Showing 801 open source projects for "using"

View related business solutions
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    AleHu

    AleHu

    Encrypting, anonymous, unlimited size message transfer system

    AleHu is an open source encrypted message transfer system that encompasses both server (PHP) and client software (Java). Give it a shot: You can try out AleHu by simply running the client using the preconfigured AleHu test server! For further details and instructions on how to quickly install and run AleHu, have a look at the documentation in the Wiki section.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Cube Password Manager

    Cube Password Manager

    A secure and light-weight password manager

    ...This password manager is very light-weight, extremely secure and very easy to use with a simple, no-frills interface. All the passwords are stored locally on your PC, where it is encrypted using a secure and unique encryption method. NOTE: Should you want to compile this yourself, this project was built using Visual Studio 2010. The DLL dependencies are included in the main VS files zip file(taken out of the "redist" folder of VS). There is a folder containing the project written in QT, so you can compile and run this in Linux, although the QT project is not being updated anymore. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    PhishBlock

    PhishBlock

    A program that detects and blocks phishing, pharming, Hacker's C&C.

    PhishBlock is a security program that detects and blocks Phishing, Pharming, Hacker’s C&C(Command and Control) Servers which are located in databases with URLs, DNS hostnames, and IP Addresses. This program detects and blocks Malware URLs, bad Hosts, and bad IP addresses. Recently, most malware codes are delivered covertly to users’ personal computers through Google ads, SNS, Blogs, BBS and so on, which users visit often. And After the malware codes connect the C&C server(or...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    RSA Converter
    A multi-platform tool to convert RSA private keys between SFM format (modulus, public exponent, private exponent) and CRT format, in both ways.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5

    CryptoEngine

    CryptoEngine (C) is a DLL Library that provide Cryptography Services.

    CryproEngine (C) is a Class Library (DLL) that provide (API) interface, programmer can use it when writing applications that needs Standard Cryptography Algorithms, using Qt-SDK. Actually this library is a Wrapper for Crypto++ library, by Wei Dai, which is approved by NIST (see www.cryptopp.com for details), CryptoEngine is intended to provide simple & easy to use interface (API) for standard cryptography algorithms for Qt-SDK Developers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    AlertWheel

    AlertWheel is a visualization-based analysis tool for Snort IDS logs

    ...It is based on a novel radial visualization capable of simultaneously displaying several thousand alerts, emphasizing the most important alerts or patterns in the dataset. Among other things, AlertWheel offers a new technique for representing bipartite graphs (where links exist between two distinct node groups). Using this approach, links are positioned in a way to reduce occlusion in the visualization. AlertWheel simultaneously combines three link bundling techniques in a novel way to reduce cluttering on the interface. Our solution also incorporates filtering options, annotation, logging and details-on-demand, to support analysis processes as described by specialists in this field. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Not Another MAC Address Generator

    Generates using (OUI) Verified MAC Addresses

    NAMAG (Not Another MAC Address Generator) Generates using (OUI) Verified MAC Addresses using oui.csv - OUI = Organizationally unique identifier from Standards.IEEE.org: http://standards.ieee.org/develop/regauth/oui/oui.txt Can save with multiply styles HEX: 00:00:00:00:00:00 HEX: 00-00-00-00-00-00 HEX: 000000000000 In order to run NAMAG you must have the VB6.0 Runtime files which can be downloaded from Microsoft's website: http://www.microsoft.com/en-us/download/details.aspx?...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Online Signature Verification

    Online Signature Verification

    Real time signature verification using MATLAB and C#

    Online Signature Verification technology requires primarily a digitizing tablet and a special pen connected to the USB port of a computer. An individual can sign on the digitizing tablet using the special pen regardless of his signature size and position. The signature is characterized as pen-strokes consisting x-y coordinates and pressure with the data being stored in a signature database. Dynamic time warping (DTW) and quadratic discriminant analysis (QDA) is used to get results where the system accepts 2% of forged signatures and rejects 5% of true signatures
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    ...The algorithm this plugin uses is based off FIPS-181 which was withdrawn by NIST a while back. The proliferation of password managers that seamlessly run on multiple platforms (some of which are free) has also removed almost all advantages of using randomly generated pronounceable passwords. If you have a use case for this plugin, reconsider it. If you still think using randomly generated pronounceable passwords are worth it for your use case, reconsider it some more.
    Downloads: 25 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 10

    Passwort Kalkulator

    Erzeugt/Berechnet Passworte mit hilfe von Pseudozufallszahlen

    ...Die Namen der Dienste können in einer Liste (im Klartext) mit einigen Optionen hinterlegt werden und nach diesen Angaben wird bei jedem Programmlauf das entsprechende Passwort erzeugt. Das Programm ist ohne Installation lauffähig. Auf dem Rechner wird kein Passwort gespeichert! Only remember one complicated password and produce with it by using pseudo random numbers many different, secure passwords (reproducibly) for all your services and applications. Service names can be stored in a list (in plain text) with some options, and after this the appropriate password is generated on each run. The program can run without installation. On the computer, no password is saved! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SimpleHasher

    SimpleHasher

    Simple Hasher is a Hashing utility for verifying integrity of files.

    Simple Hasher is a Hashing utility for verifying integrity of files using a wide range of supported algorithms: CRC32, ED2K, MD4, MD5, RIPEMD160, SHA1, SHA256, SHA384, SHA512 and WHIRLPOOL512. All processed files are logged and ready for export to a number of different verification file formats Like SFV, MD5SUM, SHA1SUM. Multiple hash types can be generated simultaneously per file. Handy hash and file comparison functions, such as comparing calculated hashes will make this task as simple as A-B-C.
    Downloads: 33 This Week
    Last Update:
    See Project
  • 12
    Clam sentinel is a program that detects file system changes and automatically scans the files added or modified using ClamWin. Require the installation of ClamWin. For Microsoft Windows 98/98SE/Me/2000/XP/Vista, Windows 7 and Windows 8.1.
    Leader badge
    Downloads: 159 This Week
    Last Update:
    See Project
  • 13
    SafePassDB

    SafePassDB

    Protect your personal data with SafePassDB.

    ...SafePassDB is a free multi-platform software application written in Java programming language that will enable you to protect all of your personal data with one "Master Password" using AES (Advanced Encryption Standard). SafePassDB is light weight and super easy to use! Current version of the software uses 128 bit AES (Advanced Encryption Standard) algorithm, which is a standard by U.S. National Institute of Standards and Technology (NIST), for protecting your personal data. IMPORTANT: In order to run SafePassDB you need to have Java installed on your computer. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    SecurityManager

    Web application to configure RBAC of different applications

    This application can manage the different ACL's/Users for different applications and expose them through webservice or database views using WAMP/LAMP
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15

    ANNFiD

    A forensic file identification tool using neural networks

    Just carved a bunch of bytes and have no idea what they could be? Maybe ANNFiD can help. ANNFiD uses neural network to identify byte patterns. It can be trained and has a GUI to help in the process. The tool is still on a very early stage, but could improve exponentially with the help of the developer community
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    KeePass KdbpFile format

    A plugin to allow Import and Export in Fast KDBP format

    *** NOTE: Not compatible with KeePass 2.35 or greater *** This is a plugin to KeePass <http://www.KeePass.info> to allow import and export of a new file format called KDBP. This contains 100% of the data in a standard kdbx file, and is encrypted using exactly the same compression, cryptography and integrity code. The difference is that inside the encrypted container, rather than XML, is a binary format serialized using Protocol Buffers. This has the advantage of being smaller and faster than XML, and is therefore particularly suitable for use with mobile versions of KeePass, such as Keepass2Android <http://keepass2android.codeplex.com/>. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ...SharpPcap is a cross-platform packet capture framework for the .NET environment, based on the famous pcap / WinPcap libraries. It provides an API for capturing, injecting, analyzing and building packets using any .NET language such as C# and VB.NET.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 18
    Safe Autorun

