Showing 3175 open source projects for "vx-linux"

View related business solutions
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1
    NASH OS

    NASH OS

    Nash Operating System for Modern Ecommerce

    The all-built-in-one, automatic, ready-to-go out-of-box, easy-to-use state-of-the-art, and really awesome NASH OS! Over 25,000+ flexible features and controls and all scalable!! The most powerful solution ever built to instantly deliver new heights of online ecommerce enterprise to you.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    steganography

    steganography

    Hidding any binary flle < 64k in image

    virgo-steganography Hidding any binary flle < 64k in image Require opencv on ubuntu, osx and android tested on Nougat (OpenCV Manager 3.0) armeabi To embed (output file name is o.png) ./embed image-file binary-file To extract ./extract steganography-file Compiled and run on os x, ubuntu, windows and android Most beautiful ratio image/binary 3MBytes/64KBytes https://www.youtube.com/watch?v=U--p5WoZ1mU
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    cloudfront-auth

    cloudfront-auth

    An AWS CloudFront Lambda@Edge function to authenticate requests

    Upon successful authentication, a cookie (named TOKEN) with the value of a signed JWT is set and the user redirected back to the originally requested path. Upon each request, Lambda@Edge checks the JWT for validity (signature, expiration date, audience and matching hosted domain) and will redirect the user to configured provider's login when their session has timed out. If your CloudFront distribution is pointed at a S3 bucket, configure origin access identity so S3 objects can be stored...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Remme PKI (d) Protocol

    Remme PKI (d) Protocol

    Blockchain-based distributed PKI protocol

    Remme Protocol is a blockchain-based protocol focused on digital key and identity lifecycle management to resolve issues related to cybersecurity, IoT connectivity, data integrity, digital copyright protection, transparency etc. Some of the groundbreaking features include: - Free Rate Limited Transactions - Low Latency Block confirmation (0.5 seconds) - Attribute-based identity and access control - Designed for Sparse Header Light Client Validation - Time Delay Security -...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 5
    WiFi-Pumpkin

    WiFi-Pumpkin

    WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack

    The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. It comes stuffed with features, including rogue Wi-Fi access points, deauth attacks on client APs, a probe request and credentials monitor, transparent proxy, Windows update attack, phishing manager, ARP Poisoning, DNS Spoofing, Pumpkin-Proxy, and image capture on the fly. moreover, the WiFi-Pumpkin is a very complete framework for...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Our idea is to deploy a society of computational agents that collaborate in order to achieve the shared goal of decrypting a chunk of ciphertext or recovering a password from an hash by means of a dictionary-based attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Universal Password Manager

    Universal Password Manager

    Store all your passwords in one secure encrypted database.

    Universal Password Manager allows you to store all your passwords in one highly secure encrypted database. Its strengths are simplicity, portability and security (uses 128bit AES encryption). UPM is available on Android, Windows, OS X & Linux.
    Leader badge
    Downloads: 31 This Week
    Last Update:
    See Project
  • 8

    SudoGate

    GUI password prompt panel for the sudo or ssh commands.

    A GUI popup panel that allows the ssh or sudo commands embedded in a script to prompt for a password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    CertMgr

    CertMgr

    Certificate Authority administration application

    The CertMgr application allows you to administrator your own Certification Authority (e.g. for securing your network). You can create, sign and revoke your individual certificates via a simple User Interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure Icon
    Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure

    Native application identity and user-based security for your Azure cloud

    Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
    Get a free trial
  • 10
    Hystrix

    Hystrix

    Latency and Fault Tolerance for Distributed Systems

    Defend your app with Hystrix, a latency and fault tolerance library developed by the Netflix API team. It works by isolating points of access to remote systems, services and 3rd party libraries, thereby stopping cascading failure and providing fallback options, and making complex distributed systems more resilient in cases where failure is inevitable. In a distributed environment, failure is simply inevitable for some service dependencies. With Hystrix you can control the interactions...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Firefly

    Firefly

    A proxy software to help circumventing the Great Firewall

    Firefly is an agent used to access Great Firewall (GFW) blocked websites and applications. Under the default settings, Firefly only goes through VPN forwarding wall of IP traffic, IP wall straight. If you find a website or application you cannot access, Firefly flow mechanism can be built to distinguish between an error. In this case, you can choose to forward all traffic through the VPN, and then try again.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    sjcl

    sjcl

    Stanford Javascript Crypto Library

    The Stanford Javascript Crypto Library is a project by the Stanford Computer Security Lab to build a secure, powerful, fast, small, easy-to-use, cross-browser library for cryptography in Javascript. SJCL is small but powerful. The minified version of the library is under 6.4KB compressed, and yet it posts impressive speed results. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    GORSK

    GORSK

    Idiomatic Golang Restful Starter Kit

    There are many ways to write a (RESTful) backend in Go. Most of the available tutorials are way too simple, with all the presented content fitting into a single file (or at most two-three). More complex examples are quite rare, and even most of them miss lots of things for the sake of reducing complexity. That’s one of the reasons I wrote Gorsk - to have a fully functional example of a RESTful backend (in Golang) utilizing best practices, idiomatic code, and minimal dependencies. Instead of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Firing Range

    Firing Range

    Firing Range is a test bed for web application security scanners

    Firing Range is an intentionally vulnerable web application designed to evaluate the real-world effectiveness of web security scanners and training exercises. Deployed as a cloud-friendly app, it aggregates dozens of vulnerability patterns in repeatable, labeled routes so tools can be benchmarked on coverage and noise. The project doesn’t just include simple XSS forms; it spans variants such as DOM-based issues, context-sensitive sinks, template mishandling, CSRF, open redirects, and mixed...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    HashPW is a password creator. Each time you need to login to a program or site, HashPW can be used to paste a required username into the site. Then the hashed password can be (re)created and pasted into the program or site password field. Click help file button for features and instructions. See WIKI for update information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Cryptography Playground

    The best cryptography playground available

    The best cryptography playground available Demo @ https://8gwifi.org How to Install wget https://downloads.sourceforge.net/project/cryptography-playgroud/crypto-installer.tar tar xvf crypto-installer.tar;cd crypto-installer ./bootstart.sh Browse http://localhost:8080
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    RouterSploit

    RouterSploit

    Exploitation Framework for Embedded Devices

    RouterSploit is an open-source exploitation framework focused on embedded devices such as routers, cameras, and IoT gadgets. It offers modules for exploits, scanners, and credentials testing, making it a valuable tool for security professionals and researchers. Inspired by Metasploit, it provides a CLI for executing attacks, testing device vulnerabilities, and simulating real-world exploitation scenarios in a legal and ethical manner.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18
    EncFSMP

    EncFSMP

    Mount EncFS folders - multiplatform style.

    EncFSMP can create, mount and edit EncFS (encrypted file system) folders on Windows and Mac OS X.
    Leader badge
    Downloads: 68 This Week
    Last Update:
    See Project
  • 19
    JSch is a pure Java implementation of SSH2. JSch allows you to connect to an sshd server and use port forwarding, X11 forwarding, file transfer, etc., and you can integrate its functionality into your own Java programs.
    Leader badge
    Downloads: 203 This Week
    Last Update:
    See Project
  • 20
    Shuttle

    Shuttle

    A web proxy in Golang with amazing features

    Shuttle is a cross-platform network proxy tool based on Go.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    basic-auth

    basic-auth

    Generic basic auth Authorization header field parser

    Generic basic auth Authorization header field parser for whatever. This is a Node.js module available through the npm registry. Get the basic auth credentials from the given request. The Authorization header is parsed and if the header is invalid, undefined is returned, otherwise an object with name and pass properties. Parse a basic auth authorization header string. This will return an object with name and pass properties, or undefined if the string is invalid.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    bin64ed

    bin64ed

    Base64 encode (or decode) files of any type with this lightweight tool

    bin64ed is a binary base64 encoder/decoder that allows you to encode/decode binary files (such as images, pdfs, etc) to and from base64.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 23

    HashOR

    HashOR is used to create 84 hashes of a string or file.

    HashOR can create 84 hashes from data or file input. It also can create a TTH and AICH.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    GMR Digital Signature System

    GMR Digital Signature System

    GMR digital signature system

    ...https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/Spectre-NG_18052018.html System that creates key pairs and digital signatures and is based on the presumed difficulty of prime factorization. Please install on a virtual machine with Linux! Windows is not supported! German: System, das Schlüsselpaare und digitale Signaturen erstellt, und auf der vermuteten Schwierigkeit der Primfaktorzerlegung fußt. Bitte in einer virtuellen Maschine mit Linux installieren! Windows wird nicht unterstützt! Spende einen Cappuccino: Bitcoin: 1HqrdnfQgi9B4LW8UEvLAwh7X5gXPCoQ5B Litecoin: LeCx44jGjHxiVZ8f6MyumLTCxPcp3ePKJT Paypal: paypal.me/GerritLeder
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    Jeeplatform

    Jeeplatform

    Basic platform for enterprise informatization development

    A basic platform for enterprise informatization development, it is planned to integrate common business functions of OA (office automation), CMS (content management system) and other enterprise systems. The JeePlatform project is a SpringBoot core framework, which integrates ORM framework Mybatis and Web layer framework SpringMVC A common basic platform with a variety of open source component frameworks, the code has been donated to the open-source Chinese community. The JeePlatform project...
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB