Showing 15 open source projects for "fake"

View related business solutions
  • Tigerpaw One | Business Automation Software for SMBs Icon
    Tigerpaw One | Business Automation Software for SMBs

    Fed up with not having the time, money and resources to grow your business?

    The only software you need to increase cash flow, optimize resource utilization, and take control of your assets and inventory.
  • Eptura Workplace Software Icon
    Eptura Workplace Software

    From desk booking and visitor management, to space planning and office utilization data, Eptura Workplace helps your entire organization work smarter.

    With the world of work changed forever, it’s essential to manage your workplace and assets together to effectively create a high-performing environment. The Eptura experience combines the power of workplace management software with asset management, enabling you to effectively operate your building and facilitate hybrid work.
  • 1
    smtp4dev

    smtp4dev

    The fake smtp email server for development and testing

    smtp4dev - the fake SMTP email server for development and testing. A dummy SMTP server for Windows, Linux, Mac OS-X (and maybe elsewhere where .NET Core is available). Lets you test your application without spamming your real customers.
    Downloads: 31 This Week
    Last Update:
    See Project
  • 2
    airgeddon

    airgeddon

    This is a multi-use bash script for Linux systems

    .... Offline password decrypting on WPA/WPA2 captured files for personal networks (Handshakes and PMKIDs) using a dictionary, brute-force, and rule-based attacks with aircrack, crunch and hashcat tools. Enterprise networks captured password decrypting based on john the ripper, crunch, asleap and hashcat tools. GPU support available for hashcat. Only Rogue/Fake AP mode to sniff using external sniffer (Hostapd + DHCP + DoS).
    Downloads: 52 This Week
    Last Update:
    See Project
  • 3
    wslu

    wslu

    A collection of utilities for Windows 10 Linux Subsystems

    ... information tool to print information in an elegant way. A fake WSL browser that can help you open links in the default Windows browser or open files on Windows. A set of quick actions for WSL such as quickly mounting all drives or manually syncing time between Windows and WSL. And much more.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    KWOK

    KWOK

    Kubernetes WithOut Kubelet - Simulates thousands of Nodes and Clusters

    KWOK is a toolkit that enables setting up a cluster of thousands of Nodes in seconds. Under the scene, all Nodes are simulated to behave like real ones, so the overall approach employs a pretty low resource footprint that you can easily play around with on your laptop.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Claims Processing solution for healthcare practitioners. Icon
    Claims Processing solution for healthcare practitioners.

    Very easy to use for medical, dental and therapy offices.

    Speedy Claims became the top CMS-1500 Software by providing the best customer service imaginable to our thousands of clients all over America. Medical billing isn't the kind of thing most people get excited about - it is just a tedious task you have to do. But while it will never be a fun task, it doesn't have to be as difficult or time consumimg as it is now. With Speedy Claims CMS-1500 software you can get the job done quickly and easily, allowing you to focus on the things you love about your job, like helping patients. With a simple interface, powerful features to eliminate repetitive work, and unrivaled customer support, it's simply the best HCFA 1500 software available on the market. A powerful built-in error checking helps ensure your HCFA 1500 form is complete and correctly filled out, preventing CMS-1500 claims from being denied.
  • 5
    Cutieys Fake PW Stealer

    Cutieys Fake PW Stealer

    Fake Password Stealer thats primarily meant to trick terrible people

    The main purpose of this is to trick those that actually attempt to steal peoples passwords and login(s) against the; Computer Fraud and Abuse Act (CFAA) Stored Communications Act (SCA) Electronic Communications Privacy Act (ECPA) And is based off of batch functions converted into an exe that essentially looks like an authentic Oauth2 password stealer, but in reality creates about a thousand empty folders on the desktop changes the BG and restarts the pc, adding the exe to the startup...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Rescatux

    Rescatux

    Easy to use Repair distribution for both Gnu/Linux and Windows systems

    Rescatux is a GNU/Linux repair cd (and eventually also Windows) but it is not like other rescue disks. Rescatux comes with Rescapp. Rescapp is a nice wizard that will guide you through your rescue and repair tasks. When the wizard is not able to solve your problem you can also enjoy of Rescatux unique support features: * Chat: Open the chat for asking help directly in Rescatux channel. * Share log: After running an option you can share its log (the action registry that it has done) so...
    Leader badge
    Downloads: 1,348 This Week
    Last Update:
    See Project
  • 7
    OHHTTPStubs

    OHHTTPStubs

    Stub your network requests easily!

    OHHTTPStubs is a library designed to stub your network requests very easily. It can help you test your apps with fake network data (stubbed from file) and simulate slow networks, to check your application behavior in bad network conditions, and write unit tests that use fake network data from your fixtures. OHHTTPStubs headers are fully documented using Appledoc-like / Headerdoc-like comments in the header files. Instead of writing the content of the stubs you want to use manually, you can use...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Scrollout F1

    Scrollout F1

    An easy-to-use anti-spam email gateway

    • Designed for Linux and Windows email system administrators, Scrollout F1 is an easy to use, already adjusted email firewall (gateway) offering free anti-spam and anti-virus protection aiming to secure existing email servers, old or new, such as Microsoft Exchange, Lotus Domino, Postfix, Exim, Sendmail, Qmail and others. • Built-in multilayer security levels make configuration effort equal to a car radio. • It combines simplicity with effective protection using powerful open source...
    Leader badge
    Downloads: 148,576 This Week
    Last Update:
    See Project
  • 9
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The...
    Leader badge
    Downloads: 7 This Week
    Last Update:
    See Project
  • Powerful small business accounting software Icon
    Powerful small business accounting software

    For small businesses looking for desktop accounting software

    With AccountEdge, business owners can organize, process, and report on their financial information so they can focus on their business. Features include: accounting, integrated payroll, sales and purchases, contact management, inventory tracking, time billing, and more.
  • 10
    360-FAAR  Firewall Analysis Audit Repair

    360-FAAR Firewall Analysis Audit Repair

    360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs

    360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, firewall policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA or ScreenOS commands, and its one file! Read Policy and Logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), Cisco ASA (show run / syslog format), 360-FAAR compares firewall policies and uses...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 11
    Advanced Onion Router
    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options...
    Leader badge
    Downloads: 183 This Week
    Last Update:
    See Project
  • 12
    Tech Support Scammer Fake Command Prompt

    Tech Support Scammer Fake Command Prompt

    Fake command prompt to fool tech support scammers

    For instructions on how to use, see this file: https://sourceforge.net/projects/techsupportcmd/files/How%20To%20Use.pdf/download This fake command prompt can be used instead of the real windows command prompt in order to waste the tech support scammers time. It is based upon the windows 7 command prompt, but is not noticeably different from the command prompt in most other windows versions. Many commands commonly used by scammers, such as tree, netstat and powercfg are emulated...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    Tech Support Scammer Fake Run Dialogue

    Tech Support Scammer Fake Run Dialogue

    Fake run dialogue that is designed to confuse tech support scammers

    This fake run dialogue can be used instead of the real windows run dialogue in order to waste the tech support scammers time and confuse them. It is based upon the windows 7 run dialogue, but is not noticeably different from the run dialogue in most other windows versions when not side by side. Many commands commonly used by scammers, such as cmd, msconfig and eventvwr are handled by this, but they provide results that the scammer would not be expecting, for example, the eventvwr command...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    File Size Changer

    File Size Changer

    Increase the Size of File without corrupting it

    Using this small tool, you could actually fake a file size to any limit, keeping the file uncurropted and usable just as it in normal form. In Short - It Increases the size without damaging the file. Warning: If you try to 'decrease' the file size, you may lose the contents of the file but this is NOT the case while increasing the file size
    Downloads: 31 This Week
    Last Update:
    See Project
  • 15

    Windows Genuine Advantage Remover

    Remove/uninstall Windows Genuine Advantage

    The aim of the (NSIS) application is to remove/uninstall Windows Genuine Advantage from the system. This operation is legit and supported by Microsoft http://support.microsoft.com/kb/921914/en-us ------------------------------------------------------------- In the src package you can also find a simple fake WGA that can be used to test the Windows Genuine Avantage Remover
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next