Search Results for "sourceforge.net/projects/winpython/files/winpython_3.8/3.8.10.0/winpython64-3.8.10.0.7z" - Page 28

Showing 1219 open source projects for "sourceforge.net/projects/winpython/files/winpython_3.8/3.8.10.0/winpython64-3.8.10.0.7z"

View related business solutions
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • Online Project Management Platform - Zoho Icon
    Online Project Management Platform - Zoho

    A plan put together with small businesses and startups in mind.

    Zoho Projects is a cloud-based project management solution that helps teams plan, track, collaborate, and achieve project goals.
    Learn More
  • 1

    RAWR - Rapid Assessment of Web Resources

    A web interface enumeration tool for simplifying red team reporting.

    Introducing RAWR (Rapid Assessment of Web Resources). There's a lot packed in this tool that will help you get a better grasp of the threat landscape that is your client's web resources. It has been tested from extremely large network environments, down to 5 node networks. It has been fine-tuned to promote fast, accurate, and applicable results in usable formats. RAWR will make the mapping phase of your next web assessment efficient and get you producing positive results faster!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    PortableSigner
    PortableSigner is a tool for digital signing (with X.509 certificates) of PDF files
    Leader badge
    Downloads: 13 This Week
    Last Update:
    See Project
  • 3
    WTMParse

    WTMParse

    Python script to parse Unix-like WTMP files

    Python script that was originally intended for use in forensic examinations that parses WTMP files from Unix-like operating systems and generates a CSS-styled HTML report containing login terminal, username, log start date and login time/date in a table. Good for postmortem forensic examinations or as a way of getting "last" like information where you don't have the ability to boot the machine in question but can grab the wtmp.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    NoTrace mobile

    NoTrace mobile

    NoTrace mobile helps to protect your privacy on Firefox Mobile

    NoTrace mobile is a Firefox add-on that helps to prevent information leakage during the mobile web navigation. It is a branch of the project http://www.isislab.it/projects/NoTrace/
    Downloads: 0 This Week
    Last Update:
    See Project
  • ServiceDesk Plus, a world-class IT and enterprise service management platform Icon
    ServiceDesk Plus, a world-class IT and enterprise service management platform

    Design, automate, deliver, and manage critical IT and business services

    Best in class online service desk software. Offer your customers world-class services with ServiceDesk Plus Cloud, the easy-to-use SaaS service desk software from ManageEngine, the IT management division of Zoho. Track and manage IT tickets efficiently, resolve issues faster, and ensure end-user satisfaction with the cloud-based IT ticketing system used by over 100,000 IT service desks worldwide. Manage the complete life cycle of IT incidents, problems, changes, and projects with out of the box ITIL workflows. Create support SLAs, define escalation levels, and ensure compliance. Automate ticket dispatch, categorization, classification, and assignment based on predefined business rules, and set up notifications and alerts for timely ticket resolution. Reduce walk ins and unnecessary tickets by giving your users more control. Enable end users to access IT services through your service catalog in the self-service portal. Help users create and track tickets and search for solutions.
    Learn More
  • 5
    CrackThis!

    CrackThis!

    Data Encrypton Software utilizing IMPACT

    ...The full version, due to release March 11, 2013 will allow password protection which helps protect your information by forcing the impostor to not only produce the 65536 bit key, but have your password as well and allows for individual passwords for individual files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    LastBit Suite

    LastBit Suite

    A steganographic program to hide files into images

    This is a steganogric program that uses images last bits to hide information ( files ). It can crypt data with a rotation and a xor key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    ORDO vers.1.0

    AES-128, Linux, OpenBSD, Assembly-Language

    Small cryptographic command line tool for LINUX and OpenBSD (x86) completely in 32-Bit Assembly Language. ORDO encrypt/decrypt files (max. size 2 GB) with AES-128-Algorithm (Rijndael) in CBC-Mode (Cipher-Block-Chaining). No libs are included, only system-calls are used. ORDO is under BSD License.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Encrypted 3.0

    Encrypted 3.0

    Encrypted Texts and Files!

    Small project aimed at making a new encryption tool and using strong. Net You can download the program and edited it whenever you want ************************************************************* Encrypted In Facebook https://www.facebook.com/pages/Encrypted/504074939636099?ref=hl Hammadi Agharrass
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    KeeSkyDrive

    SkyDrive database synchronization plugin for KeePass

    ...It actually calls Synchronize function of KeePass to allow changes to be merged safely. INSTALLATION 1. Download KeeSkyDrive_1_0.zip 2. Extract KeeSkyDrive.plgx to KeePass directory, e.g."C:\Program Files (x86)\KeePass Password Safe 2\". 3. Restart KeePass 4. Click menu Tools->KeeSkyDrive Options. 5. Follow configuration steps.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Construction Takeoff Software Icon
    Construction Takeoff Software

    Takeoffs From Anywhere

    Stratosphere’s cutting edge cloud platform gives estimators unprecedented freedom to complete takeoffs from anywhere with next generation takeoff and markup tools.
    Learn More
  • 10
    silvertunnel - Java lib+browser for TOR
    silvertunnel.org is a project that provides an end-user browser, a Java library and additional Java security tools to easily access anonymity networks such as the Tor (torproject.org) network. Secure and easy to use. Tor4Java and Tor Browser. Attention: see project status on page https://sourceforge.net/p/silvertunnel/discussion/962278/thread/83dc2d02/#
    Downloads: 9 This Week
    Last Update:
    See Project
  • 11
    Crypto

    Crypto

    Crypto - File encryption software

    Crypto is a new cryptographic software which uses common encryption algorithms among with a key word to protect your most valuable files! It now comes with a Console, which is the same as Crypto but with a more professional look.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    File Wiper .NET

    File Wiper .NET

    Tool written in C# to safely delete existing files.

    File Wiper .NET is a program intended to safely destroy the content of files. This destructive job is done by overwriting the content of a given file before deleting it. To overwrite the file content a user can choose one of the predefined wiping algorithms. Further, after wiping the file content the name of a file is also overwritten using a special wiping algorithm.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    Turbo Shredder

    Turbo Shredder

    Turbo Shredder securely removes files.

    Do you want to delete some top secret files? DON'T do that by only pressing DELETE, because the data would still be on your drive! Use Turbo Shredder and remove files by securely wiping them out. Requires JRE 7 to run properly.
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14
    EncryptionTool

    EncryptionTool

    Multi purpose encryption tool.

    Can check password strength. Encrypt text files with SHA1 & MD5 hash algorithms using AES encryption system. Using a given buffer size for reading and writing and a procentage of the said buffer for encryption, memory and cpu usage optimization can be achieved.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    FileEraser

    FileEraser

    Programm, um sicher Dateien zu löschen.

    Aktuelle Version 0.2.2013.111 Changelog: http://sourceforge.net/p/fravidofilekill/blog/ Ein Programm für das sicher Löschen von Dateien. Komplette Ordner mit/ohne Unterordner können gelöscht werden. License: Creative Commons (CC BY-ND 3.0) Namensnennung-Keine Bearbeitung 3.0 Unported (http://creativecommons.org/licenses/by-nd/3.0/deed.de)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    imntr

    imntr

    A Resource Activity Monitor for Linux Machines

    imntr (inode monitor) can be used to montior activity on files or directories. Monitoring is accomplished through the inotify API, which is available on Linux 2.6.13 and up. v1.1 added logging capabilities and cleaned up some of v1.0's code v1.2 no longer forces you to run imntr as root. If you want to monitor a privileged file, imntr will fail and tell you that you need to run imntr as root.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Selective Data Backup (DoS App)

    Select the files you want backed up.

    This program was made because windows backup isn't enough if the size of your hard drive changes. This program directly copies any files/folders you list, to an empty folder. It copies the entire folder structure, so you know exactly where your files and everything backed up, are/were. Now, also included in this is my Password Safe program. Store all your passwords in 1 convenient location. But, wait "wouldn't that be dangerous?", NOPE! It's all encrypted useing my special Cypher Encryption Algorithm: basically, you have to have the password, or you'll never see your data again! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Password Protector

    Password Protector

    Encrypt and protect passwords and usernames

    Password Protector allows you to securely store your passwords and usernames in one place using AES256 for encryption, which is the recommended cryptosystem used in Banks. Password Protector uses a master password to encrypt your passwords, but it can also use optional 'key files' - small files that are required for the encryption/decryption process. You can put the file on any portable storage you keep with you (USB sticks, phones, music players...) to add an extra layer of security - even if someone knows the master password, if they don't have the key file, they can't get in! Worried you might forget the master password? ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    ...If you'd like to help support our development, or take over the development please let us know. Explore the internal file structure of your iphone (or of a seized phone in the case of forensic teams) using either the iphone's own backup files or (for jail broken iphones) ssh. Viewing of plist, sqlite, and hex are supported. IOS 5 is now supported iOS 6 only partially works at the moment (some features fail or are missing). Unfortunately paid work means we can't fix this right now, but would welcome anyone else submitting patches.
    Leader badge
    Downloads: 28 This Week
    Last Update:
    See Project
  • 20
    Encrypter

    Encrypter

    Encrypter is a free folder encrypting and hiding utility software.

    Encrypter is a free folder encrypting and hiding utility software for Windows 32bit platform. Encrypter is powerful but lightweight software written in VB.NET for Windows 7, Vista and XP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Adsocks

    Adsocks

    Administrador Remoto

    Herramienta de Administración Remota opensource escrito en Java. Nota: El creador de este herramienta no se hace responsable del mal uso que le puedan dar a esta herramienta.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    eSCAPe (Enhanced SCAP Editor) is used to create Security Content Automation Protocol (SCAP) content files, in particular OVAL & XCCDF files. Allows experts to create SCAP content without requiring in-depth knowledge of the protocols themselves.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Hash Calculator

    Hash Calculator

    MD5/SHA1 file and string hash calculator

    Hash Calculator is a small tool to calculate hash values from files and string input. Only md5 and sha1 supported at the moment. Option to export hash results to a text file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    AntolliCrippi Java

    AntolliCrippi Java

    Simple and easy to use Java application to encrypt your files

    ...All the language specification are written into some XML files. Has been written according to the Model-View-Controller design pattern so it will be easy to add more functionality.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    yeo

    command-line steganography application

    designed to hide messages in jpg and png images without the requirement for any plain-text files. uses aes256 on data, using an sha256 hash of the password as the encryption key. rotates the password by 1 character, and uses an sha256 hash of that for the random seed for the image pointer access. security and invisibility of data is currently being peer-reviewed (since ~2014). At this point it looks like no vulnerabilities have been identified yet.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB