Showing 90 open source projects for "settings"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 1
    VenSafe

    VenSafe

    Free, secure, customizable and the best folder locker software!

    ...This version is far more secure comes with all kinds of bugs, bypasses and cheats fixed. The password can no longer be edited by others from outside. Everything's in the Settings. It's impossible to crack through your folder once it's locked. In case you forget you VenSafe password, you can request for a recovery mail or display it on screen after a small process of Security questions. You can setup your recovery mail in the settings and get the VenSafe password. In case of entry of an incorrect password, it gets stored in the logs and the logs are sent to your mail immediately, if opted so in the settings. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Aegis Implicit Mail (AIM)

    Aegis Implicit Mail (AIM)

    Send Mime and Smime Emails to Any Type of Mail Server

    Aegis Implicit Mail is a free and open source library which is designed to provide fast and developer friendly API to send emails using SMTP ports. Binaries are available in the form of NuGet package: https://www.nuget.org/packages/AIM Please check http://pki.tools/aim.html as well AIM Supports : * None Ssl Mails * Implicit Ssl Mails * Explicit Ssl Mails * Smtp Connection test * Detect Ssl type of mail server * Attachments for MIME and S/MIME message. * In-line attachment...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Firefly

    Firefly

    A proxy software to help circumventing the Great Firewall

    Firefly is an agent used to access Great Firewall (GFW) blocked websites and applications. Under the default settings, Firefly only goes through VPN forwarding wall of IP traffic, IP wall straight. If you find a website or application you cannot access, Firefly flow mechanism can be built to distinguish between an error. In this case, you can choose to forward all traffic through the VPN, and then try again.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    UnSpam Me

    Unsubscirbes from newsletters, mailing lists and so on.

    ...If it's an eMail address, an unsubscription mail will be sent. To get the server details, please contact your mail provider. Examples: Google Mail: https://www.lifewire.com/what-are-the-gmail-smtp-settings-1170854 GMX: https://www.pop3-imap-smtp.de/gmx/ Web.de: https://hilfe.web.de/pop-imap/imap/imap-serverdaten.html Please note: some providers do block mass sending of mails. In that case, please run the program several times, deleting all mails you dont want to be processed each time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 5

    rlink

    ssh-tunnel instead vpn in one exe

    Create ssh-tunnel, run another programm and store settings in self. It is easier than to create a vpn and write instructions for the users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Evilgrade

    Evilgrade

    Framework that allows the user to take advantage of implementations

    ...It comes with pre-made binaries (agents), a working default configuration for fast pentests, and has it's own WebServer and DNSServer modules. Easy to set up new settings, and has an autoconfiguration when new binary agents are set. Evilgrade works with modules, in each module there's an implemented structure which is needed to emulate a fake update for an specific application/system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    OMEN

    OMEN

    OMEN: Ordered Markov ENumerator - Password Guesser

    ...Based on these probabilities enumNG enumerates new passwords in the correct order (descending). Before one can generate any passwords, the n-gram probabilities have to be estimated using createNG. To calculate the probabilities using the default settings, createNG must be called giving a path to a password list that should be trained.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    Advanced Onion Router
    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and...
    Leader badge
    Downloads: 117 This Week
    Last Update:
    See Project
  • 9
    SWF Investigator

    SWF Investigator

    Adobe SWF Investigator enables full analysis of SWF applications.

    ...From a static perspective, you can disassemble ActionScript 2 (AS2) and ActionScript 3 (AS3) SWFs, view SWF tags and make binary changes to SWF files.  SWF Investigator also lets you view associated information, including local shared objects (LSOs) and per site settings. From a dynamic perspective, you can call functions within the SWF, load the SWF in various contexts, communicate via local connections and send messages to Action Message Format (AMF) endpoints. SWF Investigator contains an extensible fuzzer for SWF applications and AMF services, so you can search for common Web application attacks. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 10
    Dont Hijack This

    Dont Hijack This

    DHT is an anti-hacker tool to fix all the damage caused by viruses.

    ...Fixes: registry editing has been disabled by administrator Task Manger has been disabled by your administrator Windows defender is turned off by group policy proxy settings hijack virus (unable to connect proxy server) unable to install antivirus and antivirus killer windows firewall disabled action center or security center disabled. safe mode hijacked and disabled remove fake or rogue antivirus/anti spyware Unknown viruses and worms +more Coming soon: Anti Rootkit Anti Adware (improved) Stealth Process Viewer
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    Oryon OSINT Browser

    Oryon OSINT Browser

    Portable Open Source Intelligence (OSINT) Web Browser

    ...Oryon comes with dozens of pre-installed tools and a selected set of links cataloged by category. To safely use all Oryon Browser options, it is recommended that you take the following steps: 1. Check your browser privacy settings. Reset all settings if necessary or make the necessary changes. 2. Disable browsing history (extension: History On / Off) 3. Enable free proxy (extension: Hotspot Shield Free VPN Proxy) 4. Create a dedicated gmail account 5. Create dedicated accounts on Facebook and Twitter 6. Take a look at the collection of links 7. Check out the Oryon Tools bookmarklet 8. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12

    PyPassGen

    Simple password generator

    Generates passwords choosing random symbols from the set user specified in the settings.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Mouse Lock

