68 projects for "open-shell" with 2 filters applied:

  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    OpenPGP Keyserver written in ASP.NET (C#) This keyserver is not designed to synchronise with other servers. Suitable for deployment within a windows based organisation where sharing keys with internet keyservers is not required/desirable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    A JNI wrapper for the Microsoft Data Protection API
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Cnc's IP Data Volume Report

    Logs IP to IP contact, number of packets, bytes.

    Cnc's IP Data Volume Report: Logs IP to IP contact, number of packets, bytes, time of contact, Ethernet too! View via local web interface. Very simple for those who want to view who your computer is contacting the most!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    DNAOnline is a web front-end to the DNA® (Distributed Network Attack®) decryption software from AccessData Corporation. It was developed by the E-Crime Investigative Technologies Lab at FSU and supported in part by NIJ grant 2005-DE-BX-K034.
    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 5
    THIS PROJECT HAS BEEN ABANDONED SINCE 2007, NO SUPPORT WILL BE PROVIDED. Winpooch is a watchdog for Windows (2000, XP, 2003, but only 32-bits). It detects modifications in your system, so as to detect a trojan or a spyware installation. It also includes a real-time anti-virus. Set your own security level for anti-spyware, ant
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    KeyCounter is a tool for the tray-bar that helps you to get statistics about the useage of your computers keyboard, mouse and uptime. KeyCounter is not intended to work as a keylogger.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    Cryptology is a Windows shell application that enables users to easily protect their files. It incorporates military grade encryption (256 AES) and secure shredding into a simple user interface
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Mica has been developed in the project SicAri (www.sicari.de), sponsored by the BMBF (www.bmbf.de), and allows for all kind of means authentication at windows systems. Mica is based on Kerberos and therefore supports single sign-on.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Project WinSec, codenamed Firefly, is a GNU GPL licensed security program for checking and applying Microsoft© Windows© updates, and fixing other security issues automatically.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    A.L.A.R.M. is A Laptop A/C Removal Monitor for Windows XP and later. If your workstation is locked and A/C power is being removed, it loudly plays a warning signal for theft protection. Slim, sound file can be specified.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    TSIC is a comprehensive solution for secure Internet connection against all kinds of threats and harmful programs for Windows platforms and ReactOS. It's features include a built-in FIREWALL,IDS,Parental and privacy Control and also antivirus.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A WordPad-like cryptography program. Includes AES, RC4, Skipjack, Twofish, Blowfish, CryptAPI, DES, Gost, XOR, and TEA.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Open eSign allows software developers and technical parties in a company to create secure, online (web-based) forms and documents that follow a business process flow and enable legally recognized electronic signatures using digital signature technology.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This program hidden inside compressed files of images, then these files can be extracted as if it were a tablet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Complete Privacy Suite. Deletes all Junks, Browser history, Manage passwords, Crypt Disk, Anonymous surfing, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This tool will query againt mssql to find any occurance of string in a database. This will help system admin to locate if any, malicious scripted had been injected to the database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Fingerprint Copy is a forensic copy utility. The utility creates copy of file(s) and verifies this copies with digital fingerprints(checksum) of the source file(s). The utility is in a early development state. Planed: March 2009 First Command-line Utiliy
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    ITkeys automates the security management process for Windows networks (Active Directory groups). Delegates the ability to amend relevant IT access for employees to their managers. Wizzard based web tool requiring no formal training. No more ADUC MMC!
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB