Showing 1614 open source projects for "stable-diffusion-webui"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 1
    WordPress IP Blocker

    WordPress IP Blocker

    WordPress IP Address Blocker stops the Spam Visitors & malicious IPs.

    WordPress IP Address Blocker allows you to stop the Spam Visitors and malicious IP Addresses. It protects wordpress websites from unwanted or malicious IP Addresses and Attacks (IPs). You can choose to either display the blocked message or an empty page to the blocked users. To do so, you can just add the IP Address to the blocking list and anytime you can delete that IP from the blocking list if you know that it's not performing malicious activities. For any kind of help of support...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    INACTIVE STATUS: The Recommendation Tracker is not actively being developed. SUMMARY: The Recommendation Tracker facilitates consistent standardized (XCCDF, OVAL, CCE, CPE) guidance authoring through an established format for creating, developing, and tracking all information pertinent to security guide and benchmark generation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    JPAM is a Java PAM bridge. PAM, or Pluggable Authentication Modules, is a standard security architecture used Unix, Linux and Mac OS X systems. JPAM permists the use of PAM authentication services to Java applications running on those platforms.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    HackShark Linux

    HackShark Linux

    Lightweight Linux distro for penetration testing

    Based on MATE environment HackShark Linux is a lightweight distribution for penetration testing, cyber forensic investigation and vulnerability assessment purpose.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Person-Level Website Visitor ID Icon
    Person-Level Website Visitor ID

    Get More Leads from Your Website

    Visual Visitor is a website lead generation and visitor tracking tool that identifies anonymous website visitors who are in the market for your services. With current research showing that only 2% of all web visitors will ever call or submit an email form, the data provided by Visual Visitor on the other 98% can be an invaluable sales tool for your business (or your customers' business).
    Learn More
  • 5

    PyLoris

    A protocol agnostic application layer denial of service attack.

    PyLoris is a scriptable tool for testing a server's vulnerability to connection exhaustion denial of service (DoS) attacks. PyLoris can utilize SOCKS proxies and SSL connections, and can target protocols such as HTTP, FTP, SMTP, IMAP, and Telnet.
    Leader badge
    Downloads: 60 This Week
    Last Update:
    See Project
  • 6
    Plinko was originally an experiment with Prefix Trees and log parsing. The general concept is to have a single end point you can send any data to, in a "fire and forget" fashion. Plinko should identify and parse the data completely without the sending system caring what it sent. The latest version supports named fields in the STL files for tagging data parsed in the Prefix Tree and anonymous functions for parsing dynamic message payloads. We now output JSON objects and I'm working on HBase...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Wave Framework

    Wave Framework

    Open Source API-centric PHP Micro-framework

    Wave is a PHP micro-framework that is built loosely following model-view-control architecture and factory method design pattern. It is made for web services, websites and info-systems and is built to support a native API architecture, caching, user control and smart resource management. Wave is a compact framework that does not include bloated libraries and features and is developed keeping lightweight speed and optimizations in mind. While not necessary for using Wave Framework, it comes by...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Fake Ssh Manager

    Fake Ssh Manager

    Sends ssh password to your e-mail with fake form

    Fake Ssh Manager is a fake form which sends root password to your e-mail. Can be use for social engineering and phishing attacks. You can change the form according to your target *************************** Fake Ssh Login fake formuyla root şifresini size e-mail yoluyla gönderir Sosyal mühendislik saldırılarında kullanabilirsiniz. Formu hedef siteye göre değiştirebilirsiniz.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Substitution Cipher Decryption

    Decrypt messages encrypted with a substitution cipher

    The provided program helps the user with the deciphering of a substitution cipher with the 26 letter alphabet by providing the following features • Dynamic entering of ciphertext. Ciphertext can be modified at any point of the process. • Easy location of corresponding characters in the ciphertext and the substituted text by selection. • Fast frequency analysis for single letters, bigrams, trigrams and quadgrams (more N -grams can be made available by adding a single line of code). •...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Case Management Software for Human Services Agencies Icon
    Case Management Software for Human Services Agencies

    FAMCare is powerful, cloud-based case management software for human services agencies

    Your agency’s success is tied to your ability to integrate best practices in everyday caseworker activities. Casework isn't simple, but it can be easier.
    Learn More
  • 10
    USB Autorun Virus Protector
    A simple and portable tool to protect USB storage drives against spreading of Autorun.inf viruses through the USB drives by creating some un-deletable dummy files in your USB drive. Also it can clean autorun viruses from the selected drive.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Maroniecoder

    Maroniecoder

    Encrypt a text through a list of encryption methods

    I came to the conclusion that this program is not worth the time for further development. Use different Encryption methods with parameters to en- or decrypted a text through the list With downloadable source-code since 1.3 You need to have Java installed http://www.oracle.com/technetwork/java/javase/downloads/index.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Web Forensik

    Web Forensik

    PHPIDS-based Security Log Analyzer for Apache

    NOTE: This project is no longer under active developement. Check out the successor at: https://github.com/jensvoid/lorg Web Forensik ist a script that uses PHPIDS to automatically scan your HTTPD logfiles for attacks against web applications. Check the Wiki for installation, configuration, usage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Formerly known as DotNetOpenId, this library brings easy and flexible OpenID, OAuth and InfoCard to the .NET platform. Official web site is at http://www.dotnetopenauth.net/, which includes source code downloads.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Enigmatic CGI pastebin
    Simple CGI script which allows you to transfer sensitive ascii data (passwords, hashes, pem keys) via HTTPS. SSL MUST BE implemented by webserver. Algorithm: - Paste new data into textarea, submit. You get link Link consists of three md5 hashes from salt. File, containing your data, named that way. So, it is hard to bruteforce links/files. - Whenever link being opened, script reads file and prints its content into brower in text/plain content-type. Afterthat, script removes file. So...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Intended for Developers to highlight their security weak coding and show them how attackers can abuse these weaknesses. Refer to the following web sites for directly viewing training movies online. http://yehg.net/lab/#training http://core.yehg.net/lab/#training
    Downloads: 8 This Week
    Last Update:
    See Project
  • 16

    Stratagem - A honeypot distribution

    A Linux based honeypot distribution

    Stratagem is a Linux distro for honeypots, network forensics, malware analysis and other supporting tools. Stratagem is based on Linux Mint 14 XFCE. The following honeypots are setup and ready to go. Dionaea Kippo Glastopf HoneyD Amun labrea Tinyhoneypot Thug Conpot (See the wiki for more details on the contents)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The Safe C Library provides bound checking memory and string functions per ISO/IEC TR24731. These functions are alternative functions to the existing standard C library that promote safer, more secure programming. The ISO/IEC Programming languages — C spec, C11, now includes the bounded APIs in Appendix K, "Bounds-checking interfaces". This latest upload supports building static library, a shared library and a linux kernel module.
    Downloads: 18 This Week
    Last Update:
    See Project
  • 18

    DOSTool

    DOS Attack Tool

    A simple DOS attack tool based on the public resources response time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    psyBNC is an easy-to-use, multi-user, permanent IRC-Bouncer with many features. Some of its features include symmetric ciphering of talk and connections (Blowfish and IDEA) It compiles on Linux, FreeBSD, SunOs and Solaris.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20

    Chaos Encrypter

    Encrypter that use chaos system

    This project contain two program: one is a text encrypter, this program can encrypt any file. Another is image encrypter, this program is designed to encrypt picture that can include alpha channel. You'd better use png format to save if you use image encrypter. Note: These programs are still experimental. If you want to use these programs, be care.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A Java library for executing, parsing and persisting NMap output.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    ssh_ninja

    SSH Protector

    ssh_ninja will watch the secure or auth log file depending on distribution for a configured number of login attempts to accounts and issue an IPTables drop statement to block and IP
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    catcha

    Catch-a spammer with a CAPTCHA.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    ShieldWan

    Secure public portal

    The project ShieldWan consists of a Portal’s development integrating an authentication method by unique password or by limited life password. Once authenticated, project users may access to applications available to them without having to re-authenticate. It allows to have secure accesses and a single users management for all applications through LDAP API. Users access the project using a public Web portal protecting existing private made applications. To allow users to connect to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    SPIZD stands for Stress Probing Invasive Zap Destructor; it's a command-line stress test tool used to determine how many simultaneous (concurrent) connections servers can handle. Protocols: http, pop3, pop3s, imap, imaps, smtp, smtps, ssh, radius.
    Downloads: 0 This Week
    Last Update:
    See Project