[go: up one dir, main page]

Showing 7 open source projects for "security"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • Deliver trusted data with dbt Icon
    Deliver trusted data with dbt

    dbt Labs empowers data teams to build reliable, governed data pipelines—accelerating analytics and AI initiatives with speed and confidence.

    Data teams use dbt to codify business logic and make it accessible to the entire organization—for use in reporting, ML modeling, and operational workflows.
    Learn More
  • 1
    LabMACOSX
    LabMACOSX: Is a laboratory of applications written in Applescript language. Brutosx is brutus.pl remote login and password bruteforce cracker inserted inside the application Brutosx (need only of Net::Telnet Perl module are required get them at CPAN, while the list of users and passwords, and the service is inserted inside the application). SSHOSX is ssh application client to establish an ssh connection from client to server, Nmaposx is nmap port scanner invoked from the application Nmaposx...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Jacksum

    Jacksum

    a free cross platform checksum utility, supports 58+ hash algorithms

    Development of this project has been moved to https://github.com/jonelo/jacksum. This site has been left for historical purposes ONLY, you find older Jacksum versions here. Please visit the GitHub site for current development. Jacksum 1.7.0 is a platform independent checksum utility (written entirely in Java) for computing and verifying (integrity check) checksums, CRC and hashes (fingerprints). It supports 58 popular hash algorithms and a lot of unique features.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Fake Virus Mac

    Fake Virus Mac

    As the title suggests, this is a tutorial to make fake virus for Mac.

    We have not seen any virus for Mac OS X yet but we have seen some malwares. This trick can be useful, if you want to scare your someone who is probably new to Mac. As the title suggests, this is a tutorial to make a FAKE VIRUS FOR MAC OS X. My Website: http://techbarrack.com
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    Hidden Files Switcher
    Hidden Files Switcher is a small, easy to use, simple applescript application to switch between showing and hiding hidden files on OSX. Includes a fast setting to toggle visibility simply double clicking.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Network Management Software and Tools for Businesses and Organizations | Auvik Networks Icon
    Network Management Software and Tools for Businesses and Organizations | Auvik Networks

    Mapping, inventory, config backup, and more.

    Reduce IT headaches and save time with a proven solution for automated network discovery, documentation, and performance monitoring. Choose Auvik because you'll see value in minutes, and stay with us to improve your IT for years to come.
    Learn More
  • 5
    gpg-mime-filter
    Ruby script framework for the encryption and decryption of email according the GPG/MIME Format (RFC 3156). It can be used for e.g. for Apple' Mail as replacement for GPGMail.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    The aim of securiApp is to help people who do not know much about internet security to be able, with minimum effort to automatically configure their firewall to protect a Mac OS X system from hackers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Car Alarm for your Apple Laptop, Move the laptop and it will sound a siren just like a car alarm. The days of stolen laptops are limited
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next