Showing 47 open source projects for "secret files"

View related business solutions
  • Network Performance Monitoring | Statseeker Icon
    Network Performance Monitoring | Statseeker

    Statseeker is a powerful network performance monitoring solution for businesses

    Using just a single server or virtual machine, Statseeker can be up and running within minutes, and discovering your entire network in less than an hour, without any significant effect on your bandwidth availability.
  • Real Time Accounts Payable Automation. Icon
    Real Time Accounts Payable Automation.

    Invoice capture and automation seamlessly integrated with your accounting software

    Yooz provides the smartest, most powerful, and easiest-to-use cloud-based E-invoicing and Purchase-to-Pay automation solution. It delivers unmatched savings, speed, and security with affordable zero-risk subscriptions to more than 5,000 customers and 300,000 users worldwide.
  • 1
    git-secret

    git-secret

    A bash-tool to store your private data inside a git repository

    There’s a well-known issue with deploying and configuring software on servers: generally, you have to store your private data (such as database passwords, application secret-keys, OAuth secret keys, etc) outside of the git repository. If you do choose to store these secrets unencrypted in your git repo, even if the repository is private, it is a security risk to copy the secrets everywhere you check out your repo. These files are not version controlled. Filenames, locations, and passwords...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    electerm

    electerm

    Terminal/SSH/SFTP client (Linux, Mac, Win)

    electerm is a terminal/ssh/sftp client (Linux, Mac, Win) based on electron/ssh2/node-pty/xterm/antd/subx and many other libs. Works as a terminal/file manager or ssh/sftp client (similar to xshell). Global hotkey to toggle window visibility (similar to guake, default is ctrl + 2) Multi platform (Linux, Mac, Win). Multi-language support (electerm-locales, contributions/fixes welcome) Double click to directly edit (small) remote files. Edit (small) local files with built-in editor. Auth...
    Downloads: 489 This Week
    Last Update:
    See Project
  • 3
    Harmony

    Harmony

    Patching, replacing and decorating .NET and Mono methods

    Harmony gives you an elegant and high-level way to alter the functionality in applications written in C#. It works great in games and is well established in titles like 7 Days To Die, BattleTech, Besiege, Cities:Skylines, Kerbal Space Program, Oxygen Not Included, Ravenfield, Rimworld, Sheltered, Stardew Valley, Staxel, Subnautica, The Ultimate Nerd Game, Total Miner, Unturned, SCP: Secret Laboratory and many more. If you develop in C# and your code is loaded as a module/plugin into a host...
    Downloads: 28 This Week
    Last Update:
    See Project
  • 4
    SimpleX

    SimpleX

    The first messaging platform operating without user identifiers

    Other apps have user IDs: Signal, Matrix, Session, Briar, Jami, Cwtch, etc. SimpleX does not, not even random numbers. This radically improves your privacy. The video shows how you connect to your friend via their 1-time QR-code, in person or via a video link. You can also connect by sharing an invitation link. Temporary anonymous pairwise identifiers SimpleX uses temporary anonymous pairwise addresses and credentials for each user contact or group member. It allows to deliver messages...
    Downloads: 15 This Week
    Last Update:
    See Project
  • Create and run cloud-based virtual machines. Icon
    Create and run cloud-based virtual machines.

    Secure and customizable compute service that lets you create and run virtual machines on Google’s infrastructure.

    Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
  • 5
    Gitleaks

    Gitleaks

    Protect and discover secrets using Gitleaks

    Gitleaks is a fast, lightweight, portable, and open-source secret scanner for git repositories, files, and directories. With over 6.8 million docker downloads, 11.2k GitHub stars, 1.7 million GitHub Downloads, thousands of weekly clones, and over 400k homebrew installs, gitleaks is the most trusted secret scanner among security professionals, enterprises, and developers. Gitleaks-Action is our official GitHub Action. You can use it to automatically run a gitleaks scan on all your team's pull...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    MadelineProto

