31 programs for "graphical user interface" with 2 filters applied:

  • Automated RMM Tools | RMM Software Icon
    Automated RMM Tools | RMM Software

    Proactively monitor, manage, and support client networks with ConnectWise Automate

    Out-of-the-box scripts. Around-the-clock monitoring. Unmatched automation capabilities. Start doing more with less and exceed service delivery expectations.
    Learn More
  • Manage your IT department more effectively Icon
    Manage your IT department more effectively

    Streamline your business from end to end with ConnectWise PSA

    ConnectWise PSA (formerly Manage) allows you to stop working in separate systems, and helps you build a more profitable business. No more duplicate data entries, inefficient employees, manual invoices, and the inability to accurately track client service issues. Get a behind the scenes look into the award-winning PSA that automates processes for each area of business: sales, help desk, support, finance, and HR.
    Learn More
  • 1
    axTLS is a TLSv1 SSL library designed specifically for embedded devices, with a highly configurable interface for small memory footprints.
    Leader badge
    Downloads: 98 This Week
    Last Update:
    See Project
  • 2
    Aegis Implicit Mail (AIM)

    Aegis Implicit Mail (AIM)

    Send Mime and Smime Emails to Any Type of Mail Server

    Aegis Implicit Mail is a free and open source library which is designed to provide fast and developer friendly API to send emails using SMTP ports. Binaries are available in the form of NuGet package: https://www.nuget.org/packages/AIM Please check http://pki.tools/aim.html as well AIM Supports : * None Ssl Mails * Implicit Ssl Mails * Explicit Ssl Mails * Smtp Connection test * Detect Ssl type of mail server * Attachments for MIME and S/MIME message. * In-line attachment...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    GILIB

    GILIB

    GILIB Large Integer Arithmetic Library

    A large integer arithmetic library written in plain C.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    FoldersProtection
    FoldersProtection is software distributed for free, which allows management of your folders , protecting them access to any other user .
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gain insights and build data-powered applications Icon
    Gain insights and build data-powered applications

    Looker is an enterprise platform for BI, data applications, and embedded analytics that helps you explore and share insights in real time.

    Chat with your business data with Looker. More than just a modern business intelligence platform, you can turn to Looker for self-service or governed BI, build your own custom applications with trusted metrics, or even bring Looker modeling to your existing BI environment.
    Try it free
  • 5
    360-FAAR  Firewall Analysis Audit Repair

    360-FAAR Firewall Analysis Audit Repair

    360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs

    360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, firewall policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA or ScreenOS commands, and its one file! Read Policy and Logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), Cisco ASA (show run / syslog format), 360-FAAR compares firewall policies and uses...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    The PHP Web Toolkit enables the rapid development of multi-layered web applications and is designed to be easy to use, extensible, reliable, reusable, scalable and secure. It integrates with ADOdb, FCKeditor, kses, Libmcrypt, Libmhash and Smarty.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7

    The Encode

    Encode your text files

    This software is intended to encode your text files efficiently. You can decode them later using the same algorithm you used to encode it. Encode is professionalism packed simply and freely. You can use Encode for any non-illegal purposes. You can make any number of copies and redistribute Encode as it is.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    MicroZip

    MicroZip

    Create,extract and encrypt ZIP,GZIP,TAR,BZIP2,TAZ files on Java mobile

    MicroZip is a powerful file compression and encryption utility for mobile phones which allows you to create and extract compressed archives in multiple formats and encrypt sensitive information with powerful AES-256 encryption. MicroZip can create and extract ZIP,TAR,TGZ,TBZ2 archives and extract many other formats as JAR,GZ,BZ2,TBZ,WAR,BZIP2,GZIP,Z,TAZ,CBZ etc. MicroZip allows you to extract selected files without extracting the whole ZIP archive. MicroZip also supports encrypted ZIP...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9
    Moscrack is a perl application designed to facilitate cracking WPA keys on a cluster of computers. This is accomplished with any one of Mosix clustering software, ssh, rsh or Pyrit connectivity to nodes. Cluster nodes can run any Un*x variant (includ
    Downloads: 0 This Week
    Last Update:
    See Project
  • RMM Software | Remote Monitoring Platform and Tools Icon
    RMM Software | Remote Monitoring Platform and Tools

    Best-in-class automation, scalability, and single-pane IT management.

    Don’t settle when it comes to managing your clients’ IT infrastructure. Exceed their expectations with ConnectWise RMM, our MSP RMM software that provides proactive tools and NOC services—regardless of device environment. With the number of new vulnerabilities rising each year, smart patching procedures have never been more important. We automatically test and deploy patches when they are viable and restrict patches that are harmful. Get better protection for clients while you spend less time managing endpoints and more time growing your business. It’s tough to locate, afford, and retain quality talent. In fact, 81% of IT leaders say it’s hard to find the recruits they need. Add ConnectWise RMM, NOC services and get the expertise and problem resolution you need to become the advisor your clients demand—without adding headcount.
    Learn More
  • 10
    Hash

    Hash

    Hash: File Checksum Generator

    Hash is fast and simple java utility program for calculating and verifying checksums for files and text. Hash can generate MD5, SHA-1, SHA-256, SHA-384 and SHA-512 checksum values.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11

    SECwin

    Simple Event Correlator Windows integration.

