Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Learn More
Total Network Visibility for Network Engineers and IT Managers
Network monitoring and troubleshooting is hard. TotalView makes it easy.
This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
With BinaryCrypt, you can convert between regular text, binary, hexadecimal, octal decimal and decimal. You can convert only decimal (as of right now) to any base up to base 64. You can also save your converted text to a file or open a converted text file to decrypt the message, and perform basic arithmetic in binary.
The git repo for the C# code is located at: https://github.com/m1r4g3/BinaryCrypt-.Net
Web Application Vulnerability Scanner Evaluation Project
...Visit WAVSEP homepage to learn more:
https://code.google.com/p/wavsep/
The project includes the following test cases:
Path Traversal/LFI: 816 test cases (GET & POST)
Remote File Inclusion (XSS via RFI): 108 test cases (GET & POST)
Reflected XSS: 66 test cases, implemented in 64 jsp pages (GET & POST)
Error Based SQL Injection: 80 test cases, implemented in 76 jsp pages (GET & POST)
Blind SQL Injection: 46 test cases, implemented in 44 jsp pages (GET & POST)
Time Based SQL Injection: 10 test cases, implemented in 10 jsp pages (GET & POST)
...Since Fileprivacy is coded in Java it should run on all popular operating systems.
#######BETA 2#######
Bugfix
- Beta 1 stopped working if filename was too short or long
- added .exe file
####### NOTE #######
This is an early beta implying there are some issues left. The Keygenerator stops working if you change the algorithm after setting the keylength. It has to be restarted for further use.
Because there are no start scripts, yet, you have to start Fileprivacy from console by typing:
java -jar Fileprivacy-1.0_<version>.jar
####### ALSO NOTE #######
The author of this software is not responsible for the safety of your data. ...
This java tools design to decrypt and obtain the MS Windows Admin password from encrypted password get from Amazon EC2. It can run as standalone application or embedded as Java applet in HTML.
Tricentis qTest for Unified Software Test Management
For software testing teams
Scalable test management, operations, and analytics to centralize testing and orchestrate quality at speed, with visibility throughout the software development lifecycle.
XTEA (eXtended Tiny Encryption Algorithm) support for db4o open source object database. XTEA is a block cipher that operates on a 64-bit block size with a 128-bit key. An extremely tiny but very fast encryption algorithm (with cycles less than 32 rounds)
A Steganographic Tool that lets u hide any file into any file. It is based on Image, Audio, Video Steganography that hides any file or message into an image(BMP,JPG,GIF), Audio/Video(MPG, WAV, etc) or any other file format(PDF,EXE,CHM etc..)
Provides efficient, effective implementations of 32- and 64-bit hash functions based on Rabin fingerprints / irreducible polynomials, in Java. Also provides integration with java.security.MessageDigest API.