Planfix: Manage Projects, Team's Tasks and Business Processes
All-in-One Enterprise-Level Software is Now Available for SMB
Planfix is like a souped-up business process management system for folks who really know their stuff. It's built to help you dive deeper and gives you more options than your run-of-the-mill project and task management systems. Best part? Even small businesses and non-profits can get in on the action.
Learn More
EHS Software and Management System
ERA offers the only full EHS&Q platform with advanced automation to drive your complete compliance.
ERA Environmental Software Solutions develops web-based EHS management software for small, medium, and large manufacturers needing to comply with federal, provincial, and state regulations, monitor their air, water, and waste emissions and other environmental outputs, author and manage Safety Data Sheets (SDS) in more than 40 languages, or standardize their Health and Safety procedures for incident and inspection tracking, training delivery, and audit management. The platform also supports comprehensive reporting for programs like TRI, Tier II, Title V, NEI, and NPRI. Companies across the automotive, aerospace, general manufacturing, and paints and coatings industries, to name a few, rely on ERA’s all-in-one, SOC 2 Type II certified SaaS for complete coverage of their EHS needs.
A small encryption / decryption application that we are giving away free of charge.
Version 1.0.00 - RSA only at the moment.
But later versions will have a plug-in system for adding more algorithms.
A Visual Basic implementation of Bruce Schneier's Solitaire Encryption Algorithm that encrypts plain text by means of a deck of ordinary playing cards.
OpenSource Anti-Trojan Made From VB.NET 2005(Comes With A Few Signatures). But, There Is No Full System Scan...YOU Have To See For Your Self!(Uncontinued As .EXE)
Award-winning proxy networks, AI-powered web scrapers, and business-ready datasets for download.
How the world collects public web data
Bright Data is a leading data collection platform, enabling businesses to collect crucial structured and unstructured data from millions of websites through our proprietary technology. Our proxy networks give you access to sophisticated target sites using precise geo-targeting. You can also use our tools to unblock tough target sites, accomplish SERP-specific data collection tasks, manage and optimize your proxy performance as well as automating all of your data collection needs.
WinRAP ( Windows Running Applications Protector ) is a utility which allows you to hide windows application, and hide programs which are running on your screen. It will instantly hide all or certain programs on your screen with a key press.
Yet Another Process Monitor (YAPM) is a powerful process viewer for Windows that monitors the services & processes, their modules, threads, handles, windows, TCP/UDP connections... etc. running on local system or on any of the computers on your network.
Start Gemaad on a computer and it will :
- Create or complete a text file containing the computers MAC address
- Set the WIFI card to DHCP mode
You can now simply copy this MAC address to your admin console for any case of MAC address filtering
A free-to-use workflow automation tool, n8n lets you connect all your apps and data in one customizable, no-code platform. Design workflows and process data from a simple, unified dashboard.
Recolition is a simple file encryption program which uses AES as it's algorithm. It will encrypt exisiting files to the .encrypt file extension and then decrypt them back to thier original state.
Innovative prototype of network applications such as TCP fuzzers that can be used for many purposes such as network and application security assessments and more. Adapt it freely to fit your needs or to simply understand how TCP works in .NET.
Visit http://sourceforge.net/projects/nreg to view the new one. This is the update! It has better serial protection, more customizable options, and it has a better key maker! It has a ban and used key list system, and emails you when someone registers.
BcryptFE is a graphical frontend for controlling the bcrypt win32 command line utility. Written in vb.net 2008 and designed to allow easier encryption/decryption of multiple files and directories. Filenames can be hidden in an index file to stay private.
This is a website username and password database tool. It stores your website's username and password in an Access 2007 database for one click retrieval. Requires AccessDatabaseEngine.exe to be installed if Access 2007 is not present on the system. Vers
Accepts machine specific, time sensitive password from standard user to then allow the user to run a new application as local Administrator. Released under GPL.
With this application you can hide files in a picture. Now the data are hidden in the picture and can be extracted with WinZip or an another Zip-Programm. Browse all Packages for all Releases: .Net and Java
Ein einfacher Passwort Generator, welcher 3 verschiedene Typen von Passwörtern erstellt: Buchstaben, ZahlenMix, Spezial. Sobald ein Passwort generiert wurde, wird dessen Qualität geprüft. Weiter kann ein eigenes Passwort auf Sicherheit überprüft wer
Crypto.Net is a free and open cryptography library for C# and .Net. AES (Rijndeal), Twofish, Blowfish, RSA, Diffie-Hellman, SSL/TLS, X509-Certificate builder, stream cipher modes or a secure netowrk stream are only some features of this library.
NMAP Configurator is a GUI frontend for NMAP on Windows systems. User must have installed NMAP for this program to work properly. New version fixes the problem of inability to access buttons if display is set to 800x600.
wssecure Application Monitor is a free software that can monitor processes in real time. It will alert automatically whenever a new process is detected and it will again alert if it becomes modified.
This project is based off of Sam Rape. The final product is a bootable floppy which copies the sam file, compresses it and puts it on a disk. A detailed description can be found at datastronghold.com/archive/t10429.html
Bildsoft releases under GPL License the Blackhorse Algorythm, used by all its software.
Blackhorse provides high-level encryption for any file.
Blackhorse is very quick to encrypt/decrypt data, thanks to a particular technology.