Showing 2 open source projects for "trigger"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    White Knight

    White Knight

    Machine Shutdown Security Tool

    Knock down your server into full disk encryption when a user attempts to physically attack your hardware via USB. This project seeks to provide a quick any easy low overhead solution that will shut your computer down to trigger your full disk encryption before an unsophisticated adversary has time to extract sensitive data. News: Alpha 0.04 Hotfix Update - Passwords now work! - Successfully tested against USB Rubber Ducky! This release I worked on building out a class that can be used to start offensive attacks on the target USB. Two options have been enabled for this release, the ability gather a log of all files on the incoming device & the ability to calculate the SHA1 of the incoming drive's files. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2

    KeePass Sync Other Formats

    A plugin to allow KeePass to synchronize with other file formats

    This is a plugin to KeePass <http://www.KeePass.info> to synchronisation to non-kdbx formats. This is done either by using a special menu command (under File, Synchronize) or by creating a new Trigger action to perform the synchronisation. In order to be a valid format for synchronisation, the format must support both Import and Export, and must support Uuids. It is recommended, but not required, that it is secured by a composite key (the same key will be used as for the database being synchronised to, as is the case for normal synchronisation).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB