Showing 153 open source projects for "only one"

View related business solutions
  • Catch Bugs Before Your Customers Do Icon
    Catch Bugs Before Your Customers Do

    Real-time error alerts, performance insights, and anomaly detection across your full stack. Free 30-day trial.

    Move from alert to fix before users notice. AppSignal monitors errors, performance bottlenecks, host health, and uptime—all from one dashboard. Instant notifications on deployments, anomaly triggers for memory spikes or error surges, and seamless log management. Works out of the box with Rails, Django, Express, Phoenix, Next.js, and dozens more. Starts at $23/month with no hidden fees.
    Try AppSignal Free
  • Cut Data Warehouse Costs by 54% Icon
    Cut Data Warehouse Costs by 54%

    Easily migrate from Snowflake, Redshift, or Databricks with free tools.

    BigQuery delivers 54% lower TCO with exabyte scale and flexible pricing. Free migration tools handle the SQL translation automatically.
    Try Free
  • 1
    Generates a list of passwords (wordlist) for password crackers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    ICRON's Keyloger

    Version one of ICRON's Basic Keylogger

    This is just an extremely basic key-logger.The source code is up so have fun. This key-logger stores it's logs inside of a text file known as Logs.txt. Later versions will contain a couple perks. I will release them in the coming weeks. This is for educational purposes only. I do not condone any nefarious uses for said keylogger. DO NOT USE ON ANY SYSTEM THAT IS NOT YOUR OWN. Also you must inform all users of said computer (if their are multiple accounts) that you will be using said program....
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    Net Send

    Net Send

    Net Send is an Encryped Communications Program

    Written in Python, Net Send features a current two way chat dialogue that features a customizable encryption system. Users can change what their output is encrypted as before communicating. This eliminates issues with having to develop sophisticated encryptions tha risk being cracked.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    CrackThis!

    CrackThis!

    Data Encrypton Software utilizing IMPACT

    We developed a classic solution that reflects the very nature of quantum mechanics in whole, ultimately demonstrating the raw power of numbers. We developed a truly irreversible one way algorithm which, when applied to information, both encrypts and decrypts it. That is to say that the algorithm which encrypts the information works in the same direction as the algorithm that decrypts it. This in itself is the very nature of quantum mechanics - "forward only". Through a quantum-entanglement-like operation, we created very robust encryption methodology which will secure information for some time to come through sheer numbers and flexibility. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 5
    Weeny Free Password Manager

    Weeny Free Password Manager

    Manage all your passwords in an encrypted database.

    Weeny Free Password Manager is a free password manager tool to manage all your passwords in an encrypted database. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using secure asymmetric cryptographic algorithm. The secure asymmetric cryptographic algorithm includes: 3DES, Blowfish, Cast128, DES, Ice, Ice2, RC2, RC4, Rijndael, Serpent, Tea, Thin Ice and Twofish.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    RŌNIN-LINUX

    RŌNIN-LINUX

    Linux Security Distro for Data Forensics, Pen. Testing, and IR.

    RŌNIN is a linux security distribution (based on Lubuntu) that provides a platform for both training and conducting professional data forensics, penetration testing, and incident response. The primary objective of RŌNIN is to provide a fast/light linux desktop along with a curation of security tools and resources that are relevant for professionals, instructors, and students alike. In support of this objective, the RŌNIN project is guided by two main goals: * Focus on Continual...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7

    Selective Data Backup (DoS App)

    Select the files you want backed up.

    ...It copies the entire folder structure, so you know exactly where your files and everything backed up, are/were. Now, also included in this is my Password Safe program. Store all your passwords in 1 convenient location. But, wait "wouldn't that be dangerous?", NOPE! It's all encrypted useing my special Cypher Encryption Algorithm: basically, you have to have the password, or you'll never see your data again! This also means that ONLY YOU get to see your passwords/accounts. So, if you don't feel like memorizeing 47 accounts (like I), then download this thing! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Certificate Helper
    Certificate-helper is a utility desktop application written in Java designed and created to assist (mainly developers) in creating and viewing keystores and digital certificates. This is done via a user interfaces implemented in Swing.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9

    Client Side Login Authentication Helper

    The project is to do pre-check of password before sending to server

    ...The purpose of the project is to capture and address unintentional human errors that could be resolved at the client side during the login process. Solution Abstract: An array of images are loaded at the client side. One of the images is displayed for every password entered based on a simple algorithm. The image is computed based on the password and hence it will change only when the user changes his password. Hence, the displayed image will become familiar to the user until he changes the password. It helps the user understand whether he input the right password before sending it to the server. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 10

    FTP HUNTER

    FTP HUNTER is small ftp cracker.Crack FTPs

    FTP HUNTER is small ftp cracker.very easy to use,please read read me files before you start program,please report any trouble.FTP Hunter is written in C#. anyone can download this and develop.please report bug and develop this tool. FOR EDUCATIONAL PURPOSES ONLY MS,MR c0der ann#1 Sri lanka
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    JPassword Recovery Tool

    JPassword Recovery Tool

    Password recovery tool for compressed archives and md5, sha-1/2 hashes

    This is a simple but sophisticated open source password recovery tool for M$ Windows, it can effectively 'crack' any password protected archive that can be decompressed by 7zip given enough time and resources. It can also bruteforce MD2, MD5, SHA-1 and SHA-2 hashes (SHA-256, SHA-384, SHA-512), CRC16, CRC32, CRC64 and Adler32 hashed passwords for both Windows, and Linux. It requires java 7u4 and above, and 7-zip v9.20 and up for archive recovery. Keeping these above applications up to date...
    Downloads: 61 This Week
    Last Update:
    See Project
  • 12

    iPassword Generator

    portable password generator

    ...The main difference between iPassword Generator and other password creators is that, the passwords created by it looks like random strings, but they're not. The passwords can be and can only be recreated if you selected the correct keyfile and entered the correct password if it's encrypted, but if you lost the keyfile, no one can retrieve the passwords back.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    wiOne Antivirus Beta

    wiOne Antivirus Beta

    #1 Antivirus In Indonesia

    An Anti-Virus Help You To Clean Virus From Your Computer The Beta Version Is Know +66 Virus.But The Ram/Cpu Usage Is Minimum ANd Can Run In Slow Computer . This Program Only Run On Windows Xp,2003,Vista,2008,7,8
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Web Crawler Security Tool

    A web crawler oriented to information security.

    Last update on tue mar 26 16:25 UTC 2012 The Web Crawler Security is a python based tool to automatically crawl a web site. It is a web crawler oriented to help in penetration testing tasks. The main task of this tool is to search and list all the links (pages and files) in a web site. The crawler has been completely rewritten in v1.0 bringing a lot of improvements: improved the data visualization, interactive option to download files, increased speed in crawling, exports list of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    CryptX Project v3.56

    A Quick Encryption Program!

    CryptX Is An All In One Text Encoder, Hash Calculator And Checksum Checker! It Combines Ease Of Use With Extraordinary Features! Some Of It's Features Include: Interactive Interface Hashing Function: {HASH ONLY} SHA1 SHA256 SHA384 SHA512 MD5 RIPEMD160 Key Generation: MACTripleDES Key Generation MD4 Hashes: Base64: {Encrypt/Decrypt} With/Without Password Encoding: Binary {Encrypt/Decrypt} Checksum Hashes: SHA1 SHA256 SHA384 SHA512 MD5 RIPEMD160 Checksum Auto-Save Read An Encrypted Text File To Decrypt It Read A Plain Text File To Encrypt It Save The Encrypted/Decrypted Text And Of Course Its All Free! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    2Pix
    ...Version 1.1 now provides plausible deniability because no unencrypted signature is stored in the image header. It should be impossible to prove an image contains a hidden file (if you use a strong password and only use 1 or 2 bits per pixel component). NOTE: This project has been moved to Google Code. http://code.google.com/p/2pix-steganography
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    stampcha

    The user friendly captcha is stampcha

    ...STAMPCHA is a very user friendly and easy to install software for web sites. STAMPCHA is designed to show a series of images to user and ask a question based on that. only one image is the correct answer.Unlike other CAPTCH software its very easy for the users to respond.Users only need to type the relevant image number in the text box. Since the order of the images and the questions are generated randomly each time user visit the page Its practically impossible for robots to break. You can add your own questions and images which makes it even harder for the robot to break.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Store several passwords with a single portable program. Just remember only one password. It's up to you to decide how many password you want to store, and which name you want to give to that password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    SSDownloader
    SSDownloader or Security Software Downloader is a small, easy to use download manager specially designed for security software. Note: This project is abandoned. Software links might be outdated as they are not beeing updated actively.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    cPanel Setup, Secure and Plugins
    cPInstall is a small bash script created at first for UnderHost customer then released to public. Its purpose is to give access to install, optimize, secure any common cPanel plugin within one click. Useful for novice and helpful for advanced users. http://underhost.com - Offshore Hosting Solutions New version coming soon!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Build FW1 Cisco Netscreen PolicyFromLogs
    These three tools build Checkpoint, Cisco ASA or Netscreen policys from logfiles. They write dbedit, access-list or set address, set service and set policy commands for the traffic seen in the logs, that can be cut and pasted into the firewalls. WOOT
    Downloads: 8 This Week
    Last Update:
    See Project
  • 22
    Proxy Tester is a proxy list tester and then it generates a wpad.dat file you can use for your browser based on working servers. wpad.dat file selects a random proxy server from the list of provided working proxy servers with each connection request.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    PassKey
    Universal password generator. This program generates password for each account you want from hostname, username and one global password (passkey, master password, skeleton key). So you need to remember only one password.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 24
    A web-based system to assign a set of known persons anonymous ids, such that every person only receives one id. The ids cannot be mapped to the corresponding persons afterwards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Maar (command-line software) locks / unlocks files and folders. To crypt password is used MySecret program originally written by David Ireland, copyright (c) 2002-7 by D.I. Management Services Pty Limited <www.di-mgt.com.au>, and is used with permission.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB