Showing 1617 open source projects for "stable-diffusion-webui"

View related business solutions
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 1
    Simplifying PitBull LX
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    A web-based, application for storing and retrieving usernames, passwords, and in the future, bookmarks and other useful, commonly used information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A simple, secure web server, derived from Hobbit's "webs"
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Boot Integrity Services (BIS) is a CDSA application. BIS adds digital signatures to boot images obtained via PXE and DHCP/BOOTP protocols. BIS includes tools for creating keys, certificates, and digital signatures, and remotely configuring BIS clients.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    Blaster Scan is a TCP port scanner. It can extract users exploiting vrfy or expn, check anonymous access on FTP, check brute force on FTP and POP3, extract daemons\' versions, and scan for CGI bugs. It also has a SYN port scan, the ability to ping hosts t
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This is an easily configurable firewall which runs under ipchains or iptables (2.2 kernel, or 2.4). Requires no knowledge of iptables/ipchains.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    This program is an automated administration tool that allows stranger (or worse, your friends) to connect to you host and create user accounts in a secure manner.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    ZipCracker is a program to help users recover files from password protected zip archives. It has a easy to use Gnome User interface.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 9
    The script checks if an insert number has the the correct form. The script supports until now only the german identificationcard. (Personalausweis). If you like you can write the script for your country. Join the project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight Icon
    Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight

    Lock Down Any Resource, Anywhere, Anytime

    CLEAR by Quantum Knight is a FIPS-140-3 validated encryption SDK engineered for enterprises requiring top-tier security. Offering robust post-quantum cryptography, CLEAR secures files, streaming media, databases, and networks with ease across over 30 modern platforms. Its compact design, smaller than a single smartphone image, ensures maximum efficiency and low energy consumption.
    Learn More
  • 10
    iSSL is a minimalistic cryptographical API that uses the ciphers RSA and AES to establish SSL-alike, secure encrypted communications between two peers communicating through a network socket, including session key generation and public key exchange.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    armor is a modular hardening tool which strengthen the security of a UN*X box. It currently supports hp-ux 10.20, hp-ux 11.00, solaris2.6 and solaris7
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    kkp is a security tool based on a vulnerability in handling of the NetBIOS protocol by the Microsoft Windows 9x platform. It is meant to be the most reliable and efficient tool for this use. It has been tested on POSIX, and might work under Win32.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Whisper is for keeping your private communications private. Whisper is designed to be easy to use (no PKI). Also Whispers can be written on paper if you have to. You don't need your correspondent to generate a key before you can Whisper.
    Downloads: 40 This Week
    Last Update:
    See Project
  • 15
    An easy to use GUI for cryptanalysis of pre-digital ciphers. Usefull for historical researchers, the rabidly paranoid, or those who do crypto for fun. Future releases will move upwards towards more modern cyphers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A security scanner coded in a tcl/tk extension for use with linux and unix systems . It automatically downloads patches and exploits how ever testing of them is left up to the user for security reasons
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    How to set up a Linux system to use encryption in disk and network accesses. This document describes how you can use the International Kernel Patch and other packages to make harddisk contents and network traffic inaccessible to others by encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    SocketWatch is an anti-port scanning program. SocketWatch is configured to listen to specified ports, and if a connection is made from an unauthorized host, Ipchains is used to completely DENY the host.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    SSL support to epic4-2000, to use secure communication. Should support certificates later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    artraced is a multithreaded traceroute detector. It reveals the tracing ip and hostname. If in promiscuous mode it reveals all incoming traceroute attempts to any workstation on its subnet. Run as daemonize (-d ) if specified in command line.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    An extensible Java tool that resembles an OS, is WEB aware, provides scripting, piping, cron, ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    RotNN is a Python module that implements rotation encryption/obfuscation. The default action is similar to rot-13, but it can also rotate over the entire UNIX printable character set.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Sportal is made for people that need to know what is going on in their systems. It monitors files that you select, for "hot words" that you also select, through a graphical interface.This is work in progress, i spect it to grown to a full IDS.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Generates a random name, address, phone number, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide
    Downloads: 0 This Week
    Last Update:
    See Project