Showing 37 open source projects for "program work"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 1
    CFSSL

    CFSSL

    Cloudflare's PKI and TLS toolkit

    CFSSL is CloudFlare's PKI/TLS swiss army knife. It is both a command line tool and an HTTP API server for signing, verifying, and bundling TLS certificates. It requires Go 1.12+ to build. Note that certain linux distributions have certain algorithms removed (RHEL-based distributions in particular), so the golang from the official repositories will not work. Users of these distributions should install go manually to install CFSSL. You can set the GOOS and GOARCH environment variables to have...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    UACMe

    UACMe

    Defeating Windows user account control

    ...There are different, not yet known to the general public, methods. This tool is not intended for AV tests and not tested to work in aggressive AV environment, if you still plan to use it with installed bloatware AV soft, use it at your own risk.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    Google Authenticator PAM Library

    Google Authenticator PAM Library

    Example PAM module demonstrating two-factor authentication

    ...It plugs into PAM stacks for services like SSH, su, or desktop display managers, prompting users for a time-based (TOTP) or counter-based (HOTP) code after their password. A lightweight enrollment program bootstraps each account by generating a secret, printing a QR code, and writing per-user configuration with safe file permissions. Because verification happens locally, codes work offline and do not depend on any Google service, which suits high-security and air-gapped environments. Administrators can tune skew tolerance, rate limiting, emergency scratch codes, and which PAM control flags enforce 2FA for specific users or groups. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    aBLhackPsw

    aBLhackPsw

    aBLhackPsw v7.0 - Password recovery tool

    Now with aBLhackPsw v7.0 you can see the password in x32 and x64 programs !!! aBLhackPsw v7.0 run on Wondows 11 !!! aBLhackPsw is a password recovery tool - utility for recovering forgotten or lost password. With this program you can see asterisks ***** password from ***** fields (Outlook Express, Total Commander (FTP) and other programs). There is no illegal password hacking technique involved, it only reads or uncovers hidden password character that are covered by asterisks. This program don't need to install. You can to write into flash device or the others devices and work with program with the others computers. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
    Learn More
  • 5
    Application Blocker

    Application Blocker

    Application Restrictor Tool For Windows

    Application Blocker Application Blocker is a software restriction tool for Windows. It can block access to selected programs. It is very effective and easy to use. You can select any program file and add it to the list. The lock is reliable and very hard to break for normal users. The tool does not work at background when using standard block. In password lock mode, the tool uses minimal resources and does not affect system performance. This program can be used to control your child or prevent access to programs on special areas like school computers. ...
    Leader badge
    Downloads: 70 This Week
    Last Update:
    See Project
  • 6
    Simple Clipboard Logger

    Simple Clipboard Logger

    AutoSaves any text clipboard data into a single TXT file

    Sometimes I lament losing important information from my clipboard so I made this to record it all into a single TXT file with timestamps. Its a fully offline python program that works in your windows tray, that lets you access the TXT file any time you need. Sadly, its worth mentioning that keyloggers that hackers use to steal data work with the same method as this program, except they hide it and send the data online, so this program may result in a false positive with your installed antivirus. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Shortcut Virus Removal Tool

    Shortcut Virus Removal Tool

    Powerful and Easy to Use USB Shortcut Virus Removal Tool for Windows

    ...It can also delete autorun virus from your USB drive. It has a very simple interface. You just have to select your USB drive from list and click Clean button. If the tool does not work, please right click and "Run as Administrator." The tool currently supports two languages: English and German. This tool requires .NET Framework 4.0 and Windows XP or later.
    Leader badge
    Downloads: 853 This Week
    Last Update:
    See Project
  • 8
    ...Source code available on https://github.com/davidesestiliwork/JVerifier2 Usage: param 1: file name, param 2: algorithm, param 3: baseDir Example: java -jar JVerifier2.jar SHA1SUMS SHA-1 /home/davide Note: this program requires GnuPG to work properly.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9

    libpwmd

    API for Password Manager Daemon (pwmd)

    Libpwmd provides an API for connecting to pwmd. It allows for your application to easily store and retrieve data from a pwmd server. It does all the work of setting up the socket and socket IO. Fetching element content can be done in as little as 4 function calls: pwmd_new(), pwmd_connect(), pwmd_open() and pwmd_command().
    Downloads: 0 This Week
    Last Update:
    See Project
  • Lenso.ai is a perfect example of an AI image search tool Icon
    Lenso.ai is a perfect example of an AI image search tool

    Explore billions of images from all around the web.

    Lenso.ai is a perfect example of an AI image search tool, where you can simply search for images that you are most interested in. Thanks to advanced AI technology implemented on lenso.ai, you can easily start searching for places, people, duplicates, related or similar images.
    Learn More
  • 10
    pH7 Social Dating CMS (pH7Builder)❤️

    pH7 Social Dating CMS (pH7Builder)❤️

    🚀 Professional Social Dating Web App Builder (formerly pH7CMS)

    pH7Builder is a Professional, Free & Open Source PHP Social Dating Builder Software (primarily designed for developers ...). This Social Dating Web App is fully coded in object-oriented PHP (OOP) with the MVC pattern (Model-View-Controller). It is low resource-intensive, extremely powerful and highly secure. pH7Builder is included with over 42 native modules and is based on its homemade pH7 Framework which includes more than 52 packages To summarize, pH7Builder Social Dating Script...
    Downloads: 47 This Week
    Last Update:
    See Project
  • 11
    ArkID

    ArkID

    Enterprise IDaaS/IAM platform system

    Rich plug-in, quickly builds an exclusive IDaaS/IAM platform. Easy integration into all your applications. Unified identity, certification, and authority management system. Extendable bottom application architecture based on Plug-in interpolation. You can flexibly and quickly add new functions to the main program without changing the main program. Achieve centralized and safe storage of corporate organizational structure and identity information of massive personnel. Establish a...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12

