Showing 120 open source projects for "using"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 1
    KaHaShEr

    KaHaShEr

    File checksum generator and verifier.

    KaHaShEr is an application to check the integrity of a file using MD5, SHA1, SHA256 and SHA512 checksum. Designed to be smart and easy to use, it includes a feature that can detect a hexadecimal value in the clipboard and automatically perform the verification while notifying you with a very expressive sound of the outcome of this verification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Face Mask Detection

    Face Mask Detection

    Face Mask Detection system based on computer vision and deep learning

    Face Mask Detection system based on computer vision and deep learning using OpenCV and Tensorflow/Keras. Face Mask Detection System built with OpenCV, Keras/TensorFlow using Deep Learning and Computer Vision concepts in order to detect face masks in static images as well as in real-time video streams. Amid the ongoing COVID-19 pandemic, there are no efficient face mask detection applications which are now in high demand for transportation means, densely populated areas, residential districts, large-scale manufacturers and other enterprises to ensure safety. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Passlock-Windows

    AES-Encrypted Password manager

    PassLock is a password manager and password generator that encrypts passwords using AES and saves them securely on your local machine. The password is encrypted and decrypted using a user-defined key and will get updated in each use. Extending the length of the private key will steadily improve the overall security. PassLock also generates a 40-bit long password consisting of lowercase, uppercase letters, numbers, and symbols Passlock's 220bit AES encryption and infinitely long password generator make your passwords nearly impossible to break and Its Console Based User Interface will definitely help to enhance your experience.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    DracOS GNU/Linux Remastered
    ...This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering. Use a GUI-based tools-tools the software using the CLI (command line interface) and GUI (graphical user interface) to perform its operations. Now Dracos currently already up to version 3.1.5 with the code name "KUNTILANAK WITH REMASTERED".
    Downloads: 43 This Week
    Last Update:
    See Project
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • 5

    GUI File Encrypter

    Just A Few Clicks To Encrypt Your File

    Simple GUI File Encrypter 128-bit AES in CBC mode and PKCS7 padding, with HMAC using SHA256 for authentication. Requirements: - Python 3.9 - Dependencies are required to be installed, Read the README.txt file for instructions. How To Run The Program: - Windows: Just run GUI File Encrypter.py - Mac / Linux: Open Terminal, navigate to folder with the program files & type "python3 GUI\ File\ Encrypter.py" without the quotes If you need to rename the file you can just make sure the extension stays ".py"
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6

    HashApp

    python software for cracking and creating SHA and MD5 hashes

    A python software that can be used for encrypting text in SHA384, SHA512, SHA224, SHA1, SHA256 and MD5; or for cracking six different types of hashes, namely SHA384, SHA512, SHA224, SHA1, SHA256 and MD5 through a dictionary attack using an online txt file. You need to have python 3 or above installed to run this progam. If you would like to change the online dictionary URL for hash decryption, use CTRL+F in your text editor and search for this line: LIST_OF_WORDS = str(urlopen('https://raw.githubusercontent.com/dwyl/english-words/master/words.txt').read(), 'utf-8') Change the url in the urlopen function and replace all instances with your version of the above line. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    ClamGuard

    ClamGuard

    Free and opensource antivirus solution based on ClamAV.

    Free and opensource antivirus solution based on ClamAV. Fully written in Python using PySide6. Source code hosted on GitHub at https://github.com/5trange/ClamGuard Linux packages coming soon.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Ciphey

    Ciphey

    Decrypt encryptions without knowing the key or cipher

    Fully automated decryption/decoding/cracking tool using natural language processing & artificial intelligence, along with some common sense. You don't know, you just know it's possibly encrypted. Ciphey will figure it out for you. Ciphey can solve most things in 3 seconds or less. Ciphey aims to be a tool to automate a lot of decryptions & decodings such as multiple base encodings, classical ciphers, hashes or more advanced cryptography.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 9
    SIPVicious

    SIPVicious

    Security tools that can be used to audit SIP based VoIP systems

    ...Also known as friendly-scanner, it is freely available to help pentesters, security teams and developers quickly test their SIP systems. Download the latest source code from git or the latest release, send pull requests and open issues. Install the latest and greatest release using pip3 install sipvicious or follow the instructions for further options. Available on any platform that supports Python 3. Made a change to your phone system or SIP router? Test it automatically using SIPVicious OSS to perform a smoke test for security robustness. The next generation is SIPVicious PRO, a complete new code base and overhaul of the concepts found in SIPVicious OSS. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 10
    ClamWin

    ClamWin

    Antivirus software with virus scanning and virus definition updates

    Looking for free Open Source Antivirus for Windows? Download ClamWin Free Antivirus and get free virus scanning and free virus definition updates. Free Antivirus software for Windows, using the well-respected ClamAV scanning engine. Includes virus scanner, scheduler, virus database updates, context menu integration to MS Windows Explorer and Add-in to MS Outlook. Also features easy setup program.
    Leader badge
    Downloads: 3,628 This Week
    Last Update:
    See Project
  • 11

    Keylogger

    A simple keylogger for Windows, Linux and Mac

    ...A keystroke logger or keylogger is basically a program that records keystrokes and saves them in a log file on your local computer. This keylogger is simple and bare bones, but works wonderfully and is useful for a number of things. You can use it to track key movements and make sure no one is using your computer while you’re away, or use it for self-analysis. In businesses and offices it can be used to monitor employee activity; in schools it can track keystrokes and log banned words.
    Downloads: 96 This Week
    Last Update:
    See Project
  • 12
    wifi-password

    wifi-password

    Quickly fetch your WiFi password and generate a QR code of your WiFi

    Quickly fetch your WiFi password and if needed, generate a QR code of your WiFi to allow phones to easily connect. Works on macOS and Linux, Windows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    KeexyBox

    KeexyBox

    The box to keep the Internet under your control

    KeexyBox allows you to do parental control, block ads, limit telemetry, and browse the Internet anonymously from your home network without installing any software on your devices. It also can be used to create a public wireless access point with the captive portal. It is a software program which requires a Raspberry PI box and which is installed on Raspbian. It constitutes a cut-off point between your devices (computers, tablets, smartphones, etc.) and your router or Internet box....
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14
    phpsploit

    phpsploit

    Full-featured C2 framework which silently persists on webserver

    Full-featured C2 framework which silently persists on webserver via polymorphic PHP oneliner. The obfuscated communication is accomplished using HTTP headers under standard client requests and web server's relative responses, tunneled through a tiny polymorphic backdoor. Detailed help for any option (help command) Cross-platform on both client and server. CLI supports auto-completion & multi-command. Session saving/loading feature & persistent history. Multi-request support for large payloads (such as uploads) Provides a powerful, highly configurable settings engine. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    motionEyeOS

    motionEyeOS

    A video surveillance OS for single-board computers

    ...Compatible with most USB cameras as well as with the Raspberry PI camera module. Motion detection with email notifications and working schedule. JPEG files for still images, AVI files for videos. Connects to your local network using ethernet or wifi. File storage on SD card, USB drive or network SMB share. Uploading of media files to cloud storage services (Google Drive, Dropbox), media files are visible in the local network as SMB shares. Media files can also be accessed through the built-in FTP server or SFTP server.
    Downloads: 25 This Week
    Last Update:
    See Project
  • 16
    KeyGen

    KeyGen

    Cards based password storer

    Forgot your password or want to create new one that can never be guessed? That's KeyGen is for: make you not to remember all these passwords for countless amount of services. KeyGen provides cards based interface which makes the app easy to deal with.
    Downloads: 70 This Week
    Last Update:
    See Project
  • 17

    Terminal File Encrypter

    Command Line File Encrypter / Decrypter, Using AES256-CBC Cryptography

    Command Line File Encrypter / Decrypter, Using AES256-CBC Cryptography Python 3.x Or Higher Required Requires To Be Installed - Open CMD / Terminal window, navigate to folder with the encrypter files. Type "pip3 install Setup.py" without quotes. Read Syntax (Readme).txt file for instructions on use. To Uninstall - Open CMD / Terminal window, first type "pip3 list" without quotes.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    King Phisher

    King Phisher

    Phishing Campaign Toolkit

    King Phisher is an open source tool that can simulate real world phishing attacks. It has an easy-to-use, flexible architecture that allows for full control over both emails and server content. It is useful for running awareness campaigns and training, and can only be used for legal applications when the explicit permission of the targeted organization has been obtained.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 19
    Secret File

    Secret File

    File Encryption/Decryption using password

    Secret File is a free and easy to use encryption/decryption app that can encrypt nearly any kind of file format using passwords. Files can be stored as personal or sent over the internet as confidential as the data of files are securely encrypted at the binary level itself and can be decrypted at any time and anywhere. You can also use multi-level protection for more secureness.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20

    ParamIT

    a Toolset for Molecular Mechanical Force Field Parameterization

    ...The developed toolkit helps the researchers in following ways: 1) automating the creation of multiple input files for quantum and molecular mechanics programs, 2) automating the output analysis and 3) substitute the use of full MM programs with a faster specialized one. The developed tools include: 1) generator of molecule-water complexes with graphical user interface (GUI), 2) semi-automatic frequency analysis using symbolic potential energy distribution matrix and comparison of optimized internal coordinates, 3) GUI for charge fitting with three modes: manual, Monte-Carlo sampling or brute force, and 4) GUI for dihedral terms fitting. The usage of these tools decreases the labor effort, lowers manual input errors and reduces the time needed for accurate MM parameterization efforts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    PivotSuite

    PivotSuite

    Network Pivoting Toolkit

    ...If the compromised host is behind a Firewall / NAT and isn't directly accessible from our pentest machine, Then we can run pivotsuite as a server on pentest machine and pivotsuite as a client on the compromised machine for creating a reverse tunnel (Reverse Connection). Using this we can reach different subnet hosts from our pentest machine, which was only accessible from the compromised machine.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    iTelliHashCSV

    iTelliHashCSV

    Cryptographic Hashing Application for CSV Files

    iTelliHashCSV is a cryptographic “one-way” hashing application designed to securely protect sensitive or private information from disclosure. Proper use of this program allows organizations, businesses, and individuals (i.e., the data owners) to share complete/intact datasets containing sensitive data with others without actually disclosing the sensitive or private information. Additionally, if such datasets are subsequently modified or enhanced through value-added services or products...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    PyCryptImg

    CLI image text encryption using python

    Simple python program to encrypt up to 255 character text into .png or .bmp images. VIEW the README for further instructions as well as image specifications. Used pyinstaller to compile into an .exe ---Feedback is welcome ---
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    ParaCrypt

    ParaCrypt

    more convenient one-time-pad encryption.

    ParaCrypt is software for encrypting and decrypting data with one-time-pads. For convenience the one-time-encryption-pads are created using pre-shared unencrypted files as sources of entropy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    pydictor

    pydictor

    powerful and useful hacker dictionary builder for a brute-force attack

    ...You can use pydictor to generate a general blast wordlist, a custom wordlist based on Web content, a social engineering wordlist, and so on; You can use the pydictor built-in tool to safe delete, merge, unique, merge and unique, count word frequency to filter the wordlist, besides, you also can specify your wordlist and use '-tool handler' to filter your wordlist. You can generate highly customized and complex wordlists by modifying multiple configuration files, adding your own dictionary, using leet mode, filter by length, char occur times, types of different char, regex, and even add customized encode scripts in /lib/encode/ folder, add your own plugin script in /plugins/ folder, add your own tool script in /tools/ folder.
    Downloads: 2 This Week
    Last Update:
    See Project