Showing 301 open source projects for "liblpsolve55.so"

View related business solutions
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 1

    Web Pentesting Environment

    Vulnerable Virtual Machine to Learn

    ...For instant support ask me @ahmaddotninja 5. Why didn`t I setup tools ? because you should learn how to install any tool on any platform ** Installation steps :-: 1- WPE is virtual Machine so you will need VM software we recommended Oracle VM VirtualBox Get it from here https://www.virtualbox.org/wiki/Downloads 2- uncompressed WPE.7z 3- after you install VirtualBox go to the menu bar select Machine > add 4- Browse to WPE folder select WPE.vbox // we use only OpenSource or Free software
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Sterlingcoin

    Sterlingcoin

    Low Fees | No Banks | 5.5% Interest | Transfer Worldwide

    ...*Transaction history of every Sterlingcoin wallet **A limited supply of money would allow for a better economy; where ‘better’ means ‘fairer’, more stable and devoid of government intervention. ***Maintaining the block chain is called mining, and those who do so are rewarded with newly created Sterlingcoin and transaction fees.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    bWAPP

    an extremely buggy web app !

    ...bWAPP helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities. bWAPP prepares one to conduct successful penetration testing and ethical hacking projects. What makes bWAPP so unique? Well, it has over 100 web bugs! It covers all major known web vulnerabilities, including all risks from the OWASP Top 10 project. The focus is not just on one specific issue... bWAPP is covering a wide range of vulnerabilities! bWAPP is a PHP application that uses a MySQL database. It can be hosted on Linux/Windows with Apache/IIS and MySQL. ...
    Leader badge
    Downloads: 1,657 This Week
    Last Update:
    See Project
  • 4
    VCipher

    VCipher

    A Social Media Encryption/Decryption Tool

    VCipher is a unique encryption and decryption tool.The code is not unique rather it is quite simple as it uses Vigenère cipher algorithm but the idea is quite unique.It is created to be used as an extra layer of protection for social networking sites,so even if someone's account is hacked it will take them so expertise to read those messages.And if used correctly it can also be made uncrackable if used correctly.This is a CLI(Command Line Interface) there is a web version too. VCipher Web : http://vcipherweb.co.nf/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    Cube Password Manager

    Cube Password Manager

    A secure and light-weight password manager

    ...NOTE: Should you want to compile this yourself, this project was built using Visual Studio 2010. The DLL dependencies are included in the main VS files zip file(taken out of the "redist" folder of VS). There is a folder containing the project written in QT, so you can compile and run this in Linux, although the QT project is not being updated anymore. Should you encounter a bug I will be glad to help, but I can't guarantee any major updates for it. UPDATE: Various improvements to the GUI, a new and much stronger encryption algorithm as well as a new login screen.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    wpwd

    Change system password web based

    ...This quite simple web form provides a possibility to end users to change their own *NIX account passwords even if interactive logins are not possible, e.g. pure SFTP accounts. Currently this is realized by a bash script with embedded expect code (need expect to be installed) and is also rewritten in python using pyexpect, so that there are no more dependencies, except for a http server. Both versions can be used equally.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    jablock

    jablock

    Junk Ad Blocker

    ...This project uses a Raspberry Pi processor to present an alternate scene (audio and video) for the viewer to switch to during commercial breaks. It presents an accurate clock face (xclock) so the viewer may determine when to switch back to the TV program. It also produces a continuously running sound track. Commercial breaks are surprisingly repeatable in length. In-program breaks usually last 2.5 minutes; programs usually begin precisely on the hour or half hour. With some practice most commercials may be avoided. This project is implemented using a Bash script. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Linux Exploit Suggester

    Linux Exploit Suggester

    Linux Exploit Suggester; based on operating system release number

    ...It runs uname -r by default (or accepts a manual -k kernel string) and prints a suggestive, human-readable list of possible exploit names, CVEs, and references that match that kernel version. The tool intentionally keeps its logic simple: it performs string matching and warns that patched or back-ported kernels can mislead results, so its output should be treated as pointers for further verification rather than definitive proof of exploitable code. Sample output demonstrates common exploit names, CVEs, and direct exploit-db / vendor links to aid triage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
    Learn More
  • 10
    Complex Password Generator 2.3

    Complex Password Generator 2.3

    Generates complex passwords for use in your different accounts.

