Search Results for "git:/git.code.sf.net/p/docfetcher/code" - Page 11

Showing 500 open source projects for "git:/git.code.sf.net/p/docfetcher/code"

View related business solutions
  • Inventory and Order Management Software for Multichannel Sellers Icon
    Inventory and Order Management Software for Multichannel Sellers

    Avoid stockouts, overselling, and losing control as your business grows.

    We are the most powerful inventory and order management platform for Amazon, Walmart, and multichannel product sellers. Centralize orders, product information, and fulfillment operations to run more efficiently, sell more products, and stay compliant with marketplace requirements so you can grow profitably.
    Learn More
  • Collect! is a highly configurable debt collection software Icon
    Collect! is a highly configurable debt collection software

    Everything that matters to debt collection, all in one solution.

    The flexible & scalable debt collection software built to automate your workflow. From startup to enterprise, we have the solution for you.
    Learn More
  • 1
    Imetion Security Castle
    Imetion Security Castle is a Best Tool Kit for protect your Datas. You can Encrypt your Text files, rich text files, code text files and electronic voice encrypt file and zip any files in your own extentions like *.zip/ *.rar/ *.mp3/ *.mp4 ect. **
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    LOWC

    LOWC

    An improved version of LOWC forked from GoogleCode

    Low Orbit Web Cannon a version of LOIC-0 for web browsers this version has been forked from the original at https://code.google.com/p/lowc/ for a more professional look. this tool comes released under the GPLv3 See README for Hivemind. DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    High Orbit Ion Cannon

    High Orbit Ion Cannon

    High Orbit Ion Cannon

    ...we're going to make this version of HOIC with a full source code release so that it may be ported to other platforms and codes. Also we're working on making it more professional. High Orbit Ion Cannon is released into Public Domain.
    Downloads: 339 This Week
    Last Update:
    See Project
  • 4

    Bloody Profanity

    Fingerprint-only auth screen for KDE/Plasma

    ...INSTALLATION # As root b=/usr/share/BloodyProfanity cp -rvp /path/to/bp $b g=/usr/lib/kde4/libexec/kscreenlocker_greet cp -v $g $g.bak cp -vpf $b/locker.py $g # As user fprintd-enroll fprintd-verify # important mkdir -p ~/.BloodyProfanity/conf ~/.BloodyProfanity/img
    Downloads: 0 This Week
    Last Update:
    See Project
  • 5
    FACPL - Access control policies

    FACPL - Access control policies

    A Java library for Attribute-based Access Control Policies

    FACPL: a Java-based library for the specification and enforcement of Access Control policies - Attribute-based Access Control Policies - Advanced features for the management of, e.g., combining algorithms and missing attributes - Generation of XACML code starting from FACPL code - Generation of FACPL code starting from XACML code Source Code: https://github.com/andreamargheri/FACPL/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Endico - Text Encrypt

    Endico - Text Encrypt

    Fastest way to make secure text.

    ...How to use : Step one - Open Endico 14 Step two - Decide what to do (Text Encode/Text Decode) Step three - If You Selected Text Encode -> Then Type/Copy/Open .txt file to convert. Step four - Copy the converted text into clipboard to chat,mail,print process etc. Step five - If you want to Decode the code the again follow step two. Step six - Congratulations! you done it . ------------------------------------------------------------------------------------------------- Advantages and Applications 1. Fast and East TEXT encoding. 2. Fast and Easy Code decoding. 3. Easy User Interface & 24x7 Support. 4. Low system requirements. 6. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    CorReactive

    Event correlation engine with reactive facilities

    Correlation engine based on Esper library which can be used together with Logstash. Please read FAQ http://sourceforge.net/p/correactive/wiki/FAQ/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Web Application Protection

    Web Application Protection

    Tool to detect and correct vulnerabilities in PHP web applications

    ...WAP detects the following vulnerabilities: - SQL injection using MySQL, PostgreSQL and DB2 DBMS - Reflected cross-site scripting (XSS) - Stored XSS - Remote file inclusion - Local file inclusion - Directory traversal - Source code disclosure - OS command injection - PHP code injection WAP is a static analysis tool that performs taint analysis to detect vulnerabilities, tracking malicious users inputs and checking if they reach calls of sensitive functions. It has a low rate of false positives because has implemented a data mining module to predict false positives when detects vulnerabilities. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 9
    netool toolkit 4.6

    netool toolkit 4.6

    MitM pentesting opensource toolkit

    Operative Systems Suported are: Linux-ubuntu, kali-linux, backtack-linux (un-continued), freeBSD, Mac osx (un-continued) Netool its a toolkit written using 'bash, python, ruby' that allows you to automate frameworks like Nmap, Driftnet, Sslstrip, Metasploit and Ettercap MitM attacks. this toolkit makes it easy tasks such as SNIFFING tcp/udp traffic, Man-In-The-Middle attacks, SSL-sniff, DNS-spoofing, D0S attacks in wan/lan networks, TCP/UDP packet manipulation using etter-filters, and...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Loan management software that makes it easy. Icon
    Loan management software that makes it easy.

    Ideal for lending professionals who are looking for a feature rich loan management system

    Bryt Software is ideal for lending professionals who are looking for a feature rich loan management system that is intuitive and easy to use. We are 100% cloud-based, software as a service. We believe in providing our customers with fair and honest pricing. Our monthly fees are based on your number of users and we have a minimal implementation charge.
    Learn More
  • 10
    Honey-p - является простым клоном программ типа "HoneyPot". Прост в развертывании и использовании. Все подробности в файле readme.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    php-clamav
    PHP ClamAV - ClamAV Interface for PHP5 Scripts PHP-ClamAV is a PHP5 extension that allows to incorporate virus scanning features on your PHP5 scripts. It uses the Clam AV API for virus scanning.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    *NOTE* Migrated to http://github.com/cracklib/cracklib Next generation version of libCrack password checking library. As of Oct 2008 (reflected in 2.8.15 code release), licensed under LGPL.
    Leader badge
    Downloads: 2,188 This Week
    Last Update:
    See Project
  • 13

    GDLOG

    Implementation of the GNFS for discrete logarithm problem in GF(p)

    GDLOG is an implementation of the General Number Field Sieve algorithm for discrete logarithm problem in GF(p).
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    SecSy: Security-oriented Log Synthesis

    SecSy: Security-oriented Log Synthesis

    Tool for synthesizing business process logs.

    ...It is also capable of enforcing/violating specific security properties on process traces, such as SoD/BoD, Unauthorized Access, Corrupted log entries, Skipped Activities. SecSy builds upon the following libraries, that have to be included in the projects' build path: - JAGAL: http://sourceforge.net/p/jagal - JAWL: http://sourceforge.net/p/jawl - SEPIA: http://sourceforge.net/p/sepiaframework - SERAM: http://sourceforge.net/p/seram - TOVAL: http://sourceforge.net/p/toval
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    PAVS

    PAVS

    PHP Application Vulnerability Scanner

    PAVS scans the PHP based web application source code and identifies the potential security problems in that application. PAVS also identifies the loop holes in PHP configuration file settings. Attacks addressed by PAVS are Cross-site Scripting SQL Injection File Manipulation File Inclusion Command Execution Code Evaluation
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    SEPIA: Security-oriented PN Framework

    SEPIA: Security-oriented PN Framework

    Petri net framework for security related modeling and reasoning.

    ...To support information flow analysis of processes, SEPIA defines so-called IF-Nets, tailored for security-oriented workflow modeling which enable users to assign security-levels (HIGH, LOW) to transitions, data elements and persons/agents participating in the process execution. SEPIA builds upon TOVAL (http://sourceforge.net/p/toval), JAGAL (http://sourceforge.net/p/jagal) and SEWOL (https://sourceforge.net/projects/jawl/). To use SEPIA, make sure these libraries are on the build path. SEPIA encloses the Multi Schema Validator (https://msv.java.net/) and isorelax (http://iso-relax.sourceforge.net/) The documentation can be found under http://doku.telematik.uni-freiburg.de/sepia.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    SEWOL: Security-oriented Workflow Lib

    SEWOL: Security-oriented Workflow Lib

    Java Library for workflow handling

    ...In order to specify security-related context information, SEWOL provides access control models such as access control lists (ACL) and role-based access control models (RBAC). SEWOL uses and encloses the following libraries: - TOVAL (http://sourceforge.net/p/toval), - JAGAL (http://sourceforge.net/p/jagal), - OpenXES (http://www.xes-standard.org/openxes/), - Spex (http://code.deckfour.org/Spex/) - Google Guava (https://github.com/google/guava), - xstream (http://xstream.codehaus.org/) and - graph-impl and visualization components of Jung 2 (http://jung.sourceforge.net/). Documentation: http://doku.telematik.uni-freiburg.de/sewol
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18

    coldfusion

    An RFID Access control system for the raspberry pi

    ...It then compares the UID given from the Scanner to the ones in the data directory, If a match is found it will open the doors lock. Be sure to read the WIKI https://sourceforge.net/p/coldfusion/wiki/Setup/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    java-sandbox

    Securly execute untrusted code from within your application.

    The java-sandbox allows you to securely execute untrusted code (for example, user generated scripts in scripting languages such as groovy or rhino) from within your application. It allows you to specify resources and classes that may be used by the code, thus, separating the execution from the application's execution environment. It allows to wrap execution environments in threads or even execute them remotely on different jvms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    jellyphish

    Don't get phished!

    ...1) Run the jar file. 2) Now copy & paste the url in the url textfield.(use ctrl+v to paste) 3) Select the site which you think that the webpage belongs from the drop down list. 4) Now click on the check Button. :P 5) Now after it shows you a popup that the site is safe or dangerous you can click on the clear button to use it again. 6) Click on help button to get a quick tutorial.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Fleeting Password Manager

    Fleeting Password Manager

    Fleeting Password Manager generates and manages passwords.

    ...The length of the generated password is configurable between 8 and 32 characters and Fleeting Password Manager can remember wanted URL/User-pairs. The newest source code and relases here: https://github.com/juzzlin/FleetingPasswordManager/releases
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    sha3sum and then some

    sha3sum - A demonstration of the Keccak permutation.

    Hash mode interface to the Keccak code package. This program illustrates the use of the Keccak permutation. Usage is much more than a hash function. The NIST compatible settings are subject to change when they publish FIPS PUB 180-5. I wrote this program when evaluating the permutation and developing tree hashing for the Intel(R) MIC architecture.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23

    Iris Recognition System

    Iris Recognition System Matlab source code

    ...Iris recognition is the most accurate personal identification biometric and it is this that accounts for its use in identity management in government departments requiring high security. Index Terms: Matlab, source, code, iris, recognition, one to one, one to many, verification, identification, matching.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    BinaryCrypt

    BinaryCrypt

    Binary Conversion Calculator

    ...You can convert only decimal (as of right now) to any base up to base 64. You can also save your converted text to a file or open a converted text file to decrypt the message, and perform basic arithmetic in binary. The git repo for the C# code is located at: https://github.com/m1r4g3/BinaryCrypt-.Net
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    theZoo

    theZoo

    A repository of LIVE malwares for malware analysis and security

    theZoo is a project created to make the possibility of malware analysis open and available to the public. Since we have found out that almost all versions of malware are very hard to come by in a way which will allow analysis, we have decided to gather all of them for you in an accessible and safe way. theZoo was born by Yuval tisf Nativ and is now maintained by Shahak Shalev. theZoo’s purpose is to allow the study of malware and enable people who are interested in malware analysis (or maybe...
    Downloads: 6 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB