Showing 364 open source projects for "program"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1

    Bastille Linux

    This tool locks down Linux and UNIX systems.

    Bastille Linux is a Hardening and Reporting/Auditing Program which enhances the security of a Linux box, by configuring daemons, system settings and firewalling. It currently functions on most major Linux distributions and HP-UX. In the past, it has hardened Mac OSX as well. We are working on a code update to modern Linux distributions.
    Downloads: 17 This Week
    Last Update:
    See Project
  • 2

    Java Exploit For Openssl Heartbleed Bug

    Client exploit for openssl heartbleed bug written in Java

    This is a Java client program that is used to exploit the openssl heartbleed bug. It is based on the quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org). Just run the program as: java -cp "." JavaHeartBleed <host> <port> Example, java -cp "." JavaHeartBleed localhost 443. You are free to distribute and modify the program as per your requirement.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Scramble!
    “Scramble your social network data!” - With Scramble you can selective enforce you access control preferences for your content on social networks like Facebook or Twitter ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Wordpie Python Based Brute Force

    Wordpie Python Based Brute Force

    Python Based Brute Force Password Cracking Assistant By Clownsec

    A python script used to generate all possible password combinations for cracking WAP and other logins or password files. This program is open source. If you see the need to repair or change something by all means do so, but share your findings. *HONK* Usage: wordpie.py [-h] [-o OUTPUT] [-min MIN_SIZE] [-max MAX_SIZE] [-N] [-L] [-U] [-S] [-A] [-v] Generate a wordlist with all possible combinations of letters including: -L (Lowercase Letters) -U (Uppercase Letters) -N (Numbers) -S (Special Characters) -A (All Characters, Numbers, and Letters) -min (Minimum Size) -max (Maximum Size) -o outputfile.gz or -o stdout By default -o filename.gz to create a GZ compressed text file of all the words. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 5
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    DEEEP

    DEEEP

    Detector of Integer Vulnerabilities in Software Portability

    ...Type checking is used for finding bugs on the way integers are handled, and data-flow analysis is used to see if hazardous functions (eg. memcpy, strcpy) are accessible from outside the program. After this two analyses, the tool correlates the results from the previous phases to attain if the data that comes from the inputs are affected by vulnerabilities from porting to LP64, and if these are handled by dangerous functions (memcpy, strcpy,...). In resume, identify if the found bugs
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Botnet Detectors Comparer

    Compares botnet detection methods

    Compares botnet detection methods by computing the error metrics by reading the labels on a NetFlow file. The original NetFlow should have a new column for the ground-truth label, and a new column with the prediction label for each botnet detection method. This program computes all the error metrics (TPR, TNR, FPR, FNR, Precision, Accuracy, ErrorRate, FMeasure1, FMeasure2, FMeasure0.5) and output the comparison results. It also ouputs a png plot. The program can compare in a flow-by-flow basis, or it can apply our new botnet detection error metrics, that is time-based, detects IP addresses instead of flows and it is weighted to favor sooner detections. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    inKey

    inKey - small & strong encryption utility (> 800 000 bit).

    inKey - small encryption utility with big encryption block (> 800 000 bit). This program can protect very sensitive data, such e-mail, which has size up to 100 kilobytes, but processing speed might be too small with the bigger size of source data. ProcessingTime(data) = O(data ^ 2); USE IT ONLY TO PROTECT SMALL FILES (~ 100 Kb or a bit bigger). You can use "PaperBack" to print your 100 Kb encrypted *.iK file to A4 paper and get strong encrypted digital letter.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Crypton

    Crypton

    Program to save accounts

    It is a program to save account (username, passwords). You can import/export files. Set shortcuts for frequent used account. Update/delete data. It is a multiuser program (one password to remember all others). Link: http://youtu.be/0PR--cf2En4
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 10
    Steganography v2.0

    Steganography v2.0

    Hide archives inside any image type

    Hides any archive file inside any image, when opened it functions exactly as an image and can still be printed as usual, but once opened with WinRAR or any other similar program the contents of the archive can be seen. ************************************************************************************************************************** Now has the ability to mask the size of the image so that it stays the same even when TB's of data are hidden within it. ************************************************************************************************************************** --- UPDATES --- * Now has support for all image types...
    Leader badge
    Downloads: 27 This Week
    Last Update:
    See Project
  • 11

    innocence-java

    Replace text with POS equivalent text, in a reversible fashion.

