Showing 12 open source projects for "except"

View related business solutions
  • Eptura Workplace Software Icon
    Eptura Workplace Software

    From desk booking and visitor management, to space planning and office utilization data, Eptura Workplace helps your entire organization work smarter.

    With the world of work changed forever, it’s essential to manage your workplace and assets together to effectively create a high-performing environment. The Eptura experience combines the power of workplace management software with asset management, enabling you to effectively operate your building and facilitate hybrid work.
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
  • 1
    Syncthing

    Syncthing

    Open Source Continuous File Synchronization

    Syncthing is an open source continuous file synchronization program, which essentially works by synchronizing files between two or more computers in real time. Syncthing is designed to first and foremost keep users’ data safe and protected against data loss and against attackers who would unlawfully try and access this data. It doesn’t store data anywhere else except on your computers and uses encryption to secure all your data. It is very easy to use, cross-platform and automatic...
    Downloads: 35 This Week
    Last Update:
    See Project
  • 2
    Portmaster

    Portmaster

    Block Mass Surveillance

    ... individual domains. Make your own rules. Completely cut off applications from the Internet. Or block all p2p connections except for certain apps. Or never connect to specific countries. Portmaster has you covered. Portmaster is not only very powerful, but is also free & open source.
    Downloads: 28 This Week
    Last Update:
    See Project
  • 3
    Kernelhub

    Kernelhub

    Kernel privilege escalation vulnerability collection

    The original intention of making the project is for, learning, analyzing, and research the latest kernel vulnerabilities are not needed to see the system and related content. This project is a collection of proprietary, except for test failure or unspecified Exp, Demo GIF map. If there is an omission of the omission of CVE vulnerabilities, please join your issues and bring your use of code. Project code is prohibited from testing in a real environment! The reliability of the code is self...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    RufasSlider

    RufasSlider

    Klotsky class block slider puzzles.

    ... location within the window. The DirtyDozen family is similar except there are L-shaped puzzle pieces. The Traffic-Rush family uses data, with 2x1, 1x2, 3x1, 1x3 rectangles. Here, the long rectangles represent cars or trucks that can only move [roll] lengthwise...the goal being to move the red car toward the shaded "exit door". The proper command to extract the archive and maintain the directory structure is "7z x filename".
    Downloads: 2 This Week
    Last Update:
    See Project
  • EBizCharge Payment Platform for Accounts Receivable Icon
    EBizCharge Payment Platform for Accounts Receivable

    Getting paid has never been easier.

    Don’t let unpaid invoices limit your business’s growth. EBizCharge plugs directly into the tools your business already uses to speed up payment collection.
  • 5
    Client-side Encryption Amazon DynamoDB

    Client-side Encryption Amazon DynamoDB

    Amazon DynamoDB Encryption Client for Java

    The Amazon DynamoDB Client-side Encryption in Java supports encryption and signing of your data when stored in Amazon DynamoDB. A typical use of this library is when you are using DynamoDBMapper, where transparent protection of all objects serialized through the mapper can be enabled via configuring an AttributeEncryptor. Use SaveBehavior.PUT or SaveBehavior.CLOBBER with AttributeEncryptor. If you do not do so you risk corrupting your signatures and encrypted data. When PUT or CLOBBER is not...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    uMatrix

    uMatrix

    Point and click matrix to filter net requests according to source

    ..., but you would then lose all the benefits which come with block-all/allow-exceptionally mode, though you will still benefit from the 62,000+ blacklisted hostnames by default. HTTP Switchboard's documentation is still relevant, except for uMatrix's differences with HTTP Switchboard.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Java Sec Code

    Java Sec Code

    Java web common vulnerabilities and security code

    ... mysql server ahead of time and configure the mysql server database's name and username/password except docker environment.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Infernal Wireless

    Infernal Wireless

    Infernal Wireless Penetration Testing Suite

    Infernal Wireless – Penetration testers tools Infernal Wireless Penetration testing tool is created to aid the penetration testers during wireless assessment. Having looked around we all see a lot of penetration testing suits which can automate the process of penetration testing easier for us during Web or other kind of audits, but I did not find one for wireless hacking, except some commercial tools. So, I thought how about to create a tool which automate many different type of attacks...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    TEACryptor

    TEACryptor

    Encrypts text files

    Uses the Tiny Encryption Algorithm to encrypt text files. This program can only encrypt text files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Multi-Site Network and Cloud Connectivity for Businesses Icon
    Multi-Site Network and Cloud Connectivity for Businesses

    Internet connectivity without complexity

    As your users rely more and more on Cloud and Internet-based technologies, reliable internet connectivity becomes more and more important to your business. With Bigleaf’s proven SD-WAN architecture, groundbreaking AI, and DDoS attack mitigation, you can finally deliver the reliable internet connectivity your business needs without the limitations of traditional networking platforms. Bigleaf’s Cloud Access Network and plug-and-play router allow for limitless control to and from anywhere your traffic needs to go. Bigleaf’s self-driving AI automatically identifies and adapts to any changing circuit conditions and traffic needs—addressing issues before they impact your users. Bigleaf puts you in the driver’s seat of every complaint and support call with full-path traffic and network performance data, delivered as actionable insights, reports, and alerts.
  • 10

    mOTP4dotNet

    A Mobile One Time Passwords implementation in Visual Basic .Net

    A Mobile One Time Passwords implementation in Visual Basic .Net, written because I was able to find a reasonable MOTP client for just about every conceivable platform except Windows desktop! Learn more about MOTP at http://motp.sourceforge.net/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Clipperz Password Manager
    Clipperz is a web based password manager. Local encryption within the browser guarantees that no one except you can read your data. A true zero-knowledge (or host-proof) web app!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Java implementation of the RSA cryptosystem. RSA is a splitkey cryptosystem developed by Rivest, Shamir, and Adleman @ MIT in '77. RSA is thought to be secure except by factoring large primes. Jsymmetric is more proof of concept than actually useful.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next