Showing 2 open source projects for "software testing projects"

View related business solutions
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • 1
    InnoVB .NET Packager

    InnoVB .NET Packager

    Deploy VB.NET applications quick and easy

    InnoVB .NET Packager is the easiest deployment tool for VB.NET applications via Inno Setup. It includes all the Application's dependencies even the COM libraries. Great for hybrid application projects. System Requirements: * .NET Framework 2.0 or later * Windows 2000 or later * 256Mb RAM or higher * 1GHz Processor or higher * Inno Setup 5 or higher NOTICE: Visual Basic .NET is a trademark of Microsoft. Inno Setup is a trademark of Jordan Russel. All trademarks are owned by their...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Vigenere Dictionary Attack

    Vigenere brute force / dictionary cracking tool

    This is a tool that uses a combination between a brute force and dictionary attack on a Vigenere cipher. At present, keys are generated using brute force (will soon try passwords generated from a dictionary first). Each key is then used to decode the encoded message input. The output is analysed and then put into a ranking table. Outputs will be ranked on a variety of factors (at present, only number of dictionary words in output are counted). For the future: Better key generation,...
    Downloads: 5 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next