Showing 3 open source projects for "proxy%20games"

View related business solutions
  • Vibes don’t ship, Retool does Icon
    Vibes don’t ship, Retool does

    Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.

    Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
    Build apps that ship
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 1
     Abdal SSH BruteForce

    Abdal SSH BruteForce

    powerful SSH BruteForce tool

    Abdal SSH BruteForce tool is a powerful software with zero error rate to test the intrusion of servers that work with ssh protocol, this tool supports proxy for attacks and can transfer all your traffic in the hacking process to the proxy Slowly
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    SeleniumBasicAuthWrapper

    Basic Auth wrapper for Selenium Webdriver.NET

    Wrapper for Selenium and Coypu for Basic Authentication utilizing the BrowserMob Proxy. This package will automatically install the Correct version of the BrowserMob Proxy at runtime if needed. -- We are on NuGet. Just input the following command in your package manager: "Install-Package SeleniumBasicAuthenticationWrapper"
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    The DBC framework uses reflection to inspect a type, it then generates source for a proxy object containing checks on predicates in attributes attached to members of the type. Proxy code is compiled into an in-mem assembly used to enforce DBC rules.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next