Showing 1617 open source projects for "stable-diffusion-webui"

View related business solutions
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 1
    JNI solution for masking command line input such as password entry. This project supports non-echoed input on Windows and unix platforms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    A stable and fast Linux/Unix toolset to aid in the security and ease of use of *Nix.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    The purpose of on-line is to maintain servers 24/7 connected to the net. It will monitor your network connection and make sure its on-line (if not, it will bring it back). It is capable of syncing your IP (e.g: noip, dns2go). It has a notification system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    QuIDScor is a daemon software integrating Intrusion Detection Systems (IDS) and vulnerability assesment and management platforms. Today QuIDScor correlates and verifies Snort alerts against QualysGuard vulnerability assessment data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 5
    mod_stego is a module for the popular Apache Web Server. It steganograph a file or a message inside the html pages. If you want the message, you should use a a de-steganography software to take it out.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    zssh (Zmodem SSH) is a program for interactively transferring files to/from a remote machine while using the secure shell (ssh). It is intended to be a convenient alternative to scp, avoiding the need to re-authenticate each time a file is transferred.
    Leader badge
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    llbra LOGIN is a login that has many functions for the users and the admin and it's based on PHP, and it doesn't use MySQL, it uses a .php database, which has a very secure system, to provide the most secure access as possible. It has a Cookie and a Se
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Yet another alarms program with features as file modification alarm (maybe useful for security auditories), alarms file saving possibility and of course time and date alarms. This time written in java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    tcpamp is a simple GUI for tcpdump and tcpreplay written in Qt/C++. Features: save tcpdump expression in XML format, intuitive dump expression maker, friendly replay interface, multi-platform (Qt based).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Distribution and Courier Software Powerful, User-Friendly, All-In-One Icon
    Distribution and Courier Software Powerful, User-Friendly, All-In-One

    Last-mile, route, on-demand courier software that scales to grow with your business, plus user-friendly features that meet the unique needs of drivers

    Looking for a way to seriously upgrade your last-mile delivery operations? Our software suite has what you need! Complete Operations Management? Check. Powerful Driver App? Check. Customizable Client Portal? Double Check. Our team works tirelessly to develop robust technology for couriers around North America. If you haven't received a no-pressure personalized demo to see for yourself, what are you waiting for?
    Learn More
  • 10
    FreePFW is a web interface to IPFW firewall on FreeBSD servers. It allows authorized users, from authorized hosts changing *specific* rules at the firewall, granting remote access to the server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    RAMdisk-based Operating System for conducting Security Audits. Includes hping2, xprobe, netcat, lsh, wardialer, and more -- all on 1 computer disk. Runs off your RAM, so there is no need to reformat your computer. Great for pen testing!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Active dictionary attack on WEP keys in WLAN networks.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Alist is a program that collects hardware and software information about systems and stores it in a database for users to browse and search via a Web interface. The program consists of three parts: a client portion that collects the information, a daemon
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Provides Fast and scalable SSL library for Server Side. Please see home page for details
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Wellenreiter is a GTK/Perl program that makes the discovery, penetration and auditing of 802.11b wireless networks as easy as possible. All three major wireless cards (Prism2 , Lucent, and Cisco) are supported. Usability is one of the main goal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    _malloc is a library able to randomize normal malloc and to make it more secure from possible memory reading; thanks to it, data are allocated in bits with random keys without increasing dimension and access data needed time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    STAT is a framework for building modular, stateful signature-based intrusion detection systems. STAT provides a means to develop sensors which operate in different domains and environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A Perl CGI JavaScript framework for implementing a MD5 based encryption Secure login on both client and server machines. The password is never stored or transmitted as plain text. Also encrypts cookies to maintain sessions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    This project\'s goal is to provide a usable progam to enable network administrators to log certain instant messaging activity (namely, login / logout). AIM currently supported, more protocols are in the works.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The Tiny Encryption Algorithm (TEA) was developed by David Wheeler and Roger Needham at the Computer Laboratory of Cambridge University. The variant used was developed by David Wagner. TEACrypt 80x86 is the porting of this algorithm to the 80x86 platform
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A web-based system for aiding in the tracking and capturing of International Fugitives. Features include Fugitive profiles, Submiting new alerts, local fugitives, and member state profiles. The First open-source fugitive tracking system on the market!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Crypto.mod is a simple LOADABLE cryptographic module for tcl 8.3+ (possibly older, not tested). The module supports the blowfish, twofish and rijndael ciphers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Password generator. The user can choice the characters, write the results in text file, make pronunceable passwords, choice the number of digits and codes. Visual version made in Java and non-visual version in C. Great performance.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    sha is a file hashing utility that uses the NIST's SHA-1, SHA-256, SHA-384, & SHA-512 hash algorithms. It can be used for file integrity checking, remote file comparisons, etc. The portable algorithm implementations can be useful in other projects too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Gherkin is a web-enabled, multi-threaded, centralized security scan manager incorporating Nessus vulnerability scanning, dns and nmblookup host resolving, and nmap fingerprinting and scanning.
    Downloads: 0 This Week
    Last Update:
    See Project