Showing 17 open source projects for "gimp-program"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 1
    Inventory

    Inventory

    Asset inventory dataset for public bug bounty program targets

    ...It also helps security teams gain clearer visibility into their exposed infrastructure and publicly reachable systems. Much of the data in the repository is generated automatically through workflows that gather, transform, and consolidate bug bounty program data from multiple sources.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    UseGroup

    UseGroup

    Usegroup is a user and group manager.

    This program allows you to add or remove users, define user options, add, edit or delete groups from Linux/Unix systems. Usegroup works in user or administrator mode, the interface uses the GTK dialogs of Yad or Zenity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Unshackle

    Unshackle

    Tool to bypass windows and linux passwords from bootable USB

    Unshackle is an open-source tool to bypass Windows and Linux user passwords from a bootable USB based on Linux. Open-source tool to bypass windows and Linux passwords from bootable USB.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    KAAISv4

    KAAISv4

    Kali Applications Automatic Installation Script (For Kali Linux Only)

    KAAIS (Kali Applications Automatic Installation Script) Let's you easily install some applications which doesn't come by default with the Kali Linux distribution, and perform some other tasks (like apt-get commands and update your 'sources.list' file).. It's user friendly and it incorporates some other things. It also gets updated regularly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5

    iptables-bash_completion

    Programmable completion code (bash) for ip[6]tables (netfilter.org)

    This is the programmable completion specification (compspec) for the iptables program (netfilter.org).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Mpge

    Mpge

    Mpge

    Mpge is a wrapper of meterpreter (msfconsole, msfpayload and msfencode) of Metasploit Framework directly integrated with Mac OS X Snow Leopard 10.6.8 and with OS X Mavericks 10.9. With Mpge is possible make trojan horse files for Microsoft Windows, Linux and Mac OS X 10.3 Panther, OS X 10.4 Tiger, OS X 10.5 Leopard and OS X Montain Lion 10.8.1 for all Mac OS X is possible make a trojan horse files contains a reverse shell into files .pkg and files .app. I used three real Mac OS X: Attacker:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    organon

    This program focuses on automating the download, installation and compilation of pentest tools from source

    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    InjectionDenied is a bash/gawk program that blocks PHP and SQL attacks by adding entries to /etc/hosts.deny (it works like DenyHosts with SSH). The daemon inform the admin about the new block host by mail.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A light script to make a black-list system troug iptables. You can create the black-list and manage it troug this program. Please read README file to know better this script.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Host LLMs in Production With On-Demand GPUs Icon
    Host LLMs in Production With On-Demand GPUs

    NVIDIA L4 GPUs. 5-second cold starts. Scale to zero when idle.

    Deploy your model, get an endpoint, pay only for compute time. No GPU provisioning or infrastructure management required.
    Try Free
  • 10
    ProShield is a security program for Ubuntu/Debian Linux. It helps ensure your system is secure and up-to-date by checking many different aspects of your system. Regular use is recommended.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    OneKript is a Front-End for the program of disk encryption "on the flye" TrueCrypt, released under license GPL. It has been developed with the environment Kommander for KDE. At the moment is available the version 0.7.2.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Multispoof exploits weak authentication method based on IP-MAC pairs checking, implemented frequently in Ethernet networks by ISPs. This program allows to multiply user's throughput and serves as a demonstration of spoofing effectiveness.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    bddshell is a command line program for deductive database-based analysis. Its primary focus is software vulnerability detection. It acts as a front-end to a number of other programs, such as bddbddb and joeq.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This is a powerful packet monitor program like sniffer that runs under linux's text mode . Its functionalities include the ip/non-ip retrieval and monitor from data-link layer to application layer
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Logcheck is software package that is designed to automatically run and check system log files for security violations and unusual activity. Logcheck utilizes a program called logtail that remembers the last position it read from in a log file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This is a program in script shell to manage user accounts, groups, rules and parameters for Squid Proxy. This application was developed to help new system administrators providing an easier and faster way to do this job.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Program deploy a firewall, that is custom built, and is dynamic to the needs of the host. -- -- moved to www.siology.net
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB