[go: up one dir, main page]

Showing 4 open source projects for "torrent for kali linux"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Powerful Business Process Automation Icon
    Powerful Business Process Automation

    With ThinkAutomation, you get an open-ended studio to build any and every automated workflow you could ever need.

    When a message is received ThinkAutomation automatically executes one or more Automations. Automations are created using an easy to use drag-and-drop interface to run simple or complex tasks. Automations can perform many business process Actions, including: updating company databases, CRM systems and cloud services, sending outgoing emails, Teams & SMS messages, document processing, custom scripting, integration and much more. Over 100 built-in actions are included, plus ThinkAutomation is extensible with Custom Actions.  
    Learn More
  • 1
    BerserkArch

    BerserkArch

    A bleeding-edge, security-centric Arch-based Linux distribution.

    BerserkArch is a security-focused, performance-tuned Linux operating system (OS) based on Arch Linux, designed for developers, hackers, and technical users. A bleeding-edge, security-centric Arch-based Linux distribution crafted for hackers, developers, and nerds alike. Following the Arch Linux philosophy, it is designed to be highly customizable, allowing users to build their environment with only the components they need, rather than having a lot of pre-installed software like some other security distributions (e.g., Kali Linux). ...
    Leader badge">
    Downloads: 194 This Week
    Last Update:
    See Project
  • 2
    Mobilinux - Linux for Android

    Mobilinux - Linux for Android

    This application will allow you to install and run Linux on Android !

    The app supports ROOTED as well as NOROOTED devices. Use your mobile as a Pocket PC !! For Root Method: The application creates a disk image on a flash card, mounts it and installs an OS distribution. Applications of the new system are run in a chroot environment and working together with the Android platform. All changes made on the device are reversible, i.e. the application and components can be removed completely. Installation of a distribution is done by downloading files from...
    Leader badge">
    Downloads: 62 This Week
    Last Update:
    See Project
  • 3
    Debox GNU/Linux Live CD

    Debox GNU/Linux Live CD

    Debox Linux is a live distro based on Debian distribution and Openbox

    Debox GNU/Linux Live CD is a live hybrid distribution based on Debian and OpenBox. Can be used on computers supporting 32-bit (x86) or 64-bit (x86_64) instruction set architectures. Debox was made with the middle and novice user in mind. Includes a wide range of software: word processor, media players, internet browser, email client, disk utilities, java and few games. Also, a plenty of printers, scanners, bluethooth, web cams, digital tv, fax are supported by default. Different...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    EZtorrent is a tool that simplifies the process of publishing content via BitTorrent. EZtorrent automates the process of generating .torrent metainfo files, as well as starting trackers and seeders.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Next-generation security awareness training. Built for AI email phishing, vishing, smishing, and deepfakes. Icon
    Next-generation security awareness training. Built for AI email phishing, vishing, smishing, and deepfakes.

    Track your GenAI risk, run multichannel deepfake simulations, and engage employees with incredible security training.

    Assess how your company's digital footprint can be leveraged by cybercriminals. Identify the most at-risk individuals using thousands of public data points and take steps to proactively defend them.
    Learn More
  • Previous
  • You're on page 1
  • Next