Showing 87 open source projects for "linux terminal"

View related business solutions
  • Rezku Point of Sale Icon
    Rezku Point of Sale

    Designed for Real-World Restaurant Operations

    Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
    Learn More
  • anny is an all-in-one platform for managing hybrid workplaces and shared resources. Icon
    anny is an all-in-one platform for managing hybrid workplaces and shared resources.

    For Businesses looking for a flexible solution for internal and external bookings

    Enable your employees to easily book desks, meeting rooms, parking spots, equipment, and more – all in one place. With flexible rules and group permissions, you stay in full control of who can access what.
    Learn More
  • 1
    The database access library for C++ programmers that provides the illusion of embedding SQL in regular C++ code, staying entirely within the C++ standard.
    Leader badge
    Downloads: 35 This Week
    Last Update:
    See Project
  • 2
    VanitySearch

    VanitySearch

    VanitySearch is a Bitcoin address prefix lookup tool.

    VanitySearch is a Bitcoin address prefix lookup tool. If you want to generate a secure private key, use the `-s` option to enter your passphrase, which will be used to generate the base key conforming to the BIP38 standard (e.g., `VanitySearch.exe -s "my passphrase" 1MyPrefix"`). You can also use `VanitySearch.exe -ps "my passphrase"`, which adds a cryptographically secure seed to your passphrase.Fixed custom address matching errors and private key conversion errors, changed the randomizer,...
    Leader badge
    Downloads: 19 This Week
    Last Update:
    See Project
  • 3
    a smal tool tat can split a file into to files for encryption only both files can restore the orginal file
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located on...
    Leader badge
    Downloads: 114 This Week
    Last Update:
    See Project
  • Enterprise AI Agents for Every Customer Moment Icon
    Enterprise AI Agents for Every Customer Moment

    For enterprise companies looking for AI Agents

    From chat to voice to SMS, every conversation gets a smart, personalized response powered by your policies, tone, and data.
    Learn More
  • 5
    KeyKiller-Cuda

    KeyKiller-Cuda

    Solving the Satoshi Puzzle

    KeyKiller is a GPU-accelerated version of the KeyKiller project, designed to achieve extreme performance in solving Satoshi Nakamoto's puzzles using modern NVIDIA GPUs. KeyKiller CUDA pushes the limits of cryptographic key search performance by leveraging CUDA, thread-beam parallelism, and batch EC operations. The command-line version is open-source and free to use. For the paid advanced graphics version, please visit: https://gitlab.com/8891689/KeyKiller-Cuda/
    Downloads: 11 This Week
    Last Update:
    See Project
  • 6
    mpass

    mpass

    Minimal TUI Password Mananger for GNU/Linux

    Mpass is a lightweight TUI Password Manager for GNU/Linux systems. It delivers a fast, distraction-free text user interface so you can store, and retrieve credentials without the bloat of a GUI or the headaches of a CLI.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Passive-Network-Scan-L2/3

    Passive network discovery tool focused on Layer 2 and Layer 3 packets

    Passive-Network-Scan-L2/3 is a lightweight, passive network discovery tool that listens on a network interface in promiscuous mode and collects Layer 2 and Layer 3 signalling (ARP, STP, DHCP, mDNS, SSDP). It aggregates discovered hosts by MAC address, attempts to measure passive RTTs for request/response protocols, maintains per-protocol RTT histories and simple service hints, and can emit structured events and a final table in JSON or CSV formats.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    1654 — encryption system

    1654 — encryption system

    1024-bit encryption system (functional safe or disk) | С++20

    This release marks the first production-ready publication of 1654, a dependency-free cryptographic vault engine built around a strict vault abstraction and a wide-state cryptographic design. 1654 is not a wrapper around existing crypto libraries. It is a self-contained system whose cryptographic behavior is fully defined within the repository. Key Characteristics Vault-oriented model Encrypted data is treated as a sealed container-safe with explicit operations, not as a...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    PetoronHash-System

    PetoronHash-System

    PHASH | post-quantum XOF hashing algorithm | C++20

    PHASH is a self-contained, dependency-free, post-quantum XOF hashing algorithm implemented in modern C++20. This release delivers the first fully stable production implementation of the PetoronHash-System — a 1600-bit sponge-based hash function with domain separation, extendable output, and deterministic behavior. Key Features No external dependencies — pure C++20 implementation. Extendable Output (XOF) — supports arbitrary output length (256–8192+ bits). Post-quantum oriented design...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Employees get more done with Rippling Icon
    Employees get more done with Rippling

    Streamline your business with an all-in-one platform for HR, IT, payroll, and spend management.

    Effortlessly manage the entire employee lifecycle, from hiring to benefits administration. Automate HR tasks, ensure compliance, and streamline approvals. Simplify IT with device management, software access, and compliance monitoring, all from one dashboard. Enjoy timely payroll, real-time financial visibility, and dynamic spend policies. Rippling empowers your business to save time, reduce costs, and enhance efficiency, allowing you to focus on growth. Experience the power of unified management with Rippling today.
    Learn More
  • 10

    badpi-cyphering

    file/stream encryption/decryption/CRC based on PI compute algorithm

    Encryption/decryption/CRC algorithm base on PI calculation. The private Key is composed of : - a starting position nb (iterations before starting encrypt) - a loop nb (in-between iteration) - small spot nb for the position in floating number part Challenge is proposed in my website.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    FileVerifier++
    FileVerifier++ is a Windows utility for calculating hashes using a number of algorithms including CRC32, MD5, SHA-1, SHA-256/224/384/512, WHIRLPOOL, and RIPEMD-128/160/256/320. Supported hash file formats include MD5SUM .MD5, SFV, BSD CKSUM, and others.
    Leader badge
    Downloads: 41 This Week
    Last Update:
    See Project
  • 12
    DracOS GNU/Linux Remastered
    What is DracOS GNU/Linux Remastered ? DracOS GNU/Linux Remastered ( https://github.com/dracos-linux ) is the Linux operating system from Indonesia , open source is built based on Debian live project under the protection of the GNU General Public License v3.0. This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering. Use a GUI-based...
    Downloads: 40 This Week
    Last Update:
    See Project
  • 13
    jackpot-proxy

    jackpot-proxy

    A SOCKS5-over-TLS Proxy

    Jackpot-proxy is a SOCKS5-over-TLS proxy. Like what features of HTTPS has, jackpot-proxy can protect SOCKS5 stream under TLS layer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Unified Sessions Manager

    Unified Sessions Manager

    Pioneering Private and Public Cloud Management since 2008

    The UnifiedSessionsManager supports the integrated management of user sessions within Private-Clouds, comprising heterogeneous IT landscapes of various physical and virtual machines, hypervisor management, and virtual user sessions with remote desktops. Extracted documents see https://sourceforge.net/projects/ctys-doc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Hyenae NG

    Hyenae NG

    Advanced Network Packet Generator

    Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pattern based address randomization and flood detection breaking mechanisms. *** Please check out the latest source from my GitHub repository and check the Build informations. https://github.com/r-richter/hyenae-ng/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ugtrain

    ugtrain

    Universal elite game trainer for the command line on Linux.

    The ugtrain is the universal elite game trainer for the command line on Linux under GPLv3. Its dynamic memory support sets it apart. A preloader, a memory discovery and a memory hacking library are included for this. Other features: config file per game, included FOSS game example configs, simplified discovery, security bypassing, automatic adaptation to compiling differences. This project is mostly handled on GitHub: https://github.com/ugtrain/ugtrain
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    Wraith is an open source IRC bot written in C++. It has been in development since late 2003. It is based on Eggdrop 1.6.12 but has since evolved into something much different at its core.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    ansvif

    ansvif

    An advanced cross platform fuzzing framework suited to find code bugs.

    ansvif, or A Not So Very Intelligent Fuzzer, suited to find bugs in code by throwing garbage arguments, files, and environment variables at the target program, that you may or may not have the source code to. It supports many features, such as buffer size, randomization of the buffer size, random data injection, templates, and much more. The purpose of this project is to identify bugs in software, specifically bugs that can induce a segmentation fault under various conditions. This aids...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    GILIB

    GILIB

    GILIB Large Integer Arithmetic Library

    A large integer arithmetic library written in plain C.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    An encryption standard based on the chaotic properties of the logistic map function. With a pseudo-random byte generator, this cipher offers encryption with great statistical improbability.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    VoIP Honey project provides a set of tools for building an entire honeynet, thus includes honeywall and honeypot emulating VoIP environments such as Asterisk PBX or OpenSer with fully configurable connections. Voip Honey runs on GNU/Linux and Windows Systems. It can be compiled for Mac OSX as well.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    HT is a file editor/viewer/analyzer for executables. The goal is to combine the low-level functionality of a debugger and the usability of IDEs. We plan to implement all (hex-)editing features and support of the most important file formats.
    Downloads: 42 This Week
    Last Update:
    See Project
  • 23
    NetCrypt

    NetCrypt

    NetCrypt - file-transfer utility providing secure data transfer

    NetCrypt is a small Open Source command line file-transfer utility providing authentication, confidentiality and integrity validation while still maintaining top-notch performance and transfer speed between machines. No public key distribution is required: NetCrypt is designed to use a symmetric passphrase with a strong key-derivation-function. NetCrypt seeks to fulfill all those requirements. In it's default configuration, it uses the AES-256-GCM cipher with a PBKDF2 key iteration count...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Fake Name Generator

    Fake Name Generator

    Generates random fake names

    Program generates as many fake names as you want in lots of different languages. Works in Linux, *BSD & Windows. Version 2.0x saves the names to a file called filenames.txt , which you can load into a text editor. Currently v2.0x is the Latest Version.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    File Scrambler

    Scramble your files

    Scrambler splits your files into a disired number of chunks and puts them together in a different order. This makes the file unreadable. In order to read them again you must unscramble them. Possible Uses: 1. Protect your private files (e.g. pictures, text, source file etc.) 2. Protect your hosted file on your website. (e.g. You can scramble the file and upload it. In order for the downloader to open the file he needs to unscramble the file. For this he will need the number of scrambles)
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next
MongoDB Logo MongoDB