Showing 120 open source projects for "using"

View related business solutions
  • Vibes don’t ship, Retool does Icon
    Vibes don’t ship, Retool does

    Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.

    Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
    Build apps that ship
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 1

    tickets

    pythonic kerberosish ticket system: easy to use, easy to subclass

    A SecureTicket, or Ticket, consists of salt, hash, valid_until, public_flags, flags, data and "invisible" hashed entropy. Tickets are symmetrically signed using SHA256-HMAC. Fields 'valid_until', 'flags' and 'data' may be optionally encrypted using AES128-CBC or TripleAES128-CBC. Values 'data' and 'entropy' may consist of arbitrary objects which are transparently pickled(serialized), optionally gzipped and of course securely signed. Specific implementations are included: FormTicket: provides core implementation of state-less Cross Site Request Forgery protection. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Effacor

    Protect sensitive data that has been deleted from recovery.

    ...Client Data must be protected from recovery in the event of theft. Blue-Pencil was created to fulfill that. "Blue-Pencil" protects sensitive data by "sanitizing" it - writing over it using special patterns designed to make data unrecoverable by traditional means before deletion thus keeping the data safe from prying eyes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    pyshot, windows session recorder/auditor
    pySHOT is a session recorder for windows. (soon linux session recorder also) It's a client/server python app using gearman. To use pyshot you must install pyshot-client from https://sourceforge.net/projects/pyshot-client/ on monitored server
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    A cryptographically secure random password generator for Linux written in python and GTK 2.0.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    DWIP is short for Disk Wiping and Imaging Tool. This tool is being built for Mississippi State Universities National Forensics Training Center for use on a live cd to give out to it's students.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    An attempt to send a full flagged MIME based email using open relay mail servers (authentication not required). Written in Python3. Using smtplib and email liabraries TODO: Bruteforce the SMTP authentication. Support TLS.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    An editor to edit and check protocols specified in SPI-calculus using ProVerif.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 8
    ConDEnSE (Confidential Data Enabled Statistical Exploration) will be a web-based environment for statistical analysis of confidential data from various database sources, based on Plone and R, and using the Jackknife method of confidentiality protection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    ...It is a SOCKS 4-proxy that listens on localhost and acts as a middleman between your chat client and the outside world, intercepting messages and performing PGP-encryption using GnuP
    Downloads: 0 This Week
    Last Update:
    See Project
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 10
    PySumpas is a simple, graphical password generating utility written in Python/Tkinter. Using tools from the Python Cryptography Toolkit, it generates secure passwords from user input that can be regenerated if forgotten.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Chameleon will provide malware resistance by allowing easy use and management of files and applications that are partitioned into separate roles. Components in Chameleon may also be helpful for using multiple X servers together.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Soicmp is a remote shell system, similar to telnet or netcat that allows a user to connect to a remote shell daemon, by using ICMP protocol instead of classical TCP. http://soicmp.sourceforge.net/ http://billiejoex.altervista.org/Prj_Py_soicmp.shtml
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Automatically verifies md5 and sha1 checksums using either a user entered sum or by searching in a file that can be held locally or remotely via ftp or http.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    PassKool is a deterministic password generator in Python. From a given passphrase, a more or less pronouncable password is generated using a one-way function. If you happen to forget the password, you can still retrieve it using your passphrase.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Awesum is an automated graphical checksum verification utility written in Python using the PyGTK toolkit. It currently supports both MD5 and SHA checksums.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    TrustedPickle is a Python module which lets you create and sign your data files. By using public/private key techniques, this module protects your users from loading malicious data files that others might claim you created. LEGAL FOR EXPORT.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A Python/Gtk application to manage groups of users stored in an LDAP database, using data from X509 certificates imported from files or LDAP servers maintained by certificate authorities. These groups are used to create grid-map files used by the Globus
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    SystemSpecifyer is used to develop and maintain complex, well structured, systems specifications, in normal language. Using the System Matrix double matrix relation building mechanism specs can be tested for completeness, correctness and consistency.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Very simple wrapper for using some common pgp commands from within python. Requires PGP5.0i or better(ish).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    facial-recognition-authentication

    facial-recognition-authentication

    Enhanced WordPress login security with email, password, and facial rec

    This WordPress plugin adds an additional layer of security by requiring users to authenticate using their email, password, and facial recognition before accessing the login page. Ideal for high-security websites and those wanting to enhance user authentication beyond traditional login methods. With this plugin, you ensure that only authorized users can enter your WordPress site, minimizing the risk of unauthorized access. Protect your site and data with this triple-layer authentication system.
    Downloads: 0 This Week
    Last Update:
    See Project