Search Results for "git:/git.code.sf.net/p/docfetcher/code" - Page 15

Showing 500 open source projects for "git:/git.code.sf.net/p/docfetcher/code"

View related business solutions
  • Premier Construction Software Icon
    Premier Construction Software

    Premier is a global leader in financial construction ERP software.

    Rated #1 Construction Accounting Software by Forbes Advisor in 2022 & 2023. Our modern SAAS solution is designed to meet the needs of General Contractors, Developers/Owners, Homebuilders & Specialty Contractors.
    Learn More
  • Data management solutions for confident marketing Icon
    Data management solutions for confident marketing

    For companies wanting a complete Data Management solution that is native to Salesforce

    Verify, deduplicate, manipulate, and assign records automatically to keep your CRM data accurate, complete, and ready for business.
    Learn More
  • 1
    Files Hash code Verifier

    Files Hash code Verifier

    A tool to verify and generate MD5,SHA,CRC32 hash of multiple files

    A Security tool that will help to verify the hash codes of files . Currently,Our Hash Code verifier tool supports the following Hash types: MD5,SHA,CRC32. More details about the tool can be found in the project homepage.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2

    Xenophobe

    Block countries via iptables and gui menu with country flags.

    The purpose of this project is to geographically restrict access from countries to your server and simply iptables restrictions via a country code and not a large ip list. It is intended as a means of reducing unwanted attacks, brute force, spam, etc. not as a means to segregate access worldwide nor discriminate against any country. I have waned to package an rpm, and deb file that quickly allows most users to block ip addresses from ip blocks that have been geographically assigned. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    PULSE

    PULSE

    Php User Login System Exentended

    ...Even if Pulse is easy to use, it's strongly secure: it has on its side the power of MD5 and SHA-1 algorithms! Salted properly! Pulse is fully opensource, you may download and re-distribute the code in any form, a link back to the project would be appreciated, but is not required. Enjoy! ~ David, project leader
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    WhitewallManager

    Whitelist manager

    WhitewallManager is a whitelist manager. It aims to be a web based administration tool for administrators using a default-deny approach to the security of the network they are responsible for. Default-deny is a superior model for network security as compared to default-allow, which is how the security model of most local area networks is modeled. Default-deny disallows all but access granted to resources which you specifically allow. The advantage to this is that any new resources which...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Skillfully - The future of skills based hiring Icon
    Skillfully - The future of skills based hiring

    Realistic Workplace Simulations that Show Applicant Skills in Action

    Skillfully transforms hiring through AI-powered skill simulations that show you how candidates actually perform before you hire them. Our platform helps companies cut through AI-generated resumes and rehearsed interviews by validating real capabilities in action. Through dynamic job specific simulations and skill-based assessments, companies like Bloomberg and McKinsey have cut screening time by 50% while dramatically improving hire quality.
    Learn More
  • 5
    Ragnarok
    A cascading encryption system that prevents reverse engineering of hashes even with the source code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    RIDSystem

    capturing packet and detecting intruders with their signature

    ...MNCs manages their whole information system using application software over their network.It will be helpful to monitor all the activity in the network. Planning: >Studying network protocols and prototypes >Studying similar kind of existing technologies >Writing of Code in Java using jpcap library >Deployment and testing over anetwork Online References: >http://netresearch.ics.uci.edu/kfujii/Jpcap/doc/ >http://docs.oracle.com/javase/tutorial/ >http://docs.oracle.com/javase/7/docs/api/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    mod_detect

    Detects changes to your Website, finds malware

    I have several websites and some time ago I found code in one of my websites that I did not create. One of those scripts was able to send spam and the other one had some malware code in it. Now you can argue that my website was just not safe enough because who ever placed this code had been able to get in. That is true and the ideal situation is to have such a safe website that nobody can break in.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    SecureLab

    SecureLab

    Open-source protection based on PHP for your projects

    Open-source protection based on PHP for your projects - free, now and forever. Easily include SecureLab main file and write your code, than configure system. Done!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Post Memory Corruption Memory Analysis

    PMCMA - Post Memory Corruption Memory Analysis

    ...It for instance determine why an application is triggering a segmentention fault, evaluate if the faulting instruction can be used to write to memory or execute arbitrary code, and list all the function pointers potentially called from a given point in time by an application. Pmcma is a totally new kind of debugger, which allows for easy experimentation with a process in memory by forcing it to fork. The exact replicas of the process created in memory can then be intrumented while keeping the properties (eg: state of variables, ASLR, permissions...) of the original process. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • The full-stack observability platform that protects your dataLayer, tags and conversion data Icon
    The full-stack observability platform that protects your dataLayer, tags and conversion data

    Stop losing revenue to bad data today. and protect your marketing data with Code-Cube.io.

    Code-Cube.io detects issues instantly, alerts you in real time and helps you resolve them fast. No manual QA. No unreliable data. Just data you can trust and act on.
    Learn More
  • 10
    eCryptfs Parser is a GUI for Linux and Windows that recursively parses the headers of every eCryptfs file found in a given directory. It will tell you what encryption algorithm was used, the original filesize, signature used etc
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Note: I haven't even looked at this project for years. I was a pretty bad programmer back then, so the code is sloppy. The next version will be better. Similar to a stream cipher, but rather than performing an exclusive OR on the input bytes and cipher, it performs a mixture of 'rolling' (see x86 instruction ROR) and bit NOT operations according to the key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    VB6 KeyLog

    A simple keylogger for visual basic 6

    ...No viruses - of course. Don't take my word, read through the source and build yourself! It was written by mj-thompson, a 15 year old, to show off to computer teachers :p FOR LEGAL USE ONLY.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 13
    CesTa (Code Enhancing Security Transformation and Analysis) is a tool for enhancing security by program transformations. Focused on Smart Cards (Java Card in particular), powered by Ant, ANTLR and StringTemplates.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    arphaxad
    arphaxad is a tool providing fast subnet arp-request based scanning. It is also able to isolate a specific host (just by passing the option -p <ip addr>) from the Ethernet-based network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Using encryption to secure your code or text. Click File->Run to run your code using Ruby, see the pop up for output. Never save your text or code to disk unencrypted. Don't forget your password. Encryption is error-persistent.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Notepad X
    STOP!!! This has moved to github! http://www.github.com/mlnlover11/Notepad-X
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Linux-PAM module plus PostgreSQL stored procedures to capture and store encrypted passwords. Intended to facilitate migration of credentials to different authentication systems. Use subversion (see 'Code' tab) to download project source code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This is where web developers can get tools that can make their life easier. Web technologies and languages used contain but are not limited to HTML, XHTML, CSS, JavaScript, PHP, and AJAX. All code is extremely slim, fast running, and is W3C compliant.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    TinyCrypt is a simple secure program for encrypting files. The core encryption code is only 76 lines of C code, based on the well known ARC4-D(768) algorithm.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    a virtual machine to run binay executive code directly
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Commons-SSH is a thin bridge between different Java SSH implementations libraries. It doesn't contain any crypto-related code and created to be used by projects who doesn't want to care about export control regulations (let client to decide)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Application proxy toolkit which inherits the ideology of TIS fwtk and maintains API backwards compatibility. The design goal is to make it simple yet powerful; no performance hacks allowed in the code and library dependencies are reduced to minimum.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    RC4-32.ASM

    Code to brute force the 32-bit key used to RC4 encrypt .pwl files.

    PROJECT HAS MOVED TO GITHUB: https://github.com/alex-georgiou/rc4-32.asm Code to brute force the 32-bit key used to RC4 encrypt .pwl files. Assembles to a 992 byte .COM file using the Intel Architecture Assembler v1.0 Copyright (c) 1998 augusto at dcc.ufmg.br. http://web.archive.org/web/19981205090800/http://www.dcc.ufmg.br/~augusto/project/iasm.zip
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    This is a network lagger, built off of HIVEMIND LOIC by NewEraCracker. I take no credit for any pre-existing code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    LockandLoad started as a replacement for the software Predator. It locks, unlocks, and logs you in by a removable device. LockandLoad is aimed to use its own hashing algorithm, file formats, and such for maximum security. [Project In Progress]
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB