77 programs for "open-lates" with 2 filters applied:

  • ContractSafe: Contract Management Software Icon
    ContractSafe: Contract Management Software

    Take Control Of Your Contracts Without Wrecking The Budget

    Ditch those spreadsheets, shared drives & crazy-expensive solutions with too many bells & whistles. ContractSafe offers the simplest way to manage your contracts efficiently without breaking the bank.
  • Integrate in minutes with our email API and trust your emails reach the inbox | SendGrid Icon
    Integrate in minutes with our email API and trust your emails reach the inbox | SendGrid

    Leverage the email service that customer-first brands trust for reliable inbox delivery at scale.

    Email is the backbone of your customer engagement. The Twilio SendGrid Email API is the email service trusted by developers and marketers for time-savings, scalability, and delivery expertise. Our flexible Email API and proprietary Mail Transfer Agent (MTA), intuitive console, powerful features, and email experts make it easy to ensure all your email gets delivered in seconds and without interruption.
  • 1

    File Scrambler

    Scramble your files

    Scrambler splits your files into a disired number of chunks and puts them together in a different order. This makes the file unreadable. In order to read them again you must unscramble them. Possible Uses: 1. Protect your private files (e.g. pictures, text, source file etc.) 2. Protect your hosted file on your website. (e.g. You can scramble the file and upload it. In order for the downloader to open the file he needs to unscramble the file. For this he will need the number of scrambles)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Wordpie Python Based Brute Force

    Wordpie Python Based Brute Force

    Python Based Brute Force Password Cracking Assistant By Clownsec

    A python script used to generate all possible password combinations for cracking WAP and other logins or password files. This program is open source. If you see the need to repair or change something by all means do so, but share your findings. *HONK* Usage: wordpie.py [-h] [-o OUTPUT] [-min MIN_SIZE] [-max MAX_SIZE] [-N] [-L] [-U] [-S] [-A] [-v] Generate a wordlist with all possible combinations of letters including: -L (Lowercase Letters) -U (Uppercase Letters) -N (Numbers...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    File Attrib Change
    With this program you can change the attributes of any file(read, write, hidden, temp, etc). You don't need to install it, just download and run. This is a demo version, so its not a fully functional. Soon I will upload the final project, so you can change the attributes and the time(created, accessed, modified) of a file or folder. For any questions or suggestions, email me at: bozhidar1991@gmail.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed. Executing the program with command-line arguments causes bigram to generate a random bigram table to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Manage your IT department more effectively Icon
    Manage your IT department more effectively

    Streamline your business from end to end with ConnectWise PSA

    ConnectWise PSA (formerly Manage) allows you to stop working in separate systems, and helps you build a more profitable business. No more duplicate data entries, inefficient employees, manual invoices, and the inability to accurately track client service issues. Get a behind the scenes look into the award-winning PSA that automates processes for each area of business: sales, help desk, support, finance, and HR.
  • 5
    NEO Folder Lock

    NEO Folder Lock

    Lock your files and folders .

    Simply lock and unlock your files and folders.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    DITRAEXTO

    DITRAEXTO

    Directory traversal exploitation tool for web developers.

    Ditraexto es un proyecto creado con la finalidad de facilitar la explotación de sitios con la falla de Directory Path Traversal. La cual es una falla un tanto difícil de detectar pero que sin embargo cuando es detectado representa un peligro para el sitio o servidor afectado. Esta falla de seguridad tiene muchísimas variantes desde niveles fáciles en su detección hasta fallas en el seteo de cookies o sesiones. La finalidad en todo caso de DITRAEXTO es la automatización de la obtención/...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Free-SA

    Free-SA is report generating tool for web, proxy and mail log files

    Free-SA is logs processor and report generating tool. It can be used to control traffic usage, to evaluate conformance to the Internet access security policies, to investigate security incidents, to evaluate web server efficiency and to detect troubles with server configuration.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8

    Forensic Scripts

    Forensic scripts for evidence acquisitions, analysis and more

    This project contains various scripts and code snippets that can easily be deployed by an incident responder or forensic analyst to aid them in either acquiring or analyzing critical data. You can contact me at: interrupt08@users.sf.net or visit my blog, fork(), at https://forksec.wordpress.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this...
    Downloads: 1 This Week
    Last Update:
    See Project
  • SysAid multi-layered ITSM solution Icon
    SysAid multi-layered ITSM solution

    For organizations spanning all industries and sizes from SMBs to Fortune 500 corporations

    SysAid is an ITSM, Service Desk and Help Desk software solution that integrates all of the essential IT tools into one product. Its rich set of features include a powerful Help Desk, IT Asset Management, and other easy-to-use tools for analyzing and optimizing IT performance.
  • 10
    Dirt

    Dirt

    An IRC proxy to add chat encryption to IRC clients

    Dirt is a multi-platform IRC proxy that adds FiSH-compatible chat encryption (including DH1080 key exchanges) to any IRC client. It can be used as a SOCKS proxy or as a simple bouncer. For security reasons, only localhost connections are allowed.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Cyberbit

    Cyberbit

    Visual Cryptography and Bit-Plane Complexity Segmentation in Python

    Hide secret messages in your pictures! Cyberbit lets you transmit a secret message to an intended person in a new manner. The secret message is an 1-bit deep black & white image. The message can contain written text, a drawing, a secret code etc. Using Visual Cryptography the application splits the secret message into two "shadow images" called <<shares>>. Any of the two shares will be embedded into a "normal" image file called by tradition <<vessel>>. You can use a method of hand to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    Dynamic Proxy

    Fetches proxies from hidemyass and changes system proxy in real time.

    Programmer name : Daryl Varghese and Kishan Patel Dynamic Proxy/Madleets Proxy v1.0 is a dynamic proxy made for madleets.com. The proxy application fetches the best proxies from hidemyass.com and changes the system proxy configuration in realtime. Features: 1.It work on all windows systems(both32bit and 64bit) 2.It has no dependencies 3. Uses the wininet Api to change system proxy 4. It is less than 700kb 5. Proxy can be changed by either hotkey or userdefined time...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    mikrotik-ips-ids

    mikrotik-ips-ids

    IDS + IPS for RouterOS (mikrotik)

    This project reads logs from your mikrotik firewall and creates an address list with detected attackers
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    T RunAs

    T RunAs

    An administrative tool

    T RunAs allows you to run a program with administrator rights. it is very useful for administrators who want to grant certain rights for users with no power.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    DAL4j

    Data Access Layer 4 Java

    Welcome to Data Access Layer for Java (DAL4j) a set of command line tools and framework used to reverse engineer a MySQL or SQLServer database schema into a set of JPA Entity Beans. DAL4j can be useful for scenarios where there is an existing database schema but a technology other that JPA is used to interact with the database. DAL4j can provide an easy way to migrate your code base from other technologies such as JDBC or Hibernate to JPA. The beans generated can be 1 or two types:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    phalanx # parallel hash alternative

    phalanx # parallel hash alternative

    parallel hash alternative message digest

    phalanx - parallel hash alternative (PHA) is an initiative to provide a fast and portable, parallel/multithreaded message digest utility and library.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    Character Copy

    Character Copy

    A KeePass plugin for copying characters from protected fields.

    Character Copy is a lightweight KeePass plugin that integrates into KeePass' entry menu and allows users to securely copy individual characters from an entry's protected string fields, such as the Password field.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    BanglaDos

    A Denial of Service Attacking Desktop App

    An open source network stress testing and denial-of-service attack application, initially developed by Samin Yasar. The idea behind BanglaDos is that it can allow you to participate in attacks even if you've no clue how to hack. It send thousand of garbage request to web servers like visa.com , paypal.com to shut them down. If many computers using BanglaDos pointed at a single site to make a real impact, letting a central administrator press the big button of website destruction makes...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    S-Log

    Um software de monitoramento (Controle parental) simples e eficiente!

    S-Log é um programa desenvolvido por Renan Cavalieri (Tec Dicas) com código fonte aberto, o programa tem o objetivo de monitorar tudo que foi digitado no teclado, útil para país descobrirem conversas ou comportamentos estranhos de seus filhos que navegam na Internet. A ferramenta é desenvolvida como base um Keylogger, porem não é um vírus (confira o código fonte caso tenha dúvidas), pois funciona de forma controlada e totalmente invisível ao usuário final, utilizando somente o modo...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Enable PKCS#11 based cryptographic devices in GnuPG
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Build FW1 Cisco Netscreen PolicyFromLogs
    These three tools build Checkpoint, Cisco ASA or Netscreen policys from logfiles. They write dbedit, access-list or set address, set service and set policy commands for the traffic seen in the logs, that can be cut and pasted into the firewalls. WOOT
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Sign APK (or JAR) archives by OpenSSL, using standard private keys and certificates instead of keytool-managed keystores.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Matlab, Maple and C/C++ applications of Linear Algebra in many domains, including curves in many dimensions, Cryptography and Chaos etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Command-line strong encryption tools including: triple cascaded encryptor, multiple hash calculator and multiple block cipher encryptor. Supports AES, Serpent, Twofish, SHA-512, RIPEMD-160, MD5 and other algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    One-Threaded MD5 Hash Bruteforce written in Delphi.
    Downloads: 0 This Week
    Last Update:
    See Project