    Safe Autorun

    Creates permanent autorun.inf to avoid USB infections

    Safe Autorun is an application which can be used to create permanent autorun.inf file in USB removable drives so viruses/malwares can't create their own autorun.inf file to infect others. You can remove created autorun.inf file using this application too. It has both 32 and 64 bit version and is compatible with Windows XP, 7 and 8. It only works with FAT32 file system which most USB removable drives are FAT32. It needs Visual C++ 2008 Redistributable Package.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    Simple Cipher Decoder

    Simple Cipher Decoder

    Decrypts and encrypts substitution, transposition and vigenere ciphers

    ...If you could write some form of review or send me an email with advice I would greatly appreciate it. This is a series of three simple programs that will allow you to easily encrypt and decrypt text using any combination of substitutions, transpositions, vigenere ciphers or caesar shifts. The programs will not completely solve the ciphers for you haowever they will make it very clear to see how to solve them and ensure that there is no need for tedious manual work.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    SSL Diagnos

    SSL Diagnos

    SSL Strength Evaluation and Test Utility

    ...It can also be used for testing and rating ciphers on SSL clients. It has also specific support for pop3s, sip, smtp and explicit ftps. Tests for heartbleed (including dtls). Furthermore a separate tool, SSLPressure, not using openssl can be used to check the whole spectrum of possible SSL protocols on a server. Can also be used for testing ssl for mssql-servers (was added since nessus did not support this) and contains mitm poc for stripping ssl from mssql-connections.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 21
    AESTextCrypt

    AESTextCrypt

    Encrypt and decrypt text using AES 256 bit encryption

    AESTextCrypt is an easy-to-use open source tool for text encryption and decryption. Primarily intended for use with email, use it wherever you need to protect text from prying eyes. The encrypted text can be copy/pasted into any text-handling application (e.g. email) instead of plain text. Convenience buttons are provided for clipboard operations. AESTextCrypt uses AES-256 bit encryption which is the strongest available encryption scheme. It also employs bcrypt, which implements...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Windows Domain Credentials Phishing Tool

    Video: https://vimeo.com/89782344

    While performing a Pen test for a client i needed to catch a domain user name and password, there are several ways to gain users passwords and it really depends on a lot of factors on how to get it in my case i didn't had time to wait for the user to enter his credentials and get it using a key logger so I and @Roni_Bachar created a fake windows domain login window to tried to force and trick the user to enter his password. There are several tools and techniques such as "Mimikatz" but they require you to have administrative/system privileges, you don't need special privileges to execute "Windows Domain Credentials Phishing Tool"...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23
    Kippo-Graph

    Kippo-Graph

    Full featured script to visualize statistics from a Kippo SSH honeypot

    ...Kippo-Graph currently shows 24 charts, including top 10 passwords, top 10 usernames, top 10 username/password combos, success ratio, connections per IP, connections per country, probes per day, probes per week, ssh clients, top 10 overall input, top 10 successful input, top 10 failed input and many more. There are also geolocation data extracted and displayed with Google visualization technology using a Google Map, a Intensity Map, etc. Lastly, input-related data and statistics are also presented giving an overview of the action inside the system and there is live playback ability of captured sessions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    Digital signing using a Smart Card

    Java code that enables you to sign documents using a smart card.

    With this library, you'll be able to access a smart card and extract its information. If the smart card contains a key store, you can use it to create digital signatures. This library currently implements signing of PDF documents using the Belgian eID.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    Bigram Table Generator

    Bigram Table Generator

    A program to generate random reciprocal bigram tables

    A command-line program to encrypt/decrypt a message using a random reciprocal bigram table and write a bigram table to a text file. Executing the program without any command-line arguments starts bigram in message encryption/decryption mode. The program prompts for a password or passphrase and a message to encrypt/ decrypt. After the message is entered the ciphertext is displayed.
    Downloads: 0 This Week
    Last Update:
    See Project