    Program takes (currently) english text sentences, and replaces each word in a given sentence with another word having the same Part of Speach (POS) tag. This creates a new sentence containing none of the original words. This new sentence can then be transmitted to a remote user, and using the same software, "de-crypted" into yielding the original sentence.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Arcanum Editor
    The Arcanum Editor is a small but powerful tool to encrypt and decrypt messages. The program also comes with it's own format CTXT. This format is based on XML and allows you to save texts with the Advanced Encryption Standard.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 13

    cravlAndBlock

    linux tool to improve server security

    ...For sure it will not block all atacks but it will help. How it works: use cron to start java cravlAndBlock.jar in the same folder add properties.xml (I addes sample properties.xml file). And thats all. Program will start from cron, read properties file and make backup of hosts.deny file in backu location, cravl log file / files and add entries to hosts.deny file. It will print log information on the screen. If You are interested in cravl and block project please make a small donation for the author by paypal (to mail tjancz@gmail.com). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Safe Password Generator

    random + bigger password + more combinations = safe password

    Safe Password Generator is a program which generates safe password according to your needs. With Safe Password Generator you can- 1. Generate password from 1 to 25 length. 2. You can make any combination of upper case, lower case, numbers and special characters as per your need. 3. And most importantly- random + bigger password + more combinations = safe password
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    IoN text Encrypter

    A Text Encryption Program

    A Text Encryption Program Writen In VB.net
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    ...Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this program has a graphical user interface, an Enigma like subsystem must be devised for data whitening. For content encryption, the use of Java's facilities is being considered as a long term option. This project's initial sourcecode is related to : http://www.fourmilab.ch/codegroup/ http://winmorse.com/ https://bitbucket.org/bgneal/cpp-enigma http://www.whence.com/minimodem/ For the User Interface http://www.oracle.com/technetwork/java/javafx/tools/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    MLCrypt

    Simple, lightweight, standalone command-line single file encryption.

    Simple, lightweight, cross-platform (Windows / Linux / ARM6 Linux), cross-arch (x32 / x64), standalone command line file encryption program. GnuPG is probably the best application for cross-platform encryption. However, its usage on Windows PCs may be inconvenient (installation administrator rights; large executable size for perhaps just a one-time file decryption, complicated command-line switches for stronger encryption). NCrypt would fulfill this task, but does not operate on 64-bit Windows - MLCrypt was created because of this. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    PBM stealth

    Data hiding in bi-level pbm images

    ...The project also has a PBM viewer in java and ascii viewer which shows the pbm images in ascii format.This project uses binary coded pbm images. Research paper : http://arxiv.org/abs/1304.1683 Key mechanism is not functional and program have bugs which are to be fixed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    ...This solution is for the variant proposed by http://www.2ddepot.com/games/whoownsthefish/ (Spanish, no smoking references) Method is simple brute force for every permutation. In a intel core i5 M 560 @ 2.67GHz, program terminates in 2 minutes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    PasseGen

    PasseGen

    Password generation, encryption, storage, and easy-access

    {Currently requires Windows Vista or above) PasseGen generates highly customizable, complex passwords that are impossible to guess and difficult to break. Your sensitive information is encrypted and further protected at your discretion (program PIN protection). Possibly the niftiest feature is the ability to access stored passwords from the main screen via a context menu that pastes this information to your clipboard. (If PIN-protected, this screen is accessed AFTER the log-in interstitial). Please enjoy, and let me know if there's anything I can do to make your PasseGen experience a better one! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    PasswordBox

    PasswordBox

    A console-mode program that will keep all your passwords safe

    PasswordBox is a console-mode program that will keep all your passwords safe, in an encrypted database protected by a master password. PasswordBox can also be used to generate secure (random) passwords. This program is written by Mateusz Viste, and uses the AES implementation of Chris Brown to handle all encryption/decryption processes. PasswordBox is available for the following operating systems: DOS, Windows, Linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Python sniffer that identifies interactive SSH sessions. It detects when an intruder uses SSH with: a wrong password, a good one or with a password cracking program. It uses two techniques: SSH client's banner identification and SSH session total by
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Substitution Cipher Decryption

    Decrypt messages encrypted with a substitution cipher

    The provided program helps the user with the deciphering of a substitution cipher with the 26 letter alphabet by providing the following features • Dynamic entering of ciphertext. Ciphertext can be modified at any point of the process. • Easy location of corresponding characters in the ciphertext and the substituted text by selection. • Fast frequency analysis for single letters, bigrams, trigrams and quadgrams (more N -grams can be made available by adding a single line of code)...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    Reactor Breeder

    A Genetic Algorithm for Reactors in StarMade

    ...One of the more unique aspects of the game is that ship power management is not as simple as filling a cube with power generation blocks. This mechanism leads to difficulties in getting maximal power generation out of such reactors. This program rectifies this issue by using a self-organizing variant of brute force search. Much of the search space is pruned early on by a user-selectable fitness function. Within a few epochs, reactor output quickly converges to several sub-optimal, yet high-output reactors. Given enough time, the idea is that the optimal reactor configuration will be yielded.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Maroniecoder

    Maroniecoder

    Encrypt a text through a list of encryption methods

    I came to the conclusion that this program is not worth the time for further development. Use different Encryption methods with parameters to en- or decrypted a text through the list With downloadable source-code since 1.3 You need to have Java installed http://www.oracle.com/technetwork/java/javase/downloads/index.html
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB