Showing 94 open source projects for "android"

View related business solutions
  • RMM Software | Remote Monitoring Platform and Tools Icon
    RMM Software | Remote Monitoring Platform and Tools

    Best-in-class automation, scalability, and single-pane IT management.

    Don’t settle when it comes to managing your clients’ IT infrastructure. Exceed their expectations with ConnectWise RMM, our MSP RMM software that provides proactive tools and NOC services—regardless of device environment. With the number of new vulnerabilities rising each year, smart patching procedures have never been more important. We automatically test and deploy patches when they are viable and restrict patches that are harmful. Get better protection for clients while you spend less time managing endpoints and more time growing your business. It’s tough to locate, afford, and retain quality talent. In fact, 81% of IT leaders say it’s hard to find the recruits they need. Add ConnectWise RMM, NOC services and get the expertise and problem resolution you need to become the advisor your clients demand—without adding headcount.
  • Automated quote and proposal software for IT solution providers. | ConnectWise CPQ Icon
    Automated quote and proposal software for IT solution providers. | ConnectWise CPQ

    Create IT quote templates, automate workflows, add integrations & price catalogs to save time & reduce errors on manual data entry & updates.

    ConnectWise CPQ, formerly ConnectWise Sell, is a professional quote and proposal automation software for IT solution providers. ConnectWise CPQ offers a wide range of tools that enables IT solution providers to save time, quote more, and win big. Top features include professional quote or proposal templates, product catalog and sourcing, workflow automation, sales reporting, and integrations with best-in-breed solutions like Cisco, Dell, HP, and Salesforce.
  • 1
    Zynix-Fusion

    Zynix-Fusion

    zynix-Fusion is a framework for hacking

    zynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    Pkcs11Interop

    Pkcs11Interop

    Managed .NET wrapper for unmanaged PKCS#11 libraries

    This project provides stable releases of Pkcs11Interop project hosted on github. Please visit project website - www.pkcs11interop.net - for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    SecurePIS

    SecurePIS

    Encrypted Personal Information System

    A fast and lightweight end to end encrypted Personal Information System. It has easy to use check-in/check-out functionality, tracks the history of every updates on each database entry, it supports secure attachments of digital files like images and audio/video, and most of all the database is secured by industry standard encryption technologies. Very intuitive and easy to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    PCSecrets

    PCSecrets

    Encrypt and manage secret text data

    PCSecrets is a PC application that holds secret text data - protected by a master password and strong encryption. Use it as a password manager or just somewhere to hold any text data securely in one place. It can hold a second, hidden set of secrets that is undetectable and plausibly deniable. The program is also a PC counterpart of the Secrets for Android app. It uses the same data structure and provides synchronization that allows easy transfer of secrets between the two. For those who find...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Propelling Payments for Software Platforms Icon
    Propelling Payments for Software Platforms

    For SaaS businesses to monetize payments through its turnkey PayFac-as-a-Service solution.

    Exact Payments delivers easy-to-integrate embedded payment solutions enabling you to rapidly onboard merchants, instantly activate a variety of payment methods and accelerate your revenue — delivering an end-to-end payment processing platform for SaaS businesses.
  • 5

    TOTP Database

    TOTP server side algorithm

    calculate TOTP using database stored procedures allowing you to validate a user's entered TOTP with a stored secret. Cooperates with all authorization apps that calculate a TOTP using SHA1 encryption
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    NetCutter

    NetCutter

    Control your Network by Disconnect/Connected Devices from your router

    NetCutter is a Powerful Program working on Wi-Fi,it Disconnect And Reconnect Connected Devices by Cutting ON/OFF Network from Choosen Interfaces and protect your network from hackers. NetCutter is Just For Windows now, Support the project for Android Port This Program is in Early Stages , So bugs will appear feel free to Contact us to fix it. Thanks. * Download Requirements To install this Program you need : - .NET Framework 4.0 or Higher - WinPcap 4.1.3 For WinXP,WinVista...
    Leader badge
    Downloads: 20 This Week
    Last Update:
    See Project
  • 7

    sls

    SLS Team Java Library

    Java library with Cryptographic algorithms. Easy to use Crypto algorithms. Works on Windows, Linux, Android. No external lib dependencies, no useless abstractions, no 'crypto provider'. Elliptic curves was borrowed from BouncyCastle and simplified a lot. Most of EC classes are custom algorithms for certain curves. Can be easily deleted if u dont need them. With couple of classes u can parse and construct those ugly ASN.1 structures, look at RSA and EC key formats for example. No bad...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Firefly

    Firefly

    A proxy software to help circumventing the Great Firewall

    Firefly is an agent used to access Great Firewall (GFW) blocked websites and applications. Under the default settings, Firefly only goes through VPN forwarding wall of IP traffic, IP wall straight. If you find a website or application you cannot access, Firefly flow mechanism can be built to distinguish between an error. In this case, you can choose to forward all traffic through the VPN, and then try again.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9
    NASH OS

    NASH OS

    Nash Operating System for Modern Ecommerce

    The all-built-in-one, automatic, ready-to-go out-of-box, easy-to-use state-of-the-art, and really awesome NASH OS! Over 25,000+ flexible features and controls and all scalable!! The most powerful solution ever built to instantly deliver new heights of online ecommerce enterprise to you.
    Downloads: 5 This Week
    Last Update:
    See Project
  • Manage Properties Better For Free Icon
    Manage Properties Better For Free

    For small to mid-sized landlords and property managers

    Innago is a free and easy-to-use property management solution. Whether you have 1 unit or 1000, student housing, or commercial properties, Innago is built for you. Our software is designed to save you time and money, so you can spend more time doing the things that matter most.
  • 10
    Universal Password Manager

    Universal Password Manager

    Store all your passwords in one secure encrypted database.

    Universal Password Manager allows you to store all your passwords in one highly secure encrypted database. Its strengths are simplicity, portability and security (uses 128bit AES encryption). UPM is available on Android, Windows, OS X & Linux.
    Leader badge
    Downloads: 33 This Week
    Last Update:
    See Project
  • 11
    Cuckoo Sandbox

    Cuckoo Sandbox

    Cuckoo Sandbox is for automated analysis of malware

    Cuckoo Sandbox uses components to monitor the behavior of malware in a Sandbox environment; isolated from the rest of the system. It offers automated analysis of any malicious file on Windows, Linux, macOS, and Android.
    Downloads: 37 This Week
    Last Update:
    See Project
  • 12

    APIthet

    An Application to security test RESTful web APIs.

    APIthet is an application to security test RESTful web APIs. Assessing APIs help in detecting security vulnerabilities at an early stage of the SDLC. Compare this with assessing an Android application that uses APIs on a backend server. This kind of assessment happens at a much later phase of the SDLC. Even worse, it does not necessarily touch all the APIs. That's not all. You specify one of the JSON parameters as random. This helps set a unique value for a specific JSON parameter in an API...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Wi-PWN

    Wi-PWN

    ESP8266 firmware for performing deauthentication attacks

    ESP8266 firmware for performing deauthentication attacks, with ease. Wi-PWN is a firmware that performs death attacks on cheap Arduino boards. The ESP8266 is a cheap microcontroller with built-in Wi-Fi. It contains a powerful 160 MHz processor and it can be programmed using Arduino. A deauthentication attack is often confused with Wi-Fi jamming, as they both block users from accessing Wi-Fi networks. The 802.11 Wi-Fi protocol contains a so-called deauthentication frame. It is used to...
    Downloads: 17 This Week
    Last Update:
    See Project
  • 14
    Defa Protect HTML5 Video From Download

    Defa Protect HTML5 Video From Download

    Prevent and Protect Your HTML5 Video, Music , Audio From Download Free

    Defa Protector is A Simple PHP and Wordpress Plugin To Protect and Prevent Video Save As From Browser and Some Video Grabber. There is 100% Guaranteed Protection and There might be some tradeoff but If you care about Digital Rights Management of Your Video and Music Content. This Project is for you. Defa Protector 6.7.1 Revamp Code For Better Performance To The Bone. We almost rewritten this project from scratch.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Pechkin

    Pechkin

    lightweight bitmessage client

    Pechkin.v0.3.2 Copyright 2017 Fenenko Aleksandr. Licensed Apache License, Version 2.0; This is lightweight bitmessage client writing in java. Supported platform: Android,Linux,Windows PS: If you liked this programm, buy the author a coffee https://www.buymeacoffee.com/fenenkoG
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    WinAuth 2 Way Authentication

    WinAuth 2 Way Authentication

    Free 2 way Authentication for Windows

    WinAuth is a free 2-way authentication software for Windows. This app adds a second layer of security to your Windows Login screen, which can only be unlocked with your secret password and USB Key or by scanning a barcode on the Android Client. You can download the android client from Google Play (WinAuth Unlock Client). This app works on Windows XP all the to Windows 10. NOTE: The barcode may sometimes fail on windows XP
    Downloads: 12 This Week
    Last Update:
    See Project
  • 17
    Jihosoft Mobile Privacy Eraser

    Jihosoft Mobile Privacy Eraser

    Jihosoft Mobile Privacy Eraser helps you permanently erase all your pr

    Jihosoft Mobile Privacy Eraser allows you to completely erase all sensitive data on your Android devices. You all might face the situation like this: when you replaced a new phone, what should you do with the old one? All the private messages are still there. Format or master reset your phone won’t help you erasing your personal information completely. Data can still be retrieved no matter if you format or reset your smart phone. Horrible isn’t it? That’s why you should use this Android...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18

    PentDroid

    Small tool for apk operations required during android app pentesting

    Tools consist of mini modules which automates and reduces tester efforts for setting up the basic environment and typing long tool queries . For Installation guide refer : https://github.com/vishwaraj/PentDroid/blob/master/README.md
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    PushSharp

    PushSharp

    A server-side library for sending Push Notifications to iOS

    PushSharp is a server-side library for sending Push Notifications to iOS/OSX (APNS), Android/Chrome (GCM/FCM), Windows/Windows Phone, Amazon (ADM) and Blackberry devices! PushSharp v3.0+ is a complete rewrite of the original library, aimed at taking advantage of things like async/await, HttpClient, and generally a better infrastructure using lessons learned from the old code. PushSharp will now follow semver versioning, so major version numbers will go up as there are any breaking API changes...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    MicroZip

    MicroZip

    Create,extract and encrypt ZIP,GZIP,TAR,BZIP2,TAZ files on Java mobile

    MicroZip is a powerful file compression and encryption utility for mobile phones which allows you to create and extract compressed archives in multiple formats and encrypt sensitive information with powerful AES-256 encryption. MicroZip can create and extract ZIP,TAR,TGZ,TBZ2 archives and extract many other formats as JAR,GZ,BZ2,TBZ,WAR,BZIP2,GZIP,Z,TAZ,CBZ etc. MicroZip allows you to extract selected files without extracting the whole ZIP archive. MicroZip also supports encrypted ZIP...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 21
    With this application you can encrypt texts or files and chat with friends. You can download a early Android version of the chat client from here: https://drive.google.com/uc?export=download&id=0BwePHaWdtoMweWRyMExqbHZyUEk Hint: I started this project because i have fun to write java apps. This app is not professional. I don´t recommend using this to encrypt very important data (for example of your company ...). Keep this in mind. Happy testing! ;) Please check MD5 after Download. You can...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    dex2jar

    Tools to work with android .dex and java .class files

    Mirrors: * https://bitbucket.org/pxb1988/dex2jar * https://github.com/pxb1988/dex2jar dex2jar contains following compment * dex-reader is designed to read the Dalvik Executable (.dex/.odex) format. It has a light weight API similar with ASM. * dex-translator is designed to do the convert job. It reads the dex instruction to dex-ir format, after some optimize, convert to ASM format. * dex-ir used by dex-translator, is designed to represent the dex instruction dex-tools tools to work...
    Leader badge
    Downloads: 1,213 This Week
    Last Update:
    See Project
  • 23

    SilverTunnel-NG

    Java library for easy accessing Tor network.

    SilverTunnel-NG is a Java library that implements and encapsulates all the complex network protocol stuff needed for anonymous communication over the Tor anonymity network. SilverTunnel-NG Netlib can be easily integrated in almost every existing and new Java application. The library requires Java 1.6/Java SE 6 or a newer version. This is a fork of silvertunnel (https://silvertunnel.org) Version (0.0.4) is deployed to maven. Since Version 0.0.4 SilverTunnel-NG also runs on Android. YourKit...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Folder Locker

    Folder Locker

    Never let your private data slip again

    Folder Locker keeps those pesky file intruders out of your files or porn collection 😀 Just kidding, but it helps you keep your work and personal files safe and protected. Not only is this the fastest version yet, but it is also a very powerful tool for all computer users.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25

    cSploit

    cSploit - An Android network penetration suite.

    cSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assesments on a mobile device.Once cSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing...
    Downloads: 7 This Week
    Last Update:
    See Project