    SECwin - Simple Event Correlator Windows integration. is a windows service and user interface integrating [SEC (Simple Event Correlator)](https://github.com/simple-evcorr/sec) to work under windows as a service. NB. THE PROJECT HAS MOVED TO GITHUB, NO FURTHER RELEASES WILL BE POSTED HERE. https://github.com/minagerges/SECwin - Including user interface to configure SEC options. - Sending Signals to process via user interface. (Cygwin perl) - SEC dump file rotation. - SEC perl...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Ampare PHP Encoder

    Ampare PHP Encoder

    Protect and Obfuscate Encode PHP File From reading ( Opensource )

    Protect and Obfuscate Encode PHP File From reading ( Opensource ) Ampare PHP Encoder is a simple and easy to use PHP File Encoder which prevent newbies from reading it automatically. However , Advance and Intermediate able to find way to decode it. FAQ My script doesn't run or terminate Reference : http://php.net/manual/en/function.eval.php When Eval() function run an error code it will automatically terminate so the script doesn't run. Use it only 100% clean code. Please...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    myAuxiliary.rb

    myAuxiliary.rb

    msf post-exploitation auxiliary module

    This auxiliary module needs [metasploit] framework installed.. This module its a metasploit post-exploitation (after the targets get's exploited) auxiliary script, so we need to exploit a target first in order to use it. Affected platforms: Windows OS (all versions above windows vista) Read my WIKI for further info: https://sourceforge.net/p/myauxiliarymete/wiki/Home/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    USBRescueX

    USBRescueX

    Rescue and clean your hard disk or USB memory, delete broken shortcuts

    USBRescuex in its version 2.1 is a computer program category in utility software for files and folders, which its main function is the recovery of hidden files, read-only and corrupted our device (either USB memory devices, removable storage or hard disk). Besides recover those important files for you , eliminates the famous RECYCLER virus , which is the basis of other USB flash drives for viruses , this virus is the main wrongdoer in your USB/Storage Device/Device Storage space Removable...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 15
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    MiDicc

    MiDicc

    Generador de diccionarios de ataque multi-plataforma y parametrizable

    Realice su propio diccionario de ataque, usando caracteres personalizables y con longitud de palabra fija, generando todas las combinaciones que puedan existir.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Mystery

    Mystery

    software cryptographic data protection

    Software tool for cryptographic protection of data is used to encrypt and decrypt files. Signature and check for dokumemntov and text files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    NEO Folder Lock

    NEO Folder Lock

    Lock your files and folders .

    Simply lock and unlock your files and folders.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    ... has a graphical user interface, an Enigma like subsystem must be devised for data whitening. For content encryption, the use of Java's facilities is being considered as a long term option. This project's initial sourcecode is related to : http://www.fourmilab.ch/codegroup/ http://winmorse.com/ https://bitbucket.org/bgneal/cpp-enigma http://www.whence.com/minimodem/ For the User Interface http://www.oracle.com/technetwork/java/javafx/tools/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    A small Programm to generate Secure Passwords, based on an Keyword, the Domain and the Username.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Dirt

    Dirt

    An IRC proxy to add chat encryption to IRC clients

    Dirt is a multi-platform IRC proxy that adds FiSH-compatible chat encryption (including DH1080 key exchanges) to any IRC client. It can be used as a SOCKS proxy or as a simple bouncer. For security reasons, only localhost connections are allowed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    ...): - Add English Language - Some Bug Fixes - Added some options - Added some encriptation parameters IMPORTANT CRITICAL UPDATE (V2.5.0.1)!!!!! Fixes an error occurred with the Auto Delete option activated NEW UPDATE (V2.5.0.2) Fixes an crash when the program start or decrypt a file. Thanks to a SourceForge user for report the error UPDATED RijndaelCryptoProvider with a serious bug fix. Also, has been updated v2.5.0.2 and v2.5.0.1 with this new library
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Dynamic Proxy

    Fetches proxies from hidemyass and changes system proxy in real time.

    Programmer name : Daryl Varghese and Kishan Patel Dynamic Proxy/Madleets Proxy v1.0 is a dynamic proxy made for madleets.com. The proxy application fetches the best proxies from hidemyass.com and changes the system proxy configuration in realtime. Features: 1.It work on all windows systems(both32bit and 64bit) 2.It has no dependencies 3. Uses the wininet Api to change system proxy 4. It is less than 700kb 5. Proxy can be changed by either hotkey or userdefined time...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    T RunAs

    T RunAs

    An administrative tool

    T RunAs allows you to run a program with administrator rights. it is very useful for administrators who want to grant certain rights for users with no power.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    BlackEagle Paw

    this program encryptes windows files

    BlackEagle Paw's main purpose is encrypting windows files with your memorized keyword.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next