Showing 10 open source projects for "word processor python"

View related business solutions
  • SKUDONET Open Source Load Balancer Icon
    SKUDONET Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    SKUDONET ADC, operates at the application layer, efficiently distributing network load and application load across multiple servers. This not only enhances the performance of your application but also ensures that your web servers can handle more traffic seamlessly.
  • Manage Everything in One Easy to Use Software Icon
    Manage Everything in One Easy to Use Software

    CRM, Sales, and Marketing Automation to help you achieve more.

    Shape CRM helps you manage your business on one easy to use platform. Shape's cloud-based software offers dozens of tools designed to manage and automate your online marketing and promotions via email and SMS, capture and service leads from online sources, organize sales pipelines, nurture prospects and customers, create and send professional online documents, accept online payments, run custom reporting, and automate everyday admin tasks. Shape is the most flexible CRM ever!
  • 1
    dirsearch

    dirsearch

    Web path scanner

    An advanced command-line tool designed to brute force directories and files in webservers, AKA web path scanner. Wordlist is a text file, each line is a path. About extensions, unlike other tools, dirsearch only replaces the %EXT% keyword with extensions from -e flag. For wordlists without %EXT% (like SecLists), -f | --force-extensions switch is required to append extensions to every word in wordlist, as well as the /. To use multiple wordlists, you can separate your wordlists with commas...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 2
    OWASP Mobile Application Security

    OWASP Mobile Application Security

    Manual for mobile app security testing and reverse engineering

    ... to push the project forward by providing consistent high-impact contributions and continuously spreading the word.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    openWrt-snort

    openWrt-snort

    Image of OpenWrt OS, with snort community featured in.

    Image of OpenWrt OS, with snort community featured in, for Raspberry Pi 4/ 4B+ and 400, basically for Processor BCM2711. Installed Snort Community Model to Intrusion Detection system. Prevention system not installed. eth0 used as output/ LAN socket, to run internet and access router. eth1, which can be USB -> Ethernet port, is used as WAN port, to connect Pi board to Internet IP. to flash img file, you can restore in SD card, or use Balena Etcher to flash. or you can use DD commend of UNIX...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4

    HashApp

    python software for cracking and creating SHA and MD5 hashes

    A python software that can be used for encrypting text in SHA384, SHA512, SHA224, SHA1, SHA256 and MD5; or for cracking six different types of hashes, namely SHA384, SHA512, SHA224, SHA1, SHA256 and MD5 through a dictionary attack using an online txt file. You need to have python 3 or above installed to run this progam. If you would like to change the online dictionary URL for hash decryption, use CTRL+F in your text editor and search for this line: LIST_OF_WORDS = str(urlopen('https...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Seamlessly Connect Your Entire Supply Chain with Top-Rated EDI Software Icon
    Seamlessly Connect Your Entire Supply Chain with Top-Rated EDI Software

    TrueCommerce is the only electronic data interchange (EDI) provider that offers a true one-stop shopping solution for EDI compliance.

    TrueCommerce delivers the most complete and scalable EDI solution that makes it easier and more cost-effective to do business with your trading partners.
  • 5
    Password Generator

    Password Generator

    Using our program, you can create a strong password with ease.

    ... that has at least 16 characters, use at least one number, one uppercase letter, one lowercase letter and one special symbol.3. Do not use the names of your families, friends or pets in your passwords.4. Do not use postcodes, house numbers, phone numbers, birthdates, ID card numbers, social security numbers, and so on in your passwords.5. Do not use any dictionary word in your passwords. Examples of strong passwords: ePYHc~dS*)8$+V-' , qzRtC{6rXN3N\RgL , zbfUMZPE6FC%)sZ. Examples of weak passwords
    Downloads: 6 This Week
    Last Update:
    See Project
  • 6
    Scrollout F1

    Scrollout F1

    An easy-to-use anti-spam email gateway

    ... with additional set of rules & filters. • Available as 64bit: - ISO image (Internet connection required during installation) - install from scratch (Internet connection required during installation). • Minimum Requirements (for 5,000 messages/day): 1 GB of RAM 30 GB storage drive 1 Processor x86/AMD64 1 Ethernet x 1 IPv4 address UDP ports: 53 123 4500 6277 24441 TCP ports: 25 80 443 2703
    Leader badge
    Downloads: 153,005 This Week
    Last Update:
    See Project
  • 7
    pydictor

    pydictor

    powerful and useful hacker dictionary builder for a brute-force attack

    A powerful and useful hacker dictionary builder for a brute-force attack. You can use pydictor to generate a general blast wordlist, a custom wordlist based on Web content, a social engineering wordlist, and so on; You can use the pydictor built-in tool to safe delete, merge, unique, merge and unique, count word frequency to filter the wordlist, besides, you also can specify your wordlist and use '-tool handler' to filter your wordlist. You can generate highly customized and complex wordlists...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 8
    TEncryptor

    TEncryptor

    Privacy, Security, no one will read your message again with this app

    TEncryptor Open Source app Written in Python3 and PyQt4 Licensed under the MIT License When you encrypt a text file or message The User need to choose 3 things 1- Password 2- The order of the letters 3- Four letter/word with specified order
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    RSAmake

    RSAmake

    An Cryptography software with RSA algorithm

    An Cryptography software with RSA algorithm RSAmake using Python and WxPython written
    Downloads: 0 This Week
    Last Update:
    See Project
  • The all-in-one billing and claims management software designed to get your practice paid fast and efficiently. Icon
    Open Practice is pleased to present OpenPM, our cloud-based RCM platform that has propelled the company through 17 consecutive years of double-digit growth. OpenPM connects all the disparate elements of the revenue cycle including; Scheduling & Registration, Billing, Clearinghouse, and Patient Payments/Collections. The result is highly automated accounts receivables management for optimized cash flow, and extensive reporting to help you proactively manage your organization. All of this control is securely hosted and delivered through the browser you already have, providing the perfect combination of security and availability.
  • 10
    A cryptographically secure random password generator for Linux written in python and GTK 2.0.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next