Showing 25 open source projects for "product key window"

View related business solutions
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    node-rate-limiter-flexible

    node-rate-limiter-flexible

    Count and limit requests by key with atomic increments

    rate-limiter-flexible counts and limits number of actions by key and protects from DDoS and brute force attacks at any scale. It works with Redis, process Memory, Cluster or PM2, Memcached, MongoDB, MySQL, PostgreSQL and allows to control of requests rate in single process or distributed environment. All operations in memory or distributed environments use atomic increments against race conditions. Combine limiters, block key for some duration, delay actions, manage failover with insurance...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    MaxKey

    MaxKey

    MaxKey SSO ,Leading-Edge IAM-IDaas(Identity and Access Management)

    Maxkey Single Sign On System, which means the Maximum key, Leading-Edge IAM/IDaas Identity and Access Management product, supports OAuth 2.x/OpenID Connect, SAML 2.0, JWT, CAS, SCIM, and other standard protocols, and provide Secure, Standard and Open Identity management (IDM), Access management (AM), Single Sign On (SSO), RBAC permission management and Resource management. MaxKey focuses on performance, security, and ease of use in enterprise scenarios, is widely used in industries such as healthcare, finance, government, and manufacturing.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    GmSSL

    GmSSL

    Password toolbox that supports national secret

    GmSSL is an open source library of domestic commercial ciphers independently developed by Peking University. It realizes comprehensive functional coverage of national secret algorithms, standards, and secure communication protocols. It supports mainstream operating systems and processors including mobile terminals, and supports cryptographic keys, Cipher cards and other typical domestic cryptographic hardware provide feature-rich command line tools and multiple compiled language programming...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    JakiKaliOS

    JakiKaliOS

    JakiKaliOS V.0.01 is a LiveRAM Debian distribution based on Kali Linux

    JakiKaliOS is a LiveRAM Linux distribution based on Kali Linux, designed for cybersecurity professionals, ethical hackers, forensic analysts, and laboratory environments. The system runs entirely in RAM by default, leaving no disk footprint and providing fast, clean, and temporary work sessions ideal for security testing and controlled operations. JakiKaliOS includes a lightweight XFCE desktop optimized for performance and low resource usage, suitable for virtual machines, VPS consoles,...
    Leader badge
    Downloads: 39 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    RufasSlider

    RufasSlider

    Klotsky class block slider puzzles.

    RufaSlider is a collection of 16 different block slider puzzles for kids and casual puzzlers that works on laptops and PCs running Windows, OSX or GNU/Linux. It includes a Klotski-style family, a DirtyDozen family, and a Traffic-Rush family. And now these puzzle families come with AutoSolvers to help you. The Klotski family uses rectangles of 4 sizes: 1x1, 2x2, 1x2, 2x1. The objective in each game is stated near the window top, but usually involves moving a large block to a specified...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Helper for GitHub notifications in Gmail

    Helper for GitHub notifications in Gmail

    Open GitHub notifications with shortcuts in Gmail

    A web extension for Chrome and Firefox which adds keyboard shortcuts for opening and muting GitHub notification emails. Mute thread in mail view. It will open a background window to load the mute thread URL, and close itself when done. This only works if you have an active GitHub session. ctrl + return to trigger one the action button when an email is selected using gmail key navigation (when the blue bar appears). Load the extension manually and modify the code accordingly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    GentleGPG II

    PGP encrypt/decrypt data with easy drag and drop data handling.

    ...GentleGPG II makes encrypting and decrypting your email (or any other) messages easy by enabling you to drag a cursor to Retreive the data you wish to decrypt from another program's window, such as an email client. You can also drag a cursor to Send encrypted data from GentleGPG II to another program. GentleGPG II is very easy to set up, automatically creating your public/secret key. Instructional video: http://youtu.be/cP8kCd8wdZc See Wiki for changes between GentleGPG and GentleGPG II.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    NASH OS

    NASH OS

    Nash Operating System for Modern Ecommerce

    The all-built-in-one, automatic, ready-to-go out-of-box, easy-to-use state-of-the-art, and really awesome NASH OS! Over 25,000+ flexible features and controls and all scalable!! The most powerful solution ever built to instantly deliver new heights of online ecommerce enterprise to you.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9
    X Certificate and Key management is an interface for managing asymetric keys like RSA or DSA. It is intended as a small CA for creation and signing certificates. It uses the OpenSSL library for the cryptographic operations. Please see the XCA homepage http://hohnstaedt.de/xca
    Leader badge
    Downloads: 130 This Week
    Last Update:
    See Project
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
    Learn More
  • 10
    hsencfs

    hsencfs

    High Security Encrypting File System

    HSENCFS is a user space encrypting file system. Simple to set up, seamless to use, fast, safe, secure and maintenance free. It will encrypt data on the fly written to it, decrypt data read from it. HSENCFS uses only storage space for actual data stored, no pre-allocation needed. It is fast enough for real time Video Encryption. HSENCFS is classified as a variable key length encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    AUM CSPRNG & Stream Cipher

    AUM CSPRNG & Stream Cipher

    A minimal CSPRNG reflecting the Zen of cipher design

    AUM is an extremely fast, small-state, cryptographically secure pseudo-random number generator and stream cipher. AUM exhibits uniform distribution, mixes rapidly, has no detected bias, and comes in three variants: AUM16, with an internal state array of 16+4 32-bit words; AUM32, with an internal state of 32+4 words; and AUM64 with a 64+4-word state. The former permit seeding with a key of up to 512 or 1024 bits, the latter with a 2048-bit key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    MOTE CSPRNG & Stream Cipher

    MOTE CSPRNG & Stream Cipher

    A family of small-state CSPRNGs and Stream Ciphers

    MOTE is a fast, small-state, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. MOTE exhibits uniform distribution, mixes extremely rapidly, has no detected bias, and comes in three variants: MOTE8, with an internal state array of 8+4 32-bit words; MOTE16, with an internal state of 16+4 words; and MOTE32 with a 32+4-word state. The former permit seeding with a key of up to 256 or 512 bits, the latter with a 1024-bit key. Reduced to essentials, MOTE is only...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    BEDBUG CSPRNG & Stream Cipher

    BEDBUG CSPRNG & Stream Cipher

    A family of FLEA-inspired CSPRNGs and Stream Ciphers

    BEDBUG is a small, fast, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It exhibits uniform distribution, mixes rapidly (with worst-case avalanche better than 16-bits), has no detected bias, and comes in three variants: BEDBUG128, with an internal state array of 128+3 32-bit words; BEDBUG256, with an internal state of 256+3 words; and BEDBUG512 with a 512+3-word state. The former permit seeding with a key of up to 4096 or 8192 bits, the latter with a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Liberté Linux

    Liberté Linux

    Liberté Linux: Mission-critical stealth communication

    Liberté Linux is a secure, lightweight, and easy to use Gentoo-based Linux distribution intended as a communication aid in hostile environments. Liberté installs on a USB key, and boots on any computer or laptop.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 16
    Pimp

    Pimp

    GNU Privacy Guard password's archive manager

    Pimp (Pimp is a manager for passwords) Pimp is a comfortable password manager i made up for security reason (it uses GnuPG) and because i need a universal password manager which let me have passwords in the clipboard (without typing anything (key loggers)) and use them also in my browser (which i think the default keyrings do not). It's simple and it's a Bash script (easy to read and modify to fit your personal needs). Hope you like it and find it useful!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Dm-crypt + LUKS encrypted device manager. Available functions : open, close, create, show info, add key, remove key, change key. Most important functions : change encryption parameters and reencryption with new master key - both in-place & failsafe.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Cameloid is a new TCP/UDP based P2P voice and video encryption software, that will provide high level of privacy for all levels of communication using only quality secret-key ciphers to ensure long-term security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    PKS is an OpenPGP Public Key Server. It allows users to store and lookup public keys from the server's database. It can also synchronize with other servers. (This product includes software developed by Marc Horowitz.)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A one key 64-bit encryption program designed for Linux and Windows. There is a console version, and also a GUI version provided by wxWindows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    <b>SicHer</b> is an encryption client that will allow secure chat across the internet using AES and a Diffe-Hellman key exchange.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Whisper is for keeping your private communications private. Whisper is designed to be easy to use (no PKI). Also Whispers can be written on paper if you have to. You don't need your correspondent to generate a key before you can Whisper.
    Downloads: 49 This Week
    Last Update:
    See Project
  • 24
    A peer-to-peer chat program that uses public key encryption (via Gnu Privacy Guard) to keep your conversations from the eyes of packet sniffers (*Cough* Carnivore *Cough*)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    CVE-Alert

    CVE-Alert

    Real-time CVE tracking and email alerts for security vulnerabilities

    CVE-Alert helps organizations and individuals track Common Vulnerabilities and Exposures (CVEs) in real-time. Get notified about security issues affecting your vendors and products. Key capabilities: - Real-time CVE tracking - Automatically sync with CVE.org's CVE List (cvelistV5) to stay current with published security vulnerabilities - Custom subscriptions - Subscribe to specific vendors, products, or severity levels to receive alerts only for what matters to your organization -...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next