    Mouse Lock

    Locks your computer and see if anyone was trying to guess the password

    Feel like locking your mouse when you are away? Well... you can! Mouse Lock dims your desktop (or set to solid black background) while sucking your mouse cursor to the centre of the screen! The password window also acts like an inescapable mouse trap. Neat! (No mouse is harmed during the production of this software.) If you encounter any bugs, please contact me at wongchoonjie (at) gmail (dot) com. If you really like Mouse Lock, please consider donating ;)...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14
    Satellizer

    Satellizer

    Token-based AngularJS authentication

    Satellizer is a simple to use, end-to-end, token-based authentication module for AngularJS with built-in support for Google, Facebook, LinkedIn, Twitter, Instagram, GitHub, Bitbucket, Yahoo, Twitch, Microsoft (Windows Live) OAuth providers, as well as Email and Password sign-in. However, you are not limited to the sign-in options above, in fact you can add any OAuth 1.0 or OAuth 2.0 provider by passing provider-specific information in the app config block. With any Cordova mobile apps or any...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    cryptomac

    cryptomac

    macchanger automate script

    Automating macchanger tasks for my friend 'crypt0_buf' sutch as: change mac address, set TX-Power, code region settings, signal strength, set network-manager cloned mac address, Build/delete cryptostart init.d startup entry, use arpon software to prevent arp poison attacks (MitM)... WARNING: this script needs the 'startup.txt' file to build cryptostart init.d startup entry (script auto-start)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    KeeSAPLogon

    KeeSAPLogon

    Plugin for KeePass Password Safe to logon on SAP systems

    ...Language and Transaction can be defined as default for all logons using the plugin configuration dialog. Make sure the "SAP Logon" column will be displayed, see KeePass settings. Note: SAP GUI must be installed and the path to sapshcut.exe (part of SAP GUI for Windows) must be configured by using the plugin config dialog. Prerequisites: - Windows 32/64bit - KeePass 2.29 or newer - SAP GUI 7.30 or newer
    Leader badge
    Downloads: 29 This Week
    Last Update:
    See Project
  • 17
    PAVS

    PAVS

    PHP Application Vulnerability Scanner

    PAVS scans the PHP based web application source code and identifies the potential security problems in that application. PAVS also identifies the loop holes in PHP configuration file settings. Attacks addressed by PAVS are Cross-site Scripting SQL Injection File Manipulation File Inclusion Command Execution Code Evaluation
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    NCrypted

    NCrypted - simple file encryption software with GPU support

    NCrypted is a simple file encryption software. It is implemented on top of AES 128-bit algorithm. This software was designed to be as simple as possible, so you won't find any fancy, flashy gui elements or complicated advanced options. You can also use it directly from command line. NCrypted can automatically detect and take advantage of your NVidia graphics card to speed up the file processing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    WinLockPro

    WinLockPro

    Windows 8 Screen Lock and Powerful Security Solution for Windows 7

    What does WinlockPro do? Brings the entire Windows 10 metro theme across all versions of windows(XP and above) Proprietary password encryption technology Flash Drive Unlock! View login attempts that have occurred Sends you an email if many failed attempts occur Shuts down the computer if multiple failed attempts occur Desktop widget which can be used to easily control all aspects of the software Ability to leave notes on the Lock Screen interface Extremely simple to use Almost...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    sha3sum and then some

    sha3sum - A demonstration of the Keccak permutation.

    Hash mode interface to the Keccak code package. This program illustrates the use of the Keccak permutation. Usage is much more than a hash function. The NIST compatible settings are subject to change when they publish FIPS PUB 180-5. I wrote this program when evaluating the permutation and developing tree hashing for the Intel(R) MIC architecture.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    House Party Protocol

    House Party Protocol

    an ultimate evidence wiper

    ...*Usage* - You need to have a hosting account which can run php scripts (you can register for a free one) Change the $password section in base.php and upload it to your hosting with command.txt file -Collect your evidence files into one folder. Click "Select Directory" button and select this folder. -Paste your command.txt's url to url section (http://yourwebsite.com/command.txt) -Fill the other settings field -Press "Save Settings" button -When you click "Connect" button, the program starts to check command.txt file for every 60seconds. If you give the command, program will start to wipe your target folder.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Locker Password Manager

    Locker Password Manager

    Simple password manager

    Locker Password Manager allows you to save and protect email and web accounts, as well as personal notes. The application has a simple design and you will not spend too much time clicking on different options and making various settings.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    O2

    O2

    A new way to store and organize your personal data.

    O2 is a safe and flexible archive for personal data, such as contacts, accounts, credit cards, Wi-Fi settings, and everything that comes to your mind.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Browser for Tor with Onion Router

    Browser for Tor with Onion Router

    Browser for Tor based on Dooble & Vidalia as integrated Addon

    Tor now plugs into the Browser. Dooble Web Browser, a secure open source userfriendly tool to explore the web secure over Tor. Steer Tor in the Browser (in Settings/Proxy/Tor) with an Add-On based on Vidalia. Just start the Add-On "Tor" in the Browser Add-On-Menu and in Settings/Proxy.
    Downloads: 41 This Week
    Last Update:
    See Project
  • 25
    Search Me

    Search Me

    Rich search software for Microsoft windows

    Search Me v1.2.0 ___ 12/10/2014 Search Me software is a windows search utility that let the user find what she/he wants fast. You can customize your search. You can select the size limit, file attribute, and/or file date. .NET 4 is required If you have any questions, feedback, or you want to report a but don't forget to contact me from help menu.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB