: this is alpha-quality software, and isn't ready for production use. STROBE is a lightweight framework for cryptographic protocols. It supports encryption/decryption, hashing, pseudorandom generation and message authentication. It integrates these components in an innovative way that makes secure protocol design relatively simple. With the included elliptic curve code, STROBE additionally supports asymmetric key exchange and digital signature creation and verification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    JVerifier An hash code verifier JVerifier is a command line application that verify checksums from a GNU-style file. Source code available on https://github.com/davidesestiliwork/JVerifier2 Usage: param 1: file name, param 2: algorithm, param 3: baseDir Example: java -jar JVerifier2.jar SHA1SUMS SHA-1 /home/davide Note: this program requires GnuPG to work properly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Safe Locker

    Strong Folder/File hider for your windows using AES Encryption.

    This software allows you to hide folders and files securely. you can also save your notes with security. This software provides extra layer of security using AES 256 Encryption. Note: This will not encrypt your folder or files which you are hiding, this is only affect the Notes you are storing using this software. The Video shown below is for the Version 1.4.4 We recently upgraded the version to 4.0.0. with increased security and few animation to make app more interactive. We haven't...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Red Hat Enterprise Linux on Microsoft Azure Icon
    Red Hat Enterprise Linux on Microsoft Azure

    Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

    Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
    Learn More
  • 5
    VPLE

    VPLE

    Vulnerable Pentesting Lab Environment

    VPLE (Linux) Vulnerable Pentesting Lab Environment VPLE is an Intentionally Vulnerable Linux Virtual Machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing Labs. In VPLE bunch of labs are Available. NOTE:- "Only run in VMWare Pls Don’t run in VirtualBox" The default login and password is administrator: password. List Of All Labs in one VM:- 1. Web-DVWA 2. Mutillidae 3. Webgoat 4. Bwapp 5. Juice-shop 6...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    SSH MITM

    SSH MITM

    SSH man-in-the-middle tool

    ... the warning and continue on. NOTE: Only run the modified sshd_mitm in a VM or container! Ad-hoc edits were made to the OpenSSH sources in critical regions, with no regard to their security implications. Its not hard to imagine these edits introduce serious vulnerabilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Terminal File Encrypter

    Command Line File Encrypter / Decrypter, Using AES256-CBC Cryptography

    Command Line File Encrypter / Decrypter, Using AES256-CBC Cryptography Python 3.x Or Higher Required Requires To Be Installed - Open CMD / Terminal window, navigate to folder with the encrypter files. Type "pip3 install Setup.py" without quotes. Read Syntax (Readme).txt file for instructions on use. To Uninstall - Open CMD / Terminal window, first type "pip3 list" without quotes. You Should See Terminal File Encrypter listed. Please Note pip3 may list the name differently...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    file digest

    A command-line utility for calculating and verifying file checksums.

    ... the checksums: digest -c skein512/256 checksums.skein You can get a full list of supported algorithms and test the performance of different algorithms on your PC using the command: digest test <iterations> <filename> This will calculate hash sum of <filename> multiple times (number of times is specified by <iterations>) and output the results with precise timings. Note: if you have a 64-bit operating system, use 64-bit binary of the utility, because it is significantly faster for large files.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    Endico - Text Encrypt

    Endico - Text Encrypt

    Fastest way to make secure text.

    ... - Congratulations! you done it . ------------------------------------------------------------------------------------------------- Advantages and Applications 1. Fast and East TEXT encoding. 2. Fast and Easy Code decoding. 3. Easy User Interface & 24x7 Support. 4. Low system requirements. 6. Easy to share outputs. Note : Use same application to decode the data . -------------------------------------------------------------------------------------------------- (C) Logicwoods Ind
    Downloads: 0 This Week
    Last Update:
    See Project
  • Deliver secure remote access with OpenVPN. Icon
    Deliver secure remote access with OpenVPN.

    Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

    OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
    Get started — no credit card required.
  • 10
    This tool can create XAdES (XML) signatures based upon ETSI TS 101 903 v1.3.2 standard. It also includes handling of ITU-T X.509 certificates and RFC 3161 timestamps.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    EnigmaGPG Community

    EnigmaGPG Community

    Sending encrypted data through internet web applications.

