Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Try Retool free
Outgrown Windows Task Scheduler?
Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.
Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
SafeBox is intended to be a next-generation debugger/profiler/analyzer for programs running in user space. It will include arquitecture simulation to allow advanced features like monitoring or restricting API use. Extensible using plug-ins.
BFS-CS uses a brute force search to solve a given rubiks cube. It aims at finding the shortest solve possible. The tool provides a cube editor using OpenGL.
OpenHash is a desktop application for .NET which uses the "OpenSSL .NET" managed wrapper for OpenSSL from Frank Laub (also on SourceForge) to produce the cryptographic hash value for a string or any file using any of the hash functions from OpenSSL.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
It completely removes a file from your disk without leaving any track. It is very fast. It overwrites any deleted file with blanks or random data N times - where N is given by the user. Also, it changes the filename. No setup is needed.
A quick and easy to use SHA1 calculator for Windows, using C# & .net. (very) Similiar in style to winMD5Sum; supports filenames passed on the command line & files drag+dropped on!
A formally verified implementation of cryptographic algorithms using the SPARK programming language. For the complete library proofs of the absence of run-time errors are available. Some of its subprograms include proofs of partial correctness.
Language: C++ using wxWidgets and STL. Platforms: Win98/ME/2000/XP, perhaps Linux. Description: Download Manager for FTP and HTTP. Features: Resuming, priority/exact ordering, threaded downloading, mirror searching and mass adding of downloads.
Run applications fast and securely in a fully managed environment
Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.
Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
Tool for encrypting files using blowfish, aes, des or cast5,
File hashing with md5, sha and ripemd160,
compresssion with gzip, and a nice user interface.
Created using C++ with Qt framework, depends on QCA third-part Qt Library and OpenSSL.
the PPHPLIB allows users to easy create standard web pages which are using a DB as a backend. In addition the library provides other functionallity, like classes for authentication and authorization, abstraction of DB layers and many more.
raw2vmdk is an OS independent Java utility that allows you to mount raw disk images, like images created by "dd", using VMware, VirtualBox or any other virtualization platform supporting the VMDK disk format.
This project aims at porting visual cryptography, which only works with transparent slides, to ordinary 80g/m^2 white paper. Please read the documentation before using the program.
This is mainly just an interface tweak. Added function of mac address changer.
If you have problems getting the mac changer to work, try using a mac address that starts with something other than "00" in the first octet.
If you are intersted in learning about network security please check out my Juniper Networks training course at: http://academy.gns3.com/courses/juniper-jncia-intro-to-junos
Derived from TrueCrypt 6.3 release, I added some command line options to "TrueCrypt Format.exe" to allow TrueCrypt volumes to be created without using the graphical user interface
** Guys I have built a much more powerful Fully Featured CMS system at: https://github.com/MacdonaldRobinson/FlexDotnetCMS
Macs CMS is a Flat File ( XML and SQLite ) based AJAX Content Management System. It focuses mainly on the Edit In Place editing concept. It comes with a built in blog with moderation support, user manager section, roles manager section, SEO / SEF URL
this application can lock a folder , using feature of OS registery so, the advantage is that this program don't do much on your folder, so your file wont destroy becuz of locking...
AMAS stands for Ants Mobile Authentication System and it permits to use one time passwords (OTP) to authenticate users and user groups. The user asks for tokens using a cellular phone call, an SMS, or a SOAP interface.
I have implemented transaction signing in Oracle application using digital certificates. Created a java bean to access windows default keystore (SunMSCAPI) to get all certificates and populate them in oracle forms application, Signing oracle forms...
Cryptic is a cryptographic applications suite for encryption/decryption of data, calculating cryptographic hashes or message digests and securing user passwords using a master password in a password safe.
An attempt to send a full flagged MIME based email using open relay mail servers (authentication not required). Written in Python3. Using smtplib and email liabraries TODO: Bruteforce the SMTP authentication. Support TLS.