Showing 1747 open source projects for "void based linux"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Banker’s Dashboard and Credit Union dashboard Icon
    Banker’s Dashboard and Credit Union dashboard

    For Bank and Credit Union CFOs and CEOs

    Get anytime, anywhere access to your bank or credit union’s financial performance. Get insights into your bank or credit union’s financial performance from anywhere with secure, cloud-based access. Get margin components, branch performance, forecasts and more with point-and-click simplicity. Banker’s Dashboard and Credit Union dashboard integrate seamlessly with your core processor. Quick and easy setup, so you can start improving your bottom line right away. Automate reporting and eliminate errors, freeing you to focus on more value-added tasks. Quickly run and revise multiple forecast scenarios, so you can analyze variances and alternative strategies. Measure and compare branch performance. Institute best practices and hold each branch accountable for better results.
    Learn More
  • 1
    APG UI is a simple GTK+ GUI for the "Automated password generator"
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    This purpose of this tool is to manage SOD conflicts within an ERP environment (in our case of SAP). Segregation of Duties (SOD) is an important tool in ensuring that a business is under control from an auditing perspective. Files are available !!!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    It's a php web site to check what amavid-new has put in quarantine. amavid-new must save mail in mysql database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • ZenTreasury brings cash forecasting, lease management, and treasury operations together in one intuitive platform Icon
    ZenTreasury brings cash forecasting, lease management, and treasury operations together in one intuitive platform

    ZenTreasury is ideal for finance and accounting teams in businesses of all sizes

    Designed for finance professionals, it simplifies IFRS 16 compliance, automates workflows, and provides real-time financial insights. Start for free with our Freemium plan and discover how ZenTreasury transforms the way you work.
    Learn More
  • 5
    Open Smart Home is project which provide intelligent control interface for your home.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    ** Guys I have built a much more powerful Fully Featured CMS system at: https://github.com/MacdonaldRobinson/FlexDotnetCMS Macs CMS is a Flat File ( XML and SQLite ) based AJAX Content Management System. It focuses mainly on the Edit In Place editing concept. It comes with a built in blog with moderation support, user manager section, roles manager section, SEO / SEF URL
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    ClamCour is a Courier-MTA multithread filter that allows Courier to scan mail for viruses using Clam Antivirus package. Attachments can be "quarantinated" and custom domain-based email reports can be sent.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    jCracker
    jCracker is a free, cross-platform and featured password cracker coded in Java and designed to bruteforce the md5 hashes based on a wordlist.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    SIFA
    SIFA (Secure Information Flow Analyser) uses a graph-based approach to reason about the possible vulnerabilities of a system from an information security perspective, supporting multiple views over the system. SIFA is an experimental prototype.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Competitor price monitoring for eCommerce businesses Icon
    Competitor price monitoring for eCommerce businesses

    For small to large businesses in the eCommerce industry.

    All-in-one solution for dynamic pricing, price monitoring, and pricing optimization
    Learn More
  • 10
    AMAS stands for Ants Mobile Authentication System and it permits to use one time passwords (OTP) to authenticate users and user groups. The user asks for tokens using a cellular phone call, an SMS, or a SOAP interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    NGIPS is aimed to instrument and enhance Bro-Nids capabilities. While it is still in early stage of its development, we will see bro to pgsql database, web based console and other neat features to be implemented.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Ultra Light CAPTCHA in PHP
    U L CAPTCHA is based on PHP to fight with spam. This is very easy to modify to suit your need. This package also contains some font-files downloaded from 1001FreeFonts website. Powered By Sourav Ghosh.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ENCAM is an asset management database and configuration backup tool for Cisco network devices. ENCAM pulls configuration data from devices, stores it, reports changes, analyzes configuration defects, generates asset lists and compliance reports.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A more modern wiki focusing on open technologies like SOAP and XML, and upon a more focused form of wiki software that incorporates the elements of traditional content creation, such as from journals, books or periodicals.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This program aims at providing a java solution to hide secret information(such as secret file) to JPEG images. Hiding algorithm contains Jsteg and F5. The main(probably the toughest) stuff is encoding and decoding JFIF files.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    SJSU XML Crypto
    A simple Java based XML Encryption tool for education propose. Uses Apache Santuario Libraries. Ideal to understand the implementation of the XML Security Library of Java. Ravi Dontharaju, Utkarsh Sengar, Ramanuj Mishra, Sukhbir Walia, Jaspreet Singh
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Dr. Crypt Encryption Algorithm & Library
    DrCrypt, based on basic xor(exclusive or) encryption which is designed to be fast and reliable. Also DrCrypt supports 3 platform.(Java, .NET, Win32)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Software solution for creation and verification of digitral signatures. Can replace tokens and smart cards with mobile phones. Components included are client and server. Can creates, verifiy and store content and signatures. Offers secure sharing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Integrated vulnerability scanner and penetration testing software Windows written in C# SQL Server 2000/2005 Binary search blind and time-based extraction Request headers Post parameters URL parameters fgdump advanced pivot technology.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    DWIP is short for Disk Wiping and Imaging Tool. This tool is being built for Mississippi State Universities National Forensics Training Center for use on a live cd to give out to it's students.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Ramos - McCain - RSA. Cryptographic tool based on the widely-known RSA public-key algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    IncrediBL is a project that aims to provide a respected and accountable DNSBL service for various communication systems like IRC and e-mail. The code is primarily used by the IncrediBL service itself, but it can also be used to create a separate DNSBL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Cryptic
    Cryptic is a cryptographic applications suite for encryption/decryption of data, calculating cryptographic hashes or message digests and securing user passwords using a master password in a password safe.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Ourmon is a network monitoring and anomaly detection system and displays the data for multiple BPF expressions via RRDTOOL-based graphs. It also helps the user identify various kinds of network anomalies using various flow analysis tools and logging.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    I have implemented transaction signing in Oracle application using digital certificates. Created a java bean to access windows default keystore (SunMSCAPI) to get all certificates and populate them in oracle forms application, Signing oracle forms...
    Downloads: 0 This Week
    Last Update:
    See Project