49 programs for "beta" with 2 filters applied:

  • All-in-One Payroll and HR Platform Icon
    All-in-One Payroll and HR Platform

    For small and mid-sized businesses that need a comprehensive payroll and HR solution with personalized support

    We design our technology to make workforce management easier. APS offers core HR, payroll, benefits administration, attendance, recruiting, employee onboarding, and more.
  • Simplify Purchasing For Your Business Icon
    Simplify Purchasing For Your Business

    Manage what you buy and how you buy it with Order.co, so you have control over your time and money spent.

    Simplify every aspect of buying for your business in Order.co. From sourcing products to scaling purchasing across locations to automating your AP and approvals workstreams, Order.co is the platform of choice for growing businesses.
  • 1
    AWStats

    AWStats

    AWStats Log Analyzer

    AWStats is a free powerful and featureful server logfile analyzer that shows you all your Web/Mail/FTP statistics including visits, unique visitors, pages, hits, rush hours, os, browsers, search engines, keywords, robots visits, broken links and more
    Leader badge
    Downloads: 369 This Week
    Last Update:
    See Project
  • 2
    FileVerifier++
    FileVerifier++ is a Windows utility for calculating hashes using a number of algorithms including CRC32, MD5, SHA-1, SHA-256/224/384/512, WHIRLPOOL, and RIPEMD-128/160/256/320. Supported hash file formats include MD5SUM .MD5, SFV, BSD CKSUM, and others.
    Downloads: 101 This Week
    Last Update:
    See Project
  • 3
    Privacy and Anonymity in the Internet

    Privacy and Anonymity in the Internet

    System for anonymous Web browsing

    Our goal is to develop, implement, evaluate and provide a secure and scaleable technical infrastructure for anonymous communication. This project is supported by Deutsche Forschungsgemeinschaft (DFG).
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4

    Cobrax trojan

    Cobrax Trojan - 1.0

    Troyano de conexion inversa desarrollado en C++ & Visual Basic 6.0, con codigo abierto.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Eptura Workplace Software Icon
    Eptura Workplace Software

    From desk booking and visitor management, to space planning and office utilization data, Eptura Workplace helps your entire organization work smarter.

    With the world of work changed forever, it’s essential to manage your workplace and assets together to effectively create a high-performing environment. The Eptura experience combines the power of workplace management software with asset management, enabling you to effectively operate your building and facilitate hybrid work.
  • 5
    A pronounceable password generator plugin for KeePass. NOTE: This project has been discontinued. It hasn't been worth it to maintain the project for a while now, so no more updates will be made to the plugin. The algorithm this plugin uses is based off FIPS-181 which was withdrawn by NIST a while back. The proliferation of password managers that seamlessly run on multiple platforms (some of which are free) has also removed almost all advantages of using randomly generated pronounceable...
    Downloads: 18 This Week
    Last Update:
    See Project
  • 6
    Wireless Attack Toolkit (WAT)

    Wireless Attack Toolkit (WAT)

    A push-button wireless hacking and Man-in-the-Middle attack toolkit

    This project is designed to run on Embedded ARM platforms (specifically v6 and RaspberryPi but I'm working on more). It provides users with automated wireless attack tools that air paired with man-in-the-middle tools to effectively and silently attack wireless clients. Some of the tools included in the kit are: Custom regex-based DNS Server DHCP Aircrack-ng suite Browser Exploitation Framework (Preconfigured for metasploit) Metasploit Python-based Transparent Injection...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Designed to use what is known about users via the /etc/passwd file on unix/linux systems to generate a dynamic dictionary or csv file of more accurate guesses as to what their possible password may be, to look for bad password protection practices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    VirusTrap

    VirusTrap

    Online Multi-Engine Antivirus Scanner

    VirusTrap is an open source framework for penetration testers, network auditors, system administrators who need to analyze unknown binaries during their work. The scanner was made to help computer users identifying malicious files by scanning them with 25 antivirus engines.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The JWA library aims to provide a conversion from C to Delphi of as many headers as possible from the PSDK etc. The JWSCL (security library) is an advanced object-oriented framework for programming with the Windows security features (ACL, Tokens, etc.)
    Downloads: 11 This Week
    Last Update:
    See Project
  • Cybersecurity Management Software for MSPs Icon
    Cybersecurity Management Software for MSPs

    Secure your clients from cyber threats.

    Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
  • 10
    Tyrant SQL

    Tyrant SQL

    Tyrant SQL is a Havij based cross-platform. It's Sqlmap's gui version.

    It's a poweful Sql Injection Tool. It's a GUI version of SqlMap, saving time and getting better results. Was designed basing on Havij.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    Certificate Helper
    Certificate-helper is a utility desktop application written in Java designed and created to assist (mainly developers) in creating and viewing keystores and digital certificates. This is done via a user interfaces implemented in Swing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Dir2Encrypt
    Dir2Encrypt encrypt a folder with privat files and subfolders into a single password protected archive file. The archive file can be a zip file or a self extracting exe file. Microsoft Net Framwork 2 has to be installed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Nast is a packet sniffer and a LAN analyzer. It sniff packets and save data in files, checks NIC in promisc mode,build LAN hosts list, find a gw,performs a port scanning, catchs daemon banner etc... It also provides a GTK/ncurses interface.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 14

    SBCD

    partitioning backup recovery and all kind of boot loaders

    partitioning backup recovery and all kind of boot loaders
    Downloads: 4 This Week
    Last Update:
    See Project
  • 15
    KeePass for J2ME is a J2ME port of KeePass Password Safe, a free, open source, light-weight and easy-to-use password manager. You can store passwords in a highly-encrypted database on a mobile phone, and view them on the go.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16

    PyEvcs

    Extended Visual Cryptography Schemes in Python

    Visual Cryptography is a graphical form of information concealing. In a 2-out-of-2 Visual Cryptography Scheme a dealer will "split" a secret image into two shares, print the shares onto separate transparencies and hand them to the participants to the scheme. If the two participants come together, they'll be able to reveal the secret image without a computer, perfectly superimposing the transparencies they own. Analyzing a single share, no one will be able to obtain any information...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    This toolkit has complete security Package start from Tweak manager , Updater , Virus scanner ,Proxy server and many more This will be help full for user from corporate to small user we have already started working on it will completed with 2 months
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    An IIS SMTP event sink manager which helps control e-mail flow and fight spam
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    DAD is a Windows event log and syslog management tool that allows you to aggregate logs from hundreds to thousands of systems in real time. DAD requires no agents on the servers or workstations. Correlation and analysis is driven through a web front end.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Derived from TrueCrypt 6.3 release, I added some command line options to "TrueCrypt Format.exe" to allow TrueCrypt volumes to be created without using the graphical user interface
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    WebToken is a cryptographic system to authenticate users through a 2FA (Two-Factor Authentication) using OTP (One Time Password).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Set of perl scripts to analyse and check expiration of user certificates in Microsoft Windows Certification Authority. Output is in HTML with list of expiration state of latest user certificates. Expirated are marked. List can be sent by e-mail.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Power Hasher is a program that allow you to get the hash code of multiple files at once, and export the results to a file, making easy for this file to be imported and the files checked. Currently it supports MD5, SHA1, SHA256, SHA384 and SHA512.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    WinFail2ban scans log files/event viewer and bans IP that makes too many password failures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    OpenUAT is a toolkit for authentication in ubiquitous computing systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next