    IEC104-MultipleMasters2SingleSlave

    IEC 104 Multiple Masters to Single Slave

    This program will connect multiple masters (SCADA master stations) to single slave (RTU) as defined protocol IEC 60870-5-104. Although the protocol IEC 104 itself doesn’t have a way to do that but the program will play the Man In The Middle role achieve this connection. Any number of masters connected to a slave is forming a group. You can create any number of groups and the program will establish the communication among each group members independent on the other groups. Each master in...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Treater Antivirus

    Treater Antivirus

    Cloud antivirus scanner based on machine detection

    Treater Anti-Virus is a free portable anti-virus on demand scanner which does not require the installation and updates of signatures. The application is able to detect and neutralize threats not found by the main protection program, such as Trojans, Ransomware, Worms, Dialers, Adware, Riskware, Pornware, SMS Blocks, etc. The utility does not require installation and can be launched from removable USB/CD drives as a "resuscitator" tool to unlock the computer. During the development, the...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14

    fields.awk

    A flat-file database program written in bash shell and awk scripts.

    Fields.awk allows users to create and work with small-to-medium databases on their home computers or a mobile device with bash shell terminal emulator. It runs on any OS compatible with bash shell, including Linux, FreeBSD, MacOSX, and Android. Certain optional features (printing/encryption) are dependent on external utilities such as lp or ccrypt.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    check vpn

    check vpn

    check if your vpn is falling down

    This tool check every x seconds your public ip adress, if it changes (vpn fall down for example) it stops one or several programs. When the VPN crash this tool can send a mail, play a sound. - This tool work on Windows and Linux. - You need to install JAVA 1,8 on your operating system - Download checkvpn.zip and unzip it - Double click on checkvpn.jar - Click on the button « Update ip » when the VPN is stopped to get your public ip address. - Type the programs separated by semicolon that you would like to stop when the vpn is falling down (ex: utorrent.exe;firefox.exe on linux just put « firefox » no extension) - Click on start button and the program will check every x seconds your ip address, if it not the vpn's ip the programs will be stopped by this tool...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    stenc

    SCSI Tape Encryption Manager

    SCSI Tape Encryption Manager - Manages encryption on LTO 4 and LTO 5 tape drives with hardware-based encryption. Program should work on any other SSP capable tape drives. Built specifically for Linux and AIX. Now supports key change auditing and key descriptors (uKAD). Check the Project News under the Develop section for more information. Project source code has moved to https://github.com/scsitape/stenc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    [C#] Secure Shredder Console

    A console file shredder that supports many algorithms.

    ...If you want a clear explanation on how each of the algorithms work, please refer here: http://www.phoebekwok.com/publications/GJY_SecureDataShredder.pdf
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    LOIC

    LOIC

    LOIC TCP/IP Stresser v1.1.0.1 By LifeOwner

    LOIC TCP/IP Stresser Tool History I was downloaded the original LOIC within version 1.0.8.0 and changed it to be better without changing the other functions which were worked nice. The grey skin i hope you like it! Reworked by LifeOwner. New Features Work • The UDPV2 work like charm with low builded connections you might get timeout in your internet connection might cause you're too slow. (I tested it with 25MB's Downstream/ 2MB's Upstream). • The status checker function will be slowly when the ip->port will be offline, so do not worry the program still running and working on it, just the timeout is bigger than usually to make sure it will works for slower connections. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    PCNetMonitor

    PCNetMonitor

    Computer performance display and logging program

    Local and remote computer performance display and logging program with Excel plotting interface and many other powerful features.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Easy USB Python Keylogger

    A Keylogger that can work directly on a USB

    This is a Python keylogger that can be used on a USB. This can work even if you don't have python installed on your computer or any computer for that matter. Please use this program within the law and keep in mind hacking is ILLEAGAL. note: This program will only work on windows devices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Random Char Generator

    Generate random chars

    This program makes it easy for you to generate a new and safe Key for anything. It uses a very easy and safe 'algorithm'. How does it work? Visit :https://sourceforge.net/projects/rcg/files/How%20does%20it%20work.rtf/download
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Compensato
    Compensato is full suite of diagnostic and troubleshooting tools (focused on troubleshooting Windows environments at the moment) that runs from an Ubuntu based Linux live environment. Once booted a browser winow will launch and the program will automatically look for a Windows installation to work with. You should be able to have this Windows installation visible to the system either internally or externally.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    steganoroute

    steganoroute

    Send steganographed text messages to mtr with fake hops in the network

    Steganoroute is a tool to send steganographed text messages to another computer over the network. The receiver must make a traceroute to the sender using the mtr program (and pressing 'd' once to switch the display mode to the continuous graph). This tool, the sender, creates several fake hops and makes them answer the ICMP packets (or not) to write the letters one by one on the mtr client screen.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    RŌNIN-LINUX

    RŌNIN-LINUX

    Linux Security Distro for Data Forensics, Pen. Testing, and IR.

    RŌNIN is a linux security distribution (based on Lubuntu) that provides a platform for both training and conducting professional data forensics, penetration testing, and incident response. The primary objective of RŌNIN is to provide a fast/light linux desktop along with a curation of security tools and resources that are relevant for professionals, instructors, and students alike. In support of this objective, the RŌNIN project is guided by two main goals: * Focus on Continual...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 25
    OOS Software Distribution

    OOS Software Distribution

    Various programs accessed through a shell developed by a teenager.

    ...The nonbuiltin programs that I have developed and included include a game, a calculator, an encryption program, and another random program. This whole project was developed and maintained entirely by a 13-year-old. So enough of this description stuff! Download my program, try it out!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next