Information Security Made Simple and Affordable | Carbide
For companies requiring a solution to scale their business without incurring security debt
Get expert guidance and smart tools to launch or level up your security and compliance efforts without the complexity.
Learn More
Resco toolkit for building mobile apps
A no-code toolkit for building responsive and resilient mobile business applications for Microsoft Power Platform, Dynamics 365, Dataverse and Salesfo
Deploying mobile apps with Resco takes days, not months—all without writing a single line of code. Workers can download the Resco app from AppStore, Google Play, or Windows Store, log into your company environment, and instantly use the app you have published on any device.
Fills a rectangle using given tetris shapes (tetraminos) using an optimized brute force algorithm.
A puzzle can have many different solutions; this solver will stop at the first one. Not all puzzles are solveable.
Created to solve the annoying tetris puzzles in The Talos Principle and Sigils of Elohim.
This software uses a geneticalgorithm to "evolve" reactor designs for Schema's space-simulation game, Star-Made (http://star-made.org/). One of the more unique aspects of the game is that ship power management is not as simple as filling a cube with power generation blocks. This mechanism leads to difficulties in getting maximal power generation out of such reactors.
HTTPBrute is used to calculate HTTP Digest Access Authentication as per RFC 2617. The tool will be able to perform brute force attacks to retrieve a lost password for a given Authentication response. MD5 is the only hashing algorithm implemented.
Simple UI to test the effectiveness of a heuristic algorithm against the brute force method for path finding among an arbitrary number of arbitrarily placed points on a grid. This is an educational project, don't expect new and better methods.
CryptoHelper is a Java program designed to aid in the decryption of classical ciphers, ie pre WWII ciphers. It brings together tools like frequency analysis, friedman tests, enciphering/deciphering for several clasical ciphers, and brute force algorithm
Disk Optimizer selects files to be placed on any disk medium that will maximize the space used. It is very efficient in finding an optimum file set since it uses a GeneticAlgorithm instead of brute force.