Showing 17 open source projects for "except"

View related business solutions
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • Business Continuity Solutions | ConnectWise BCDR Icon
    Business Continuity Solutions | ConnectWise BCDR

    Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

    Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
  • 1
    Syncthing

    Syncthing

    Open Source Continuous File Synchronization

    Syncthing is an open source continuous file synchronization program, which essentially works by synchronizing files between two or more computers in real time. Syncthing is designed to first and foremost keep users’ data safe and protected against data loss and against attackers who would unlawfully try and access this data. It doesn’t store data anywhere else except on your computers and uses encryption to secure all your data. It is very easy to use, cross-platform and automatic...
    Downloads: 35 This Week
    Last Update:
    See Project
  • 2
    Portmaster

    Portmaster

    Block Mass Surveillance

    ... individual domains. Make your own rules. Completely cut off applications from the Internet. Or block all p2p connections except for certain apps. Or never connect to specific countries. Portmaster has you covered. Portmaster is not only very powerful, but is also free & open source.
    Downloads: 28 This Week
    Last Update:
    See Project
  • 3
    Kernelhub

    Kernelhub

    Kernel privilege escalation vulnerability collection

    The original intention of making the project is for, learning, analyzing, and research the latest kernel vulnerabilities are not needed to see the system and related content. This project is a collection of proprietary, except for test failure or unspecified Exp, Demo GIF map. If there is an omission of the omission of CVE vulnerabilities, please join your issues and bring your use of code. Project code is prohibited from testing in a real environment! The reliability of the code is self...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    RufasSlider

    RufasSlider

    Klotsky class block slider puzzles.

    ... location within the window. The DirtyDozen family is similar except there are L-shaped puzzle pieces. The Traffic-Rush family uses data, with 2x1, 1x2, 3x1, 1x3 rectangles. Here, the long rectangles represent cars or trucks that can only move [roll] lengthwise...the goal being to move the red car toward the shaded "exit door". The proper command to extract the archive and maintain the directory structure is "7z x filename".
    Downloads: 2 This Week
    Last Update:
    See Project
  • Gain insights and build data-powered applications Icon
    Gain insights and build data-powered applications

    Your unified business intelligence platform. Self-service. Governed. Embedded.

    Chat with your business data with Looker. More than just a modern business intelligence platform, you can turn to Looker for self-service or governed BI, build your own custom applications with trusted metrics, or even bring Looker modeling to your existing BI environment.
  • 5

    File And Text Encryption (fate)

    No nonsense file and text encryption

    This is a stripped down, no nonsense, no options encryption utility for normal users who just want to secure their files and text and move on. The ciphers used are Aria, Camellia, (all in 256 bit key mode) and ChaCha20. Modes are CBC, OFB, CFB, and CTR, except for ChaCha20 which is a stream cipher. The password hashing and salt derivation are robust.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Client-side Encryption Amazon DynamoDB

    Client-side Encryption Amazon DynamoDB

    Amazon DynamoDB Encryption Client for Java

    The Amazon DynamoDB Client-side Encryption in Java supports encryption and signing of your data when stored in Amazon DynamoDB. A typical use of this library is when you are using DynamoDBMapper, where transparent protection of all objects serialized through the mapper can be enabled via configuring an AttributeEncryptor. Use SaveBehavior.PUT or SaveBehavior.CLOBBER with AttributeEncryptor. If you do not do so you risk corrupting your signatures and encrypted data. When PUT or CLOBBER is not...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    uMatrix

    uMatrix

    Point and click matrix to filter net requests according to source

    ..., but you would then lose all the benefits which come with block-all/allow-exceptionally mode, though you will still benefit from the 62,000+ blacklisted hostnames by default. HTTP Switchboard's documentation is still relevant, except for uMatrix's differences with HTTP Switchboard.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    T50

    Very fast network stress tool

    the fatest network packet injector *WARNING*: Don't use versions prior to 5.8. There is a major bugs recently discovered and fixed in this release. *WARNING*: The GitHub account containing the T50 project was deleted permanently. The new repository (with all commits, comments, "merge requests", ...) is already available at GitLab: https://gitlab.com/fredericopissarra/t50 *WARNING*: All older releases, except 5.7.* were DELETED. 5.4.1 and below are Nelson's original source code.
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9
    Java Sec Code

    Java Sec Code

    Java web common vulnerabilities and security code

    ... mysql server ahead of time and configure the mysql server database's name and username/password except docker environment.
    Downloads: 1 This Week
    Last Update:
    See Project
  • ConnectWise Cybersecurity Management for MSPs Icon
    ConnectWise Cybersecurity Management for MSPs

    Software and support solutions to protect your clients’ critical business assets

    ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
  • 10
    Infernal Wireless

    Infernal Wireless

    Infernal Wireless Penetration Testing Suite

    Infernal Wireless – Penetration testers tools Infernal Wireless Penetration testing tool is created to aid the penetration testers during wireless assessment. Having looked around we all see a lot of penetration testing suits which can automate the process of penetration testing easier for us during Web or other kind of audits, but I did not find one for wireless hacking, except some commercial tools. So, I thought how about to create a tool which automate many different type of attacks...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11

    wpwd

    Change system password web based

    Change system password web based. This quite simple web form provides a possibility to end users to change their own *NIX account passwords even if interactive logins are not possible, e.g. pure SFTP accounts. Currently this is realized by a bash script with embedded expect code (need expect to be installed) and is also rewritten in python using pyexpect, so that there are no more dependencies, except for a http server. Both versions can be used equally.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    TEACryptor

    TEACryptor

    Encrypts text files

    Uses the Tiny Encryption Algorithm to encrypt text files. This program can only encrypt text files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    mcrypt, and the accompanying libmcrypt, are intended to be replacements for the old Unix crypt, except that they are under the GPL and support an ever-wider range of algorithms and modes.
    Leader badge
    Downloads: 1,077 This Week
    Last Update:
    See Project
  • 14

    mOTP4dotNet

    A Mobile One Time Passwords implementation in Visual Basic .Net

    A Mobile One Time Passwords implementation in Visual Basic .Net, written because I was able to find a reasonable MOTP client for just about every conceivable platform except Windows desktop! Learn more about MOTP at http://motp.sourceforge.net/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Clipperz Password Manager
    Clipperz is a web based password manager. Local encryption within the browser guarantees that no one except you can read your data. A true zero-knowledge (or host-proof) web app!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Java implementation of the RSA cryptosystem. RSA is a splitkey cryptosystem developed by Rivest, Shamir, and Adleman @ MIT in '77. RSA is thought to be secure except by factoring large primes. Jsymmetric is more proof of concept than actually useful.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Makes it easier to build a Linux system where the whole hard drive is encrypted (except for the MBR), and where the system must be booted from a USB memory stick which holds slightly customized boot code and the passphrase-protected keys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next