Showing 163 open source projects for "garnet-file"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
    Learn More
  • 1

    Multi File Fuzzer

    Multi File Fuzzer aims to facilitate the discovery of vulnerability

    Multi File Fuzzer aims to facilitate the discovery of vulnerability "FileFormat" in applications. Multi File Fuzzer keeps the structure of the format while injecting corrupted data to try to crash the target application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Injection Wizard is an application for injecting traffic into WEP protected Wi-Fi networks, like aireplay-ng, but it's much more easy to use and it can work with worse conditions.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3

    SkunxTools

    WebApp Pentest Tool

    This is an Alpha version of what is to become an all in one tool for pentesting of web applications. In its current phase it currently scans google dorks and tests for sql vulnerabilities. Once urls are harvested from google dorks they are saved to a log file for future reference. One a sql check is run, the vulnerable URLs are saved to a seperate log file. View the readme in /docs for more information.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4

    Web Crawler Security Tool

    A web crawler oriented to information security.

    ...The crawler has been completely rewritten in v1.0 bringing a lot of improvements: improved the data visualization, interactive option to download files, increased speed in crawling, exports list of found files into a separated file (useful to crawl a site once, then download files and analyse them with FOCA), generate an output log in Common Log Format (CLF), manage basic authentication and more! Many of the old features has been reimplemented and the most interesting one is the capability of the crawler to search for directory indexing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Nonprofit Budgeting Software Icon
    Nonprofit Budgeting Software

    Martus Solutions provides seamless budgeting, reporting, and forecasting tools that integrate with accounting systems for real-time financial insights

    Martus' collaborative and easy-to-use budgeting and reporting platform will save you hundreds of hours each year. It's designed to make the entire budgeting process easier and create unlimited financial transparency.
    Learn More
  • 5
    Malware Classifier

    Malware Classifier

    Perform quick, easy classification of binaries for malware analysis.

    Adobe Malware Classifier is a command-line tool that lets antivirus analysts, IT administrators, and security researchers quickly and easily determine if a binary file contains malware, so they can develop malware detection signatures faster, reducing the time in which users' systems are vulnerable. Malware Classifier uses machine learning algorithms to classify Win32 binaries – EXEs and DLLs – into three classes: 0 for “clean,” 1 for “malicious,” or “UNKNOWN.” The tool was developed using models resultant from running the J48, J48 Graft, PART, and Ridor machine-learning algorithms on a dataset of approximately 100,000 malicious programs and 16,000 clean programs. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    KillDisk

    KillDisk

    Disk Wiping Software

    KillDisk is a program written in python for Unix based systems for wiping a hard drive. It can wipe a hard drive using all zeroes or random data, and as many times as you want to specify. If you'd like to donate there's several ways to do so: PayPal: https://paypal.me/gerowen Bitcoin (BTC): bc1q86c5j7wvf6cw78tf8x3szxy5gnxg4gj8mw4sy2 Monero (XMR): 42ho3m9tJsobZwQDsFTk92ENdWAYk2zL8Qp42m7pKmfWE7jzei7Fwrs87MMXUTCVifjZZiStt3E7c5tmYa9qNxAf3MbY7rD LiberaPay: https://liberapay.com/gerowen
    Downloads: 7 This Week
    Last Update:
    See Project
  • 7

    FactHash

    Factorial Hashing Function

    My first attempt at a one-way hashing class/algoritm, built as a python class. It produces variable length hash from a message block of the size you want. The resulting hash will be ~2x the message block in size, and should provide for at least as many bits of security as the block itself. I updated this, with a different hash than original, since I found a potential collision on some blocks, not but specific to that challenge. To further correct this, I modified the padding when it's...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Pass Phrase Generator

    Strong pass phrase generator using python on ubuntu

    Strong pass phrase generator using python on ubuntu. The code takes 2 random words and a random number, concatenates them together and puts one of the words into upper case. This provides a long easy to remember pass phrase which satisfies "must include numbers, letters, upper and lower case" password guidelines. The code is called Pass Phrase Generator because it lets me use the acronym PPG which is the energy weapons used in Babylon 5.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Pombo

    Pombo

    Pombo can help you recover your computer in the event it's stolen.

    Pombo works silentely in the background, hidden, and sends tracking information to a webserver of your choice. If your computer is stolen, just log into your webserver to get the lastest file uploaded by Pombo, decrypt and hand it to the police. They will have all they need to catch the thief: IP address, date/time, nearby routers, screenshot, and even a photo of his/her face if you have a webcam ! Pombo protects your privacy: Tracking information is encrypted with rock-solid GnuPG and only you can decrypt it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • All-in-one security tool helps you prevent ransomware and breaches. Icon
    All-in-one security tool helps you prevent ransomware and breaches.

    SIEM + Detection and Response for IT Teams

    Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
    Learn More
  • 10

    Effacor

    Protect sensitive data that has been deleted from recovery.

    When a file is deleted from a device the space for that file is merely de-allocated. In short: The DATA contained in that file still remains, and can be recovered. This can quickly become a security concern. There are various areas of business where this scenario is unacceptable: HIPAA Protected Medical Information, and Financial Data amongst them.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Orion - Password Manager
    Manage your passwords!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The csvdatamix project aims to randomize CSV input data files in order to conceal the original state of the data. Similar to data masking or data transformation. Also has mapping abilities to translate back to the original state of the data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Proxy server that performs proof of concept session hijacking by receiving cookies from one or more NomNom Agents. It then offers the user an option to switch to any intercepted session. More features and site specific options later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Basic Key Logger
    Non-stealth keylogger for Windows. Records mouse and keyboard (precision~10-15ms), log of events (disk size~2.5k/s) + log of operations (~ 0.2k/s). Standalone, with local copy of Python: unzip to install, delete to uninstall.NEW: hidden/visible icon
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    CasualKrypt
    NOTE: THIS PROJECT IS DEPRECATED NEW VERSION AVAILABLE AT: https://github.com/pmsosa/CasualKrypt ------------ CasualKrypt is a simple and intuitive encryption/decryption tool that enables quick and easy enc/dec of text files or on-the-go messages. This program is meant for casual en/dec. DO NOT, for the love of god, encrypt your company's Top Secret reports.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    malmon
    Hosting exploit/backdoor detection daemon.It's written in python , and uses inotify (pyinotify) to monitor file system activity.It checks files smaller then some size,compares their md5sum and hex signatures against DBs with known exploits/backdoor.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Proxy Tester is a proxy list tester and then it generates a wpad.dat file you can use for your browser based on working servers. wpad.dat file selects a random proxy server from the list of provided working proxy servers with each connection request.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Zero Wine is a malware's behavior analysis tool. Just upload your suspicious PE file (windows executable) through the web interface and let it analyze the behaviour of the process.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    A modern secure, robust, multithreaded, exception aware, internationalisable, portable GUI toolkit library designed for mission-critical work in C++ and Python forked from the FOX library. Replicates the Qt API in many places.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Cia project tries to develop an all-purpose security tool. It's composed by ctools, the security tool; cfs, the app and cfs-server, a file & key server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A MD5/SHA1/SHA-256 hasher written in wxPython 2.8 and python
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Python module for secure file erase as the DoD 5220.22-M standard
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Kadna is a small curses program written in Python that creates a secure and synchronizable database. This is intended for distributed password and small file (e.g. cryptographic keys) storage. This project in not longer maintained.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    DWIP is short for Disk Wiping and Imaging Tool. This tool is being built for Mississippi State Universities National Forensics Training Center for use on a live cd to give out to it's students.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    DCrypt
    DCrypt is an encryption and decryption tool that combines in a smart way multiple algorithms. The combination of multiple strong algorithms makes it much more difficult for hackers to get the plain content of the encrypted file without the password.
    Downloads: 2 This Week
    Last Update:
    See Project