53 programs for "clip-4-win" with 2 filters applied:

  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Save hundreds of developer hours with components built for SaaS applications. Icon
    Save hundreds of developer hours with components built for SaaS applications.

    The #1 Embedded Analytics Solution for SaaS Teams.

    Whether you want full self-service analytics or simpler multi-tenant security, Qrvey’s embeddable components and scalable data management remove the guess work.
    Try Developer Playground
  • 1
    Power Hasher is a program that allow you to get the hash code of multiple files at once, and export the results to a file, making easy for this file to be imported and the files checked. Currently it supports MD5, SHA1, SHA256, SHA384 and SHA512.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    OpenUAT is a toolkit for authentication in ubiquitous computing systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    LiveView is a forensics tool that creates a VMware virtual machine out of a raw (dd-style) disk image. This allows an examiner to "boot up" the image and gain an interactive, user-level perspective of the environment, all without modifying the imag
    Downloads: 11 This Week
    Last Update:
    See Project
  • 4
    RunAsAdmin Explorer Shim is a tool that lets administrators to keep and easily use their administrative rights but still enjoy safety of using least privileged accounts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
    Get started free
  • 5
    BizTalk components for e-Invoice Set of add-on components, such as pipeline-components to address e-Invoice specific needs in the supply-chain sollution.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    JavaLightServer is a multi-purpose server that can be used to share our desktop across the Internet with other authorized clients. It provides also a secure connection using SSL certificates.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Launch Admin for Windows XP allows users using a limited user account (LUA) to perform administrative tasks conveniently. It is for users who want the security of a LUA account combined with the power to make “on demand” administrative changes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    OpenPGP Keyserver written in ASP.NET (C#) This keyserver is not designed to synchronise with other servers. Suitable for deployment within a windows based organisation where sharing keys with internet keyservers is not required/desirable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Mica has been developed in the project SicAri (www.sicari.de), sponsored by the BMBF (www.bmbf.de), and allows for all kind of means authentication at windows systems. Mica is based on Kerberos and therefore supports single sign-on.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Never Get Blocked Again | Enterprise Web Scraping Icon
    Never Get Blocked Again | Enterprise Web Scraping

    Enterprise-Grade Proxies • Built-in IP Rotation • 195 Countries • 20K+ Companies Trust Us

    Get unrestricted access to public web data with our ethically-sourced proxy network. Automated session management and advanced unblocking handle the hard parts. Scale from 1 to 1M requests with zero blocks. Built for developers with ready-to-use APIs, serverless functions, and complete documentation. Used by 20,000+ companies including Fortune 500s. SOC2 and GDPR compliant.
    Get Started
  • 10
    Project WinSec, codenamed Firefly, is a GNU GPL licensed security program for checking and applying Microsoft© Windows© updates, and fixing other security issues automatically.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Open source DRM for MPEG-4 and MPEG-2 adhering to ISO/MPEG IPMP open standards (MPEG IPMP Hooks and IPMP-X), ISMAcryp and OMA DRM 2 specs. Includes CA, PKI, DOI mgmt, ISMA streaming, license server, encoding/encryption, player, plugin architecture, etc
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Real-Time Proactive Secret Sharing Library for RTAI is an implementation of the Shamir's secret sharing scheme and Herzberg's proactive secret sharing algorithm. The library uses a port of GNU GMP in order to make multiple precision arithmetic operatio
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The Dashboard Linux PC Project. A Linux UI for automobile multimedia. To be used for MP3's, GPS, DVDs, CD, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A resource-conscientious, flexible, modular, platform-independent, scalable and robust server based on ircd-ratbox.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    RemoteWAP gives you the ability to take control of a Linux Operating System from anywhere with a WAP enabled mobile phone. This project is being developed in Java. There is plans to support other Operating Systems such as Windows, Solaris, *BSD
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    NBTView is a 'NetBIOS Swiss Army Knife' written in C, and usable under several UNIX-like systems. NBTView allows you to passively monitor NetBIOS intelligence (users logged in, shares, etc.), run queries against machines, and brute-force share passwords.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    An anonymous pseudonym email server, such as that which runs nym.alias.net.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Output spool reader for Snort! This program decouples output overhead from the Snort network intrusion detection system and allows Snort to run at full speed. It takes input and output plugins and can therefore be used to convert almost any spooled fil
    Downloads: 5 This Week
    Last Update:
    See Project
  • 19
    1. project name eXPimenttk (e-SecureOffice) 2.Language Java (req. - at least j2re) 3.target platform - Cross-platform software 4.problem we want to sole- Encryption, Decryption software, File eraser, Messenger, Mailer,Remailer,FireWall 5 target - user
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Generic clustering/load-balancing platform (over a LAN or internet) using java based P2P Aorta workers that execute java "tasklets". Various tasklets can be implemented to solve fractals, process images, render webpages, crack RSA "brute force".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Seahorse is a Gnome front end for GnuPG. It is a tool for secure communications and data storage. Data encryption and digital signature creation can easily be performed through a GUI, and Key Management operations also can be performed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    CryptoPy is a pure python implmentation of cryptographic algorithms and applications. The algorithms are developed for readability more than speed. The collection now includes IEEE 802.11i specific algorithms that generated the test vectors for 802.11i.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Single-honeypot is a powerfull tool, for security interest about the estudies of techniques of breaking systems. This is, a singular or little honeypot for test your networks for hostiles visitors. This made in perl script. Simulate different servi
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A command line tool to create secure encrypted file using private key. You must provide key string to convert you source file into ecrypted one.
    Downloads: 0 This Week
    Last Update:
    See Project