    MadelineProto

    Async PHP client/server API for the telegram MTProto protocol

    ... file id/object support (even for users)! A Lua binding, a lua wrapper for td-cli scripts, Secret chats, MTProto 2.0, PFS, PFS in secret chats. MadelineProto can do everything official clients can do, and more! MadelineProto requires the mbstring, xml, json, fileinfo, gmp extensions to function properly.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    helm-secrets

    helm-secrets

    A helm plugin that help manage secrets with Git workflow

    A helm plugin that help manage secrets with Git workflow and store them anywhere.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    transfer.sh

    transfer.sh

    Easy and fast file sharing from the command-line

    Easy and fast file sharing from the command-line. This code contains the server with everything you need to create your own instance. Transfer.sh currently supports the s3 (Amazon S3), gdrive (Google Drive), storj (Storj) providers, and local file system (local). For easy deployment, we've created a Docker container. For the usage with a AWS S3 Bucket, you just need to specify the following options, provider, aws-access-key, aws-secret-key, bucket, and s3-region. If you specify the s3-region...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    pass import

    pass import

    A pass extension for importing data from most existing password

    A pass extension for importing data from most existing password managers. Password management should be simple and follow Unix philosophy. With pass, each password lives inside of a gpg encrypted file whose filename is the title of the website or resource that requires the password. These encrypted files may be organized into meaningful folder hierarchies, copied from computer to computer, and, in general, manipulated using standard command line file management utilities.
    Downloads: 1 This Week
    Last Update:
    See Project
  • High-performance Open Source API Gateway Icon
    High-performance Open Source API Gateway

    KrakenD is a stateless, distributed, high-performance API Gateway that helps you effortlessly adopt microservices

    KrakenD is a high-performance API Gateway optimized for resource efficiency, capable of managing 70,000 requests per second on a single instance. The stateless architecture allows for straightforward, linear scalability, eliminating the need for complex coordination or database maintenance.
  • 10
    Kapitan

    Kapitan

    Generic templated configuration management for Kubernetes

    ... capabilities, and native secret management tools offer granular control, fostering consistency, reducing errors, and safeguarding sensitive data. Empower your team to make changes to your infrastructure whilst maintaining full control, with a GitOps approach and full transparency.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Themis

    Themis

    Easy to use cryptographic framework for data protection

    ... files to database records. Use Secure Cell to encrypt data at rest. Secure Cell is built around AES-256-GCM, and AES-256-CTR. Secure Message is a simple encrypted messaging solution for the widest scope of applications. Use Secure Message to send encrypted and signed data from one user to another, from client to server, to prevent MITM attacks and avoid single secret leakage. Based on ECC + ECDSA / RSA + PSS + PKCS#7.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Password Pusher

    Password Pusher

    An application to securely communicate passwords over the web

    Give your users the tools to be secure by default. Password Pusher is an open source application to communicate passwords over the web. Links to passwords expire after a certain number of views and/or time has passed. Only enter a password into the box. Other identifying information can compromise security. All passwords are encrypted prior to storage and are available to only those with the secret link. Once expired, encrypted passwords are unequivocally deleted from the database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    RistaScientificCalculator

    RistaScientificCalculator

    Rista Scientific Calculator is a app calculator and converter

    Privacy of Rista Scientific Calculator is a free windows offline app. It has no scope of sharing and collecting any personal / intuitional information. It never asks for any personal data or private secret information either in online or offline mode. It has no scope for any social, regional , political, medical, sexual and student harming. It has not any scope to promote personal, financial or advertisement . rscalcsetup is a vb.net app of scientific calculator and converter...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Automated_Quiz

    Automated_Quiz

    A Shell Script for Quizzing the whole class of students and log result

    Please download the above zip file and extract it to a secret folder and run the quiz.sh script from that folder in your terminal program, as shown in the youtube videos : https://youtu.be/kQi0XlIaT9M and https://youtu.be/prwKN5DiFp0 You may change the contents of the quiz.txt file to your liking, while maintaining the format of it. Note: Press Enter/Return key after typing on your Terminal, to proceed to the next step, while testing the quiz.sh script. Also, increase the terminal font...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    colating

    A general human language

    ...音乐音节。 • The secret of Latin words 拉丁语单词的秘密 https://sourceforge.net/projects/colating/files/c-manual/ How to design the latin words system? See here: Update: 2021/10/10: R4-5 →1 https://sourceforge.net/projects/colating/files/c-manual/Colating-Language-Periodical-Capriccio-2021.pdf/ http://www.colating.win https://colating.win < 全功能网址 https://colating.github.io < 部分功能网址 https://colating.sourceforge.io https://sourceforge.net/p/colating/blog Email: colating@yandex.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    TNT Windows Countdown

    TNT Windows Countdown

    Shutdown PC, Log Off System Account, Start or Close Any File.

    Nice and Harmless Countdown with a slightly bizarre design, recalling the idea of the "TNT" dynamites used in the cartoon series of the 50s-60s by Wile E. Coyote. In the Secret Sub-Menu, after having entered the password, in default "000000", we find various settings to be used individually or together. Its Purpose is simple, make a Joke a Friend on his PC or Shutdown of Windows or Log-Out of PC. Moreover can Starting any Files or Processes: Images, Videos or Exec, Trying NOT to be too BAD...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Secret Bian

    Secret Bian

    Similar as board game Secret Hitler

    Secret Bian and Secret Trump are the game similar as board game Secret Hitler. It's local game with single human player and 9 computer AI player. All display characters are English for Secret Trump. All display font is Traditional Chinese for Secret Bian. This game is coded with python 3 and pygame. Latest code in GitLab. There are the English and Chinese README.txt described game rule for Secret Trump. You can download Trump version (secret trump) in: https://sourceforge.net/projects...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    cmb1ne

    cmb1ne

    Software to encrypt your Files or combine a secret file to another.

    WARNING -------------------------------------------------------------------------------------------------- The antivirus software will detect a trojan, but there is no danger. In order to be able to use the software, allow the program in your antivirus program. -------------------------------------------------------------------------------------------------- Software to encrypt your Files or combine a secret file to another Icon by Adioma
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Gradle Libraries Plugin

    Gradle Libraries Plugin

    This plugin allows to specify versions of external libraries

    ... by manually creating it, all declared in dependencies.json libraries can be used in project files. It's not a secret that it's really hard to keep libraries up to date especially when there are dozens and sometimes hundreds of them. For that purpose, this plugin has update libraries task that will automatically check for available new versions of libraries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Secret File

    Secret File

    File Encryption/Decryption using password

    Secret File is a free and easy to use encryption/decryption app that can encrypt nearly any kind of file format using passwords. Files can be stored as personal or sent over the internet as confidential as the data of files are securely encrypted at the binary level itself and can be decrypted at any time and anywhere. You can also use multi-level protection for more secureness.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 21
    Secure File Vault

    Secure File Vault

    A very secure file vault for private files to avoid hackers

    A File vault to store all of your personal items, this file vault could not be brute forced (impossible because of the hashing algorithms). It uses a combination of veracrypt, winrar, 7zip to encrypt your files to ensure that they are secure and not be seen by someone. Once you start to create the file vault, your password gets hashed a million times (only takes 3 seconds) then base 64 3 times and hashed 1 more time, it uses a combination of SHA256, SHA512 and lot of other secret...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Stegano.Net

    Stegano.Net

    Image Steganography for Windows

    Stegano.Net is free Steganography Tool for Windows. It hides texts/files/data in images. The secret data can be unveiled from the Images afterwards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    file for secret of 8

    A secret lies in these files, only smart ones find it.

    For everybody that participates in the VOLTE 2019. This is a file that will start your adventure. It is the anti-lag version. Download it, then change it's extension until you find something else... Hey, not saying your not smart but ... eh.... GOOD LUCK! It is almost impossible to win... :|
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Machinehead

    Machinehead

    Application manager that deploys and maintains set of compose projects

    A docker-compose application manager that deploys and maintains a set of compose projects and provides secret management for them via Vault. Machinehead is designed for single-server hobbyists who want to make use of containers and modern GitOps practices but can't since most of the tools (such as kube-applier) focus on cluster technology such as Swarm and Kubernetes. In addition to this lack of tooling, managing sensitive secrets such as database credentials on single-server deployments...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    Redditt-Cyphers

    Cyphers , Encoders , Data Encryption , Encryption

    Secret message cyphers. Writen in FNXBasic. It breaks your message into blocks of 1024 bits. It then generates a garbage block of 4096 bits. It then scrambles the message bits into the garbage bits at lacation 1 to 4096. It then takes the output in chunks of 4 bits, and substitutes them wth an alphabetical character. You can cypher a message any number of times with the same or different keys. To create a 3 lock box where 3 people have to decypher the thing in a specific order...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next