    Enigma GPG Community allows you to encrypt / sign text and attachments using plugins in browsers, to send encrypted information via any Internet application that can only be understood by the intended recipient ensuring the authenticity, privacy and confidentiality of messages between the sender and receiver . Note the utility that can achieve this project because it aims to meet the global need for privacy on the web. Also applies to any web application that allows text input by the user...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    Bwst

    BWST is a short word for Brute-force Word-list Segmentation Technique.

    Simply, it’s a brute-force word list generating application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    ICRON's Keyloger

    Version one of ICRON's Basic Keylogger

    ... am not responsible for how you use this. (*Note: Looking for more positive criticism than actual publishing)
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14

    Vigenere Dictionary Attack

    Vigenere brute force / dictionary cracking tool

    ..., trying combinations of dictionary words with numbers. If that fails, brute force will be used. For all attempts of the dictionary attack, only keys within the known key length range will be generated. Better ranking system and analysis of possible decoded messages. Note: The version currently released, I made in an evening! It is nowhere near ready for release but is a fun project to think about and I need more ideas for improvements mentioned above. Discuss possible solutions and ideas!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Skope Surveillance Suite [DEPRECATED]

    Skope Surveillance Suite [DEPRECATED]

    Monitor Activity on your Computer by Auto Screenshot Capture

    **NOTE: This project is deprecated due to obsolete code. If you are interested, a replacement project was started at github.com/gundermanc/skope-3. It is incomplete, but mostly functional. I am looking for developers to take over this project. Welcome to Skope. Skope is the intuitive, user friendly, and free open source monitoring solution from Gundersoft. Not just a keylogger, Skope is literally a "Skope" into your computer's usage. During the Skope setup, you are prompted to type...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    WikiwordS

    WikiwordS crafts wordlists from Wikipedia articles

    WikiwordS is designed to craft wordlists by extracting words from wikipedia articles. The length of the words to store can be manipulated in order to fit your needs. WikiwordS also has a spider plugin which extracts links from requested articles in order to use them for the wordlist, too. This feature is still experimental, you might download about 200 to 300 and more articles with the spider enabled. NOTE: Due to WikiwordS is still an early alpha there are some features which...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    2Pix
    ... bits per pixel component). NOTE: This project has been moved to Google Code. http://code.google.com/p/2pix-steganography
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18
    Perl-based syslog watcher that matches certain login failures (SSH, FTP, POP3) and can dynamically block and email an alert, helping to monitor and manage hosting servers. NOTE: Although no recent updates, I'm still able/willing to update this code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Project Naranja will uses Padlock Security of VIA EPIA mini-ITX motherboards in order to provide a toolkit to set up and use encrypted filesystems with Linux. NOTE: Files are now hosted at Google Code: http://code.google.com/p/naranja/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    loginote is a program to immediately display a note on screen (using xosd) when a user logs into the system or logs out again. Just imagine someone knows your password and you might be interested when he/she logs into your system.. ;). loginote will tell
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    BASTED is a free tool that acts as a honeypot for spammers, who use spambots to harvest email addresses from websites. BASTED has been designed to become a powerfull tool for system administrators willing to learn about the the spam process. (Please note
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    *** PLEASE NOTE: THIS PROJECT HAS NOW MOVED TO THE MAIN SSHTOOLS PROJECT PAGE. PLEASE CLICK 'HOME PAGE' TO BE REDIRECTED ***
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    *** PLEASE NOTE: THIS PROJECT HAS NOW MOVED TO THE MAIN SSHTOOLS PROJECT PAGE. PLEASE CLICK 'HOME PAGE' TO BE REDIRECTED ***
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A secure, rapidly deployable authentication and session-handling system for web-applications written in php. <b>NOTE: Moved to http://oss.wired-networks.net/phpsecuresite/</b>
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Monitor and log all ARP traffic on a switched network, organized into html output with ARP spoof detection, network scan detection and misconfigured network device detection. NOTE: this project is currently not usable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next