    Generates very complex passwords for use in your various different accounts so you know they are safe. You can even generate a list of random passwords and export them to a txt file! You can run this program on the homepage, but for more features I suggest that you download it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Encrypt

    Allows you to encrypt files and plain text, then back again.

    ...Guys, i'm new to SF, this is my first project on SF, so enjoy!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    AESTextCrypt

    AESTextCrypt

    Encrypt and decrypt text using AES 256 bit encryption

    ...It also employs bcrypt, which implements key-stretching and an adaptive key setup phase, the complexity (number of rounds) of which is automatically set to match the processing power of the encrypting computer. This makes it highly resistant to dictionary attack. AESTextCrypt is written in Java, so can be run on all desktop platforms - Windows, Mac and Linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Wordpie Python Based Brute Force

    Wordpie Python Based Brute Force

    Python Based Brute Force Password Cracking Assistant By Clownsec

    A python script used to generate all possible password combinations for cracking WAP and other logins or password files. This program is open source. If you see the need to repair or change something by all means do so, but share your findings. *HONK* Usage: wordpie.py [-h] [-o OUTPUT] [-min MIN_SIZE] [-max MAX_SIZE] [-N] [-L] [-U] [-S] [-A] [-v] Generate a wordlist with all possible combinations of letters including: -L (Lowercase Letters) -U (Uppercase Letters) -N (Numbers) -S (Special Characters) -A (All Characters, Numbers, and Letters) -min (Minimum Size) -max (Maximum Size) -o outputfile.gz or -o stdout By default -o filename.gz to create a GZ compressed text file of all the words. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    Horizon QCMS is a user friendly CMS with auto navigation with a built in support for .wmv, .asx, .asf, .wm, .wma, .mov, .mp3, .qt, .mpg, .rm, .ram, .swf, .flv, .mp4 files. And a simple gallery. HNQCMS works on any server with PHP 5 and MySQL.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 15
    ErAce

    ErAce

    erase hard drive, wipe hdd

    ErAce is software that will over write hard drive 1-100 times. So it fulfils strictest security standards i.e. DOD 5220.22-M. In that way it is impossible to recover data. If You delete files and empty recycle bin it is possible to recover data with recovery software. ErAce will write whole hard disk and put it to zero at last cycle. After process hard drive looks like it was just came out of factory.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Advanced Password Generator
    Advanced Password Generator is a lightweight tool to help you generate random passwords, which you can use to protect the security of your accounts and profiles. This tool does not require installation, so you can run it from an usb drive. It has various options to customize the generated password. Two versions available. One for desktop usage with graphical interface and one for command line (ie. scripting) This project entirely written in FreePascal/Lazarus.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Java Sandbox Library

    Runs untrusted code in a safe, sandboxed environment easily.

    This library helps developers easily run untrusted code in a safe, sanboxed environment. It's easy to use and is similar to Java's existing "AccessController.doPriviledged()" methods, so users who are familiar with the standard Java class will already be able to use the library. It is extremely customizable, so you can fine-tune exactly which permissions you wish to grant your untrusted code. It also includes many classes to to the hard work for you and has support for multi-threaded applications. (I am also looking for people to maintain this project. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Steganography v2.0

    Steganography v2.0

    Hide archives inside any image type

    .... ************************************************************************************************************************** Now has the ability to mask the size of the image so that it stays the same even when TB's of data are hidden within it. ************************************************************************************************************************** --- UPDATES --- * Now has support for all image types. * Now has support to mask an images file size in outer type mode. * v1.0 bug fixes. --- ALERT --- Once an image is edited in any image software it looses its hidden files and reverts back to being a regular image file again!
    Leader badge
    Downloads: 22 This Week
    Last Update:
    See Project
  • 19
    ErrorMint is a tool created to audit the disclose of information through errors in web applications, as explained by OWASP at their Testing Guide: http://goo.gl/UuDpKm So far, there is only one module available that checks some HTTP error responses and obtains the server version from them and from the HTTP headers. This tool has been developed as part of a dissertation for the "Information Technology and Communications Security" master's degree at the UOC University (www.uoc.edu) - http://goo.gl/UCTkcZ
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    QPass password manager
    QPass is easy to use, open source password manager application with built-in password generator. You can store in it's database such data as passwords and logins which will be encrypted using AES-256 with PBKDF2(number of iterations set by user). Each entry can include additional information about entry such as name, url adress and description.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 21
    We! Analyze By Or Cohen

    We! Analyze By Or Cohen

    We! Analyze - designed to analyze ArcSight SmartConnectors logs.

    ...Also, many single connectors collect events from multiple locations (multi database, multi file, WUC) and we might never know one of these locations is unavailable as events from the other locations are arriving so the connector seems to be working fine. Eventually, when we do understand that something is wrong, it takes a while to analyze, understand and solve. In light of these problems in the process of error detection in connectors, I have developed is an automated tool named 'We! Analyze' with its own UI which analyzes connector logs manually or using an API that can be started from the command line, a schedule task or from the console with an action in rule, tool or integration command (if you use the API you can forward the events to a syslog listener in CEF format).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    cravlAndBlock

    linux tool to improve server security

    cravlAndBlock is simple java application that cravl error log file of Your web server and add all attacker IPs. I.E. All Modsecure entries, scans and so on. Every bad IP will be added to hosts.deny file with ALL prefix. For sure it will not block all atacks but it will help. How it works: use cron to start java cravlAndBlock.jar in the same folder add properties.xml (I addes sample properties.xml file). And thats all. Program will start from cron, read properties file and make backup of hosts.deny file in backu location, cravl log file / files and add entries to hosts.deny file. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    DogoIDS

    DogoIDS

    Active-probing-based network IDS for wireless networks

    ...However, we aim to release a stable version ready for production soon. *** IMPORTANT *** We uploaded the very first experimental implementation of DogoIDS (still alpha), so expect to find bugs. The Documentation is sadly not yet fully done. So far, we did experiments using a IEEE 802.11s network (open80211s kernel 3.10.0-rc4-wl). We are happy to receive comments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    RemoteRoot

    Web based management tool for unixes

    Remote Root is an enterprise-class central management tool for Linux, which enables centralized configuration management of a large amount of network connected Linux-based computers (hosts) in a modular form. It is an open source software system relying on operation of traditional operating systems, so it is capable of managing numerous free and commercial Linux distributions or even not Linux-like systems (such as Solaris, HP-UX, FreeBSD, OpenBSD). It can manage every system on which the following functions are available somehow: - identification of the version number of the operating system, - querying of the list of the installed packages, - querying of the version number of a package, - upgrading a specified package to a given version. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    Codegroup is a Java application that will allow one to convert binary (or text) computer files in to 5 letter codegroups for transmission over email, landline telephones, radioteletype or Morse Code. Codegroup has internal error correction & limited cryptography capabilities. Codegroup : ZZZZZ YBPIL AIAIG FMOPP CPAAA DGNGP GPGPA ADNJN ELJKO ELIMO GEOHF KIFGP IFBCB PKCPI YJMHE PHBHP PPOBH NCOHD AKLLL AGHFP DEGEF LKELC EAIJI ABAGP AHPPO IHHPH OHPDF YNFPB ALEPO KMPKP Once this...
    Downloads: 0 This Week
    Last Update:
    See Project