Showing 22 open source projects for "metasploitable-2"

View related business solutions
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • The AI workplace management platform Icon
    The AI workplace management platform

    Plan smart spaces, connect teams, manage assets, and get insights with the leading AI-powered operating system for the built world.

    By combining AI workflows, predictive intelligence, and automated insights, OfficeSpace gives leaders a complete view of how their spaces are used and how people work. Facilities, IT, HR, and Real Estate teams use OfficeSpace to optimize space utilization, enhance employee experience, and reduce portfolio costs with precision.
    Learn More
  • 1
    USB Raptor

    USB Raptor

    Lock and unlock your computer using USB flash drives as keys

    ...If this specific file is found the computer stays unlocked otherwise the computer locks. To release the system lock user must plug the USB with the file in any USB port. Alternative the user can enable (or disable) two additional ways to unlock the system such is network messaging or password. Features • Automated USB lock and unlock function • Lock file contents are encrypted • Password to override lock (can be enabled by user) • Network command to override lock (can enabled by user) • USB drive serial number check (can be enabled by user) • Unique key for each system (can be enabled by user) • Status report function
    Leader badge
    Downloads: 1,289 This Week
    Last Update:
    See Project
  • 2
    Pen Possible

    Pen Possible

    scans a given textual string in 146 pen on paper possible combinations

    Application scans a given textual string in 146 pen on paper possible combinations- horizontal, vertical, diagonal, reverse, join top, join bottom, groups(2/3/4..), edges & in quadrant dimensions of your choice
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    ClamAVSuite

    ClamAVSuite

    An alternative to ClamWin

    ClamAV-Suite is a gui for ClamAV developed for Windows 10 (x64 only). ClamAV-Suite allows to scan your device in three different ways: -fast scan -full scan -custom scan For other information see documentation. If you represent CISCO and suspect trademark violations contact me at: dntpanic[at]users[dot]sourceforge[dot]net After 3 years since the project is on sourceforge I realized that names and logo could be copyrighted.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    Endico - Text Encrypt

    Endico - Text Encrypt

    Fastest way to make secure text.

    Help to convert text into secret codes , so that you can mail,chat and transfer text securely to prevent hacking. How to use : Step one - Open Endico 14 Step two - Decide what to do (Text Encode/Text Decode) Step three - If You Selected Text Encode -> Then Type/Copy/Open .txt file to convert. Step four - Copy the converted text into clipboard to chat,mail,print process etc. Step five - If you want to Decode the code the again follow step two. Step six - Congratulations! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Failed Payment Recovery for Subscription Businesses Icon
    Failed Payment Recovery for Subscription Businesses

    For subscription companies searching for a failed payment recovery solution to grow revenue, and retain customers.

    FlexPay’s innovative platform uses multiple technologies to achieve the highest number of retained customers, resulting in reduced involuntary churn, longer life span after recovery, and higher revenue. Leading brands like LegalZoom, Hooked on Phonics, and ClinicSense trust FlexPay to recover failed payments, reduce churn, and increase customer lifetime value.
    Learn More
  • 5
    Shiela USB Shield

    Shiela USB Shield

    The Powerful Protection for PC Against Viruses from Removable Drives

    ... * It locks autorun.inf and associate executable files in multiple instance * Delete/Freeze the shortcut file or clone file, and restores the original automatically. * It is free and open source. System Requirements 1) Windows 2000 or later 2) 256Mb RAM or higher 3) 1GHz Processor or faster 4) .NET Framework 2.0 or later must be installed
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    AnDDoS

    AnDDoS

    Stealth Anonymous Kill-The-Server

    The classic DDoS! Overload the server. It is simple but harmful. Watch out your server.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 7
    Knock to Windows

    Knock to Windows

    Knock Code for Windows - While Screen On

    ...No need to remember difficult password. It's a great alternative for stock Windows password lock. Beta Changes: https://sourceforge.net/p/knocktowindows/tickets/2/ If you liked my project you can donate with Bitcoins: http://goo.gl/ZYMTX7
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Simple VB.Net Encryption software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Downloads: 0 This Week
    Last Update:
    See Project
  • Agentic AI SRE built for Engineering and DevOps teams. Icon
    Agentic AI SRE built for Engineering and DevOps teams.

    No More Time Lost to Troubleshooting

    NeuBird AI's agentic AI SRE delivers autonomous incident resolution, helping team cut MTTR up to 90% and reclaim engineering hours lost to troubleshooting.
    Learn More
  • 10
    Quick Check

    Quick Check

    Quick Check is a small MD5 comparison program.

    ...At this point in the project it just compares MD5 however in the future it might support SHA1 and others. When you first open the program you are greeted with a small form that contains two text boxes and one button. First you enter the hash of the file you got from where you downloaded, next click the button and browse to the downloaded file and the program will retrieve the MD5 hash and compare. If they match, the label at the bottom left will let you know, same on the contrary. Please read the README after you download this as it contains some decent info as well. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Dir2Encrypt
    Dir2Encrypt encrypt a folder with privat files and subfolders into a single password protected archive file. The archive file can be a zip file or a self extracting exe file. Microsoft Net Framwork 2 has to be installed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    WPACrackGUI

    WPACrackGUI

    WPACrackGUI es un entorno gráfico de crackeo de redes WPA con john.

    WPACrackGUI es un programa que mediante a la generación asistida de john puede crackear redes WPA sin ningún problema simplemente clickeando unas veces.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 13
    SpoofyR2 is a VB.NET tool which allows you to jump in an existing network connection between 2 hosts (man-in-the-middle). For example you are able to manipulate some network-traffic like a dns-request.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This toolkit has complete security Package start from Tweak manager , Updater , Virus scanner ,Proxy server and many more This will be help full for user from corporate to small user we have already started working on it will completed with 2 months
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Camiel's Multi Tool
    dit is een Multi Tool die voral bedoelt is voor gebruik op voortgezet onderwijs.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    A small encryption / decryption application that we are giving away free of charge. Version 1.0.00 - RSA only at the moment. But later versions will have a plug-in system for adding more algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Secure P2P Instant Messenger running on .NET Framework 2.0. Uses server to store user information (user name, password, email address, friends list, log in state, IP address) in encrypted form. Uses custom designed symmetric encryption algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Innovative prototype of network applications such as TCP fuzzers that can be used for many purposes such as network and application security assessments and more. Adapt it freely to fit your needs or to simply understand how TCP works in .NET.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    File Encyrption Application Written In .NET 2.0
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Project Identity aims to develop an Open source Biometric Solution i.e. complete set of tools and libraries for Biometric identifiction systems. This project has intial code done by students as their summer project at Echo IT Labs Pvt. Ltd.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A "Wrapper"-Service for Microsoft.NET for the RSA SecurID 2 factor Token Login ACE-Agent. Usable from ANY .NET-Application (including ASP.NET). Providing a custom Pipeline-Service and a remoted Factory to create Pipelineobjects in your application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    SecondFactor

    SecondFactor

    Two-Factor Authenticator for Windows.

    Need a two-factor authenticator for your computer? Tired of using your phone to log in to a website on your desktop? Introducing SecondFactor, a One-Time-Password Authenticator for Windows. SecondFactor supports Time-based One Time Passwords, which can be added directly, using a QR Code, or with an OTPAUTH URL. Your Secrets are stored securely for your local account, with the option to protect the program with a password for advanced security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB