Showing 16 open source projects for "program"

View related business solutions
  • IT Asset Management (ITAM) Software Icon
    IT Asset Management (ITAM) Software

    Supercharge Your IT Assets, the Easy Way

    Drowning in misplaced IT assets, compliance headaches, and shadow IT? Navigate to clarity with an intuitive IT Asset Management solution. Experience crisp visibility, effortless control, and unshakable security – all while freeing up your budget with optimized software licenses. The best part? It’s easy.
    Learn More
  • Create stunning, professional email signatures in minutes Icon
    Create stunning, professional email signatures in minutes

    For companies looking to create, assign and manage all their employees email signatures and add targeted marketing banners.

    Create, assign and manage all your employees’ email signatures and add targeted marketing banners. Stop getting worked up about your signatures! Leverage a centralized interface to easily create and manage the email signatures of all your employees. Take advantage of each email to broadcast and amplify your brand. Letsignit helps you regain control over your digital identity. Harmonize 100% of your employee’s email signatures in just a few clicks! 121 professional emails are received and 40 are sent every day by an employee. With Letsignit, turn every email into a powerful communication opportunity: send the right message to the right person at the right time! Innovative more than tech, inspiring more than following. Authentic more than overrated, close more than "think big", trustworthy more than doubtful. Hands-on more than complex, available but yet premium, fun but yet expert.
    Learn More
  • 1
    Inventory

    Inventory

    Asset inventory dataset for public bug bounty program targets

    ...It also helps security teams gain clearer visibility into their exposed infrastructure and publicly reachable systems. Much of the data in the repository is generated automatically through workflows that gather, transform, and consolidate bug bounty program data from multiple sources.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    UseGroup

    UseGroup

    Usegroup is a user and group manager.

    This program allows you to add or remove users, define user options, add, edit or delete groups from Linux/Unix systems. Usegroup works in user or administrator mode, the interface uses the GTK dialogs of Yad or Zenity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Unshackle

    Unshackle

    Tool to bypass windows and linux passwords from bootable USB

    Unshackle is an open-source tool to bypass Windows and Linux user passwords from a bootable USB based on Linux. Open-source tool to bypass windows and Linux passwords from bootable USB.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4

    iptables-bash_completion

    Programmable completion code (bash) for ip[6]tables (netfilter.org)

    This is the programmable completion specification (compspec) for the iptables program (netfilter.org).
    Downloads: 0 This Week
    Last Update:
    See Project
  • A warehouse and inventory management software that scales with your business. Icon
    A warehouse and inventory management software that scales with your business.

    For leading 3PLs and high-volume brands searching for an advanced WMS

    Logiwa is a leader in cloud-native fulfillment technology, revolutionizing high-volume fulfillment for third-party logistics (3PLs), B2B and B2C fulfillment networks, and direct-to-consumer brands. Our flagship product, Logiwa IO, is an advanced Fulfillment Management System (FMS) designed to scale operations in the digital era. Logiwa elevates digital warehousing to new heights, ensuring dynamic and efficient fulfillment processes. Our commitment to AI-driven technology, combined with a focus on customer-centricity, equips businesses to adeptly navigate and excel in rapidly changing market landscapes. Discover the future of smart fulfillment and how you can fulfill brilliantly with Logiwa IO.
    Learn More
  • 5
    Mpge

    Mpge

    Mpge

    Mpge is a wrapper of meterpreter (msfconsole, msfpayload and msfencode) of Metasploit Framework directly integrated with Mac OS X Snow Leopard 10.6.8 and with OS X Mavericks 10.9. With Mpge is possible make trojan horse files for Microsoft Windows, Linux and Mac OS X 10.3 Panther, OS X 10.4 Tiger, OS X 10.5 Leopard and OS X Montain Lion 10.8.1 for all Mac OS X is possible make a trojan horse files contains a reverse shell into files .pkg and files .app. I used three real Mac OS X: Attacker:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    organon

    This program focuses on automating the download, installation and compilation of pentest tools from source

    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    InjectionDenied is a bash/gawk program that blocks PHP and SQL attacks by adding entries to /etc/hosts.deny (it works like DenyHosts with SSH). The daemon inform the admin about the new block host by mail.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A light script to make a black-list system troug iptables. You can create the black-list and manage it troug this program. Please read README file to know better this script.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9
    ProShield is a security program for Ubuntu/Debian Linux. It helps ensure your system is secure and up-to-date by checking many different aspects of your system. Regular use is recommended.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Find out just how much your login box can do for your customer | Auth0 Icon
    Find out just how much your login box can do for your customer | Auth0

    With over 53 social login options, you can fast-track the signup and login experience for users.

    From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
    Sign up
  • 10
    OneKript is a Front-End for the program of disk encryption "on the flye" TrueCrypt, released under license GPL. It has been developed with the environment Kommander for KDE. At the moment is available the version 0.7.2.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Multispoof exploits weak authentication method based on IP-MAC pairs checking, implemented frequently in Ethernet networks by ISPs. This program allows to multiply user's throughput and serves as a demonstration of spoofing effectiveness.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    bddshell is a command line program for deductive database-based analysis. Its primary focus is software vulnerability detection. It acts as a front-end to a number of other programs, such as bddbddb and joeq.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    This is a powerful packet monitor program like sniffer that runs under linux's text mode . Its functionalities include the ip/non-ip retrieval and monitor from data-link layer to application layer
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Logcheck is software package that is designed to automatically run and check system log files for security violations and unusual activity. Logcheck utilizes a program called logtail that remembers the last position it read from in a log file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This is a program in script shell to manage user accounts, groups, rules and parameters for Squid Proxy. This application was developed to help new system administrators providing an easier and faster way to do this job.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Program deploy a firewall, that is custom built, and is dynamic to the needs of the host. -- -- moved to www.siology.net
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB