Showing 13 open source projects for "ransomware"

View related business solutions
  • anny is an all-in-one platform for managing hybrid workplaces and shared resources. Icon
    anny is an all-in-one platform for managing hybrid workplaces and shared resources.

    For Businesses looking for a flexible solution for internal and external bookings

    Enable your employees to easily book desks, meeting rooms, parking spots, equipment, and more – all in one place. With flexible rules and group permissions, you stay in full control of who can access what.
    Learn More
  • PageDNA: Web-to-Print eCommerce Software Icon
    PageDNA: Web-to-Print eCommerce Software

    eCommerce for Print, Signs and Fulfillment Trusted by In‑Plants and Commercial Print Leaders

    PageDNA enables successful eCommerce strategies for commercial print sales organizations, internal print shops, and brand owners. PageDNA’s online ordering platform increases print volume while decreasing touch costs for all stakeholders: clientele, print operations, and the organizations they support.
    Learn More
  • 1

    RansomWare

    This tools implements a RansomWare (cryptolocker, exfiltration, ...).

    This tools implements a RansomWare (cryptolocker, data exfiltration, ransomnote, ...).
    Downloads: 28 This Week
    Last Update:
    See Project
  • 2
    Vorta Backup Client

    Vorta Backup Client

    Desktop Backup Client for Borg Backup

    Vorta is a backup client for macOS and Linux desktops. It integrates the mighty Borg Backup with your favorite desktop environment to protect your data from disk failure, ransomware and theft.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Live-Forensicator

    Live-Forensicator

    A suite of Tools to aid Incidence Response and Live Forensics

    Live-Forensicator is a toolkit intended for live forensic collection and initial triage on Windows machines. It automates the capture of volatile information—running processes, network connections, loaded drivers, account sessions, and in-memory artifacts—into a consistent artifact set that investigators can analyze offline. The tool tries to be non-invasive while collecting sensitive data quickly and logs the collection steps to preserve chain-of-custody details and to help auditors...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    Sanoid

    Sanoid

    These are policy-driven snapshot management and replication tools

    Sanoid is a policy-driven snapshot management system for ZFS that automates creation, rotation, and health checks of snapshots across datasets. You describe retention in human terms—hourly, daily, monthly, yearly—via simple templates, and Sanoid enforces those rules consistently without manual cron gymnastics. It sets and respects ZFS properties, places holds to protect in-use snapshots, and surfaces health issues so you notice problems before recovery time. Paired with its sibling syncoid,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Job Evaluation and Talent Management Software Icon
    Job Evaluation and Talent Management Software

    For human resources departments in search of a tool to manage time, expenses, leave, documents, recruitment, and onboarding

    Encompassing Visions (ENCV), industry-leading job evaluation and pay equity software, is the best choice for organizations requiring transparent, comprehensive, and objective Job Evaluation software designed to help them ensure equal pay for work of equal value.
    Learn More
  • 5

    hdom_access

    receive an email when a file is accessed or modified on linux-unix

    receive an email or done a command when a file is accessed or modified or renamed or erased on linux, watch your files access, secure your workstation against viruses and ransomware
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    zpaqfranz

    zpaqfranz

    Zpaq compatible archiver for Win, Linux, Free/OpenBSD, Solaris & MacOS

    ...Get forever storage of your files, managing critical backups with bulletproof archival solutions and enterprise-grade reliability Far more efficient than Time Machine or ZFS snapshots-perfect for VM backups and permanent archiving, effortlessly handling TBs and millions of files Optimized for cloud/NAS/USB with ultra-low bandwidth, military-grade encryption, and 1GB/s+ speeds on modern hardware GUI (Win/Linux/Mac) https://sourceforge.net/projects/catpaq Why choose catpaq/zpaqfranz? ✓ Complete: single/multi-file storage architecture ✓ Modern: SHA-2, SHA-3, BLAKE3, XXH3 and more ✓ Paranoid: anti-ransomware data verification with integrity checks ✓ Runs everywhere: TrueNAS, ARM-powered, even ESXi ✓ Lightning-fast: multi-core processing + hardware acceleration ✓ Deduplicated disk imaging ✓ Battle-tested: 15+ years of active development since 2009 https://github.com/fcorbelli/zpaqfranz https://www.francocorbelli.it/zpaqfranz 100% FOSS • forever free
    Downloads: 46 This Week
    Last Update:
    See Project
  • 7
    GobLin GNU/Linux

    GobLin GNU/Linux

    GobLin: The GNU/Linux Operating System for Governments

    “GobLin is The Linux for Governments”. A customized distribution of the GNU/Linux operating system, adapted to the requirements of public administration. It is designed under the Free Software Philosophy, and open to be adapted in order to cover every level of public administration. With the vision of endowing the government offices with advanced management tools and software, we created a distribution of the GNU/Linux Operating System, adapted to the requirements of a modern...
    Downloads: 29 This Week
    Last Update:
    See Project
  • 8
    Anti_ransomware
    𝗢𝗽𝗲𝗿𝗮𝘁𝗶𝘃𝗲 𝘀𝗶𝘀𝘁𝗲𝗺 / 𝘇𝗲𝗿𝗼𝗱𝗮𝘆 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 _ Contains advanced security within the kernel, denying use of user memory not allowing user identification / This security allows to stop ransomware attacks _ ! Remove memory / wipe user-space and kernel after system shutdown * Browse anonymously without leaving a trace / tor / privoxy > Sign all operating system and boot verification . Integrity Measurement Architecture _ Subsystem is responsible for calculating the hashes of files and programs before they are loaded - / integrates new security, blacklist and secure boot smack , 𝗡𝗲𝘄 𝗩𝗲𝗿𝘀𝗶𝗼𝗻 : Faster loading, app update, full system in sandbox # / Live password : live - Some apparmor profiles / Credits / Alexandre Pujol .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Compare Backup Drive Hashes

    A spreadsheet to aid in detecting ransomware-corrupted files

    ...For example, the files on an up-to-date data drive may be compared against the files previously found on that data drive, or on a backup drive. Identifying changed files may be useful as a precaution against ransomware. The Support tab (above) links to a blog post discussing uses of the spreadsheet for that purpose. See also https://raywoodcockslatest.wordpress.com/2022/04/10/ransomware-spreadsheet/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Simplify your short-term rental business with our Channel Manager Icon
    Simplify your short-term rental business with our Channel Manager

    Boost your vacation rental revenue

    Manage your vacation rental like a pro with features that streamline, sync and simplify - all from one intuitive software.
    Learn More
  • 10
    Shennina

    Shennina

    Automating Host Exploitation with AI

    Shennina is an automated host exploitation framework. The mission of the project is to fully automate the scanning, vulnerability scanning/analysis, and exploitation using Artificial Intelligence. Shennina is integrated with Metasploit and Nmap for performing the attacks, as well as being integrated with an in-house Command-and-Control Server for exfiltrating data from compromised machines automatically. Shennina scans a set of input targets for available network services, uses its AI engine...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    DBRECOVER for MySQL

    repair corrupt MySQL database recover dropped table and database

    DBRECOVER For MYSQL Database(InnoDB/MyISAM) is professional utility to recover data from damaged or corrupt InnoDB tables and MyISAM tables, made by DBRECOVER SOFTWARE INC. We provide dbrecover for mysql as software and service. Using DBRECOVER For MYSQL , it is possible to recover data from tables that can not be read even using innodb_force_recovery. The software is intended to be used against ibdata files that are not in active use by a live DB server. In general terms, the...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 12
    OraDumpReader

    OraDumpReader

    Oracle export expdp dump file recovery software

    the software directly reads data from oracle exp & expdp result dump file . even the file is corrupted or damaged by malware/ransomware, the software can still scan the whole file , and find the good part of data. IMP-00009 abnormal end of export file IMP-00037 Character set marker unknown ORA-31619: invalid dump file
    Downloads: 20 This Week
    Last Update:
    See Project
  • 13
    Malwarebytes
    ...Malwarebytes 3.0 is the next-gen security program that protects you from the most advanced (zero-day) threats, making antivirus obsolete. Malwarebytes 3.0 combines all of our malware-fighting technology - anti-malware, anti-ransomware, anti-exploit, and malicious website protection into one program that scans 4x faster than previous versions of Malwarebytes Anti-Malware Premium. Benefits: Protects you from advanced (zero-day) threats, including ransomware, so you can surf the Web without worry Removes all traces of malware for complete safety Removes potentially unwanted programs (PUPs) that make your computer run poorly Scans fast so you don't have to sit around and wait for your security to finish working Easy to use, just set it and forget it Can replace antivirus or run alongside other antivirus programs.
    Downloads: 9 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB