Build or enhance your payments stack, while maintaining control with an open-source, full-stack and modular infrastructure.
Juspay's Payments Orchestration Platform offers a comprehensive product suite for businesses, including open-source payment orchestration, global payouts, seamless authentication, payment tokenization, fraud & risk management, end-to-end reconciliation, unified payment analytics & more. The company’s offerings also include end-to-end white label payment gateway solutions & real-time payments infrastructure for banks. These solutions help businesses achieve superior conversion rates, reduce fraud, optimize costs, and deliver seamless customer experiences at scale.
Learn More
Top Corporate LMS for Training | Best Learning Management Software
Deliver and Track Online Training and Stay Compliant - with Axis LMS!
Axis LMS enables you to deliver online and virtual learning and training through a scalable, easy-to-use LMS that is designed to enhance your training, automate your workflows, engage your learners and keep you compliant.
Finds Text in Delphi *.Pas files e.g. : button1.caption:='Hello'
Replaces Text with a function call button1.caption:=TXT(0) {##Hello##}
Generates a function „TXT“ with a String List with all found Texts at the beginning of your source.
CryptoFile is a RichEdit application that encrypt files, using the microsoft api crypt v2.0 - and a proprietary ASCII MIME functions. It associate the extension .pto to the crypt and thus enable you to create an encrypted text files out of the box.
Maar (command-line software) locks / unlocks files and folders. To crypt password is used MySecret program originally written by David Ireland, copyright (c) 2002-7 by D.I. Management Services Pty Limited <www.di-mgt.com.au>, and is used with permission.
dbt Labs empowers data teams to build reliable, governed data pipelines—accelerating analytics and AI initiatives with speed and confidence.
Data teams use dbt to codify business logic and make it accessible to the entire organization—for use in reporting, ML modeling, and operational workflows.
Intrusion Detection System made in Java using Snort rule files. The main feature of Nyx are distributiveness, Java based, Software Agent implemented. Iteration 1 has finished. Still more features has to be extended
Allows you to quickly create mozilla.cfg files by automatically reading/writing the ROT13 encoded format. Also contains a prefs browser to easily find preferences to add to your mozilla.cfg for locking down an end-users browser. Requires .NET 3.5
An encryption library written in C# on .net 2.0, includes SHA1 and MD5 encryption atm. Also includes usercontrols for Visual Studio. Readme can me downloaded separately in the files section.
If you need to protect your confidential files in office or shared desktops, here is the robust command line and GUI utility to do password based encryption using AES. It can encrypt and decrypt a folder structure containing any number of files.
The FFT is a modified version of Xubuntu that includes a custom web app designed to aid in digital forensic investigations. Currently it has been geared towards performing audits against Mac OS X, support for Linux/Windows is planned.
Queue Management System for Busy Service Providers | WaitWell
The queue management system that perfectly adapts to your workflows
The queue management system that perfectly adapts to your workflows. Improve operational efficiency in weeks with the most configurable enterprise queue system.
Another Backup Plugin (ABP) is a plugin for the KeePass password manager (Classic Edition). ABP automatically copies the initial password database to one or more backup files, so that the passwords can be recovered in case of loss.
SLEncrypt is a python module for encryption with 11 ciphers at the moment, including ADFGVX, Autokey, Caesar/ROT13, Vigenere, XOR and a lot more. It contains functions allowing you to easily encrypt/decrypt files. The code is about 95% PEP 8 compilant.
Advanced Perl script for DES password cracking. Might be handy for password QA. Brut-force, load Unix passwd/shadow, multi hash crack, input/output file, save/resume cracking state.
Crypto is a simple, easy to use Windows application for encrypting text files using RSA encryption. Crypto has an elegant user interface and a powerful encryption backend.
Hide your data from any scans for fingerprints at forensic analysis. Fragger is an concept to fragment files into many small files by scrambling the content of the source file.
Logdigest mails interesting lines from log files to the system administrator. Non-relevant lines are filtered out by customizable regular expressions. Logdigest comes with a set of such regexps to provide a good starting point.
APDUscanner is a small program to explore ISO-7816 smart cards. It scans for undocumented command APDUs, discovers files (EF/DF), and allows manual command/response debugging. Also reads payment data from ChipKnip (Dutch). Requires PC/SC card reader.
Lite Security Module: a daemon to handle PKCS11 Secure Boxes
Lite Security Module: a daemon to handle Secure Boxes (files containing cryptographic keys, X509 certificates and data objects), accessible through a PKCS#11 library, supporting non-certified (lite) Software or Hardware Security Modules (www.clizio.com)
CF is a Linux/Unix command line utility for editing/managing AES-encrypted text files. Multiple users can edit the same files using their own separate passwords. It supports basic file locking, piping, adding, changing, removing, and listing keys.
Originally made to crack /etc/passwd files from *nix utilizing the GPU. Uses GLSL and OpenGL. Acts as a parallel to John the Ripper, but for the GPU. Supports both ATI and nVidia, anywhere OpenGL can run.