Showing 7 open source projects for "wstj-z"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
    Get started free
  • 1
    noti

    noti

    Monitor a process and trigger a notification

    ... notified when that process' PID disappears. You can also press ctrl+z after you started a process. This will temporarily suspend the process, but you can resume it with noti.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    RufasSok

    RufasSok

    Sokoban with many families of puzzles provided.

    ... of the window. ReZero (z) creates a setpoint[=saved_configuration] so that (r) will later restore that setpoint. To move the "pusher" use the arrow keys. The objective is to push all the red squares or rubies onto the green positions. Comes with dozens of families of puzzles, each family having dozens of levels. Also see https://sourceforge.net/projects/worldcupsokerban/ The proper command to extract the archive and maintain the directory structure is "7z x filename".
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    LabMACOSX
    ... (Syntax of nmap is inside the application). Packetstorm is all packet storm exploits database all inserted inside in the application Packetstorm, Shoppingosx an example of https connection. The application Ob open four browsers, Tesseract applications container, TAL, Chatosx, AndroMac, AndroEmu, MySMS, Shutdown, Updater, Search for, MyMaps, SOA, BLI, Xcoder, BasicProg, BasicProg2, VM, D,M&Z Suite Basic and D,M&Z Suite Advanced (POSIX based).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    MicroZip

    MicroZip

    Create,extract and encrypt ZIP,GZIP,TAR,BZIP2,TAZ files on Java mobile

    MicroZip is a powerful file compression and encryption utility for mobile phones which allows you to create and extract compressed archives in multiple formats and encrypt sensitive information with powerful AES-256 encryption. MicroZip can create and extract ZIP,TAR,TGZ,TBZ2 archives and extract many other formats as JAR,GZ,BZ2,TBZ,WAR,BZIP2,GZIP,Z,TAZ,CBZ etc. MicroZip allows you to extract selected files without extracting the whole ZIP archive. MicroZip also supports encrypted ZIP...
    Downloads: 5 This Week
    Last Update:
    See Project
  • Manage printing in a cost-efficient and eco-friendly way with Gelato. Icon
    Manage printing in a cost-efficient and eco-friendly way with Gelato.

    Gelato offers an extensive catalog of custom products, a zero-inventory business model, and free designing tools—all in one place.

    The world's largest print on demand network with 140+ production partners across 32 countries. Gelato offers end-to-end design, production and logistics for individuals looking to start their own business today!
    Sign up for Free
  • 5
    Z bigets Open source

    Z bigets Open source

    #Web site : http://zbigets.wordpress.com/

    #Donwload Server.rar And Client.rar Z bigets est un programme comme prorat avec plusieurs options.Le projet est open source pour but d'aider les gens qui débutent dans le monde de la programmation. [Changelog] -Connection victimes pour cela il faux lancer la fenetre victime . et lancer le trojan -Bloquer le sysyteme -Capture ecran -Change ip -shut down et restart -Keylogger -Sauvegarde des images. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Vernash: Stream cipher based on the Vernam cipher and Variable-Length Hashes
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A shell script which determines by brute force the best compression format (bzip2, gzip, Z, zip, etc.) and which compression level to use in order to archive a file the smallest possible.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next