Showing 138 open source projects for "delphi security"

View related business solutions
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    Casbin

    Casbin

    An authorization library that supports access control models

    An authorization library that supports access control models like ACL, RBAC, ABAC for Golang, Java, C/C++, Node.js, Javascript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter) and Elixir. In Casbin, an access control model is abstracted into a CONF file based on the PERM metamodel (Policy, Effect, Request, Matchers). So switching or upgrading the authorization mechanism for a project is just as simple as modifying a configuration....
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    jCasbin

    jCasbin

    An authorization library that supports access control models

    An authorization library that supports access control models like ACL, RBAC, ABAC for Golang, Java, C/C++, Node.js, Javascript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter) and Elixir. In Casbin, an access control model is abstracted into a CONF file based on the PERM metamodel (Policy, Effect, Request, Matchers). So switching or upgrading the authorization mechanism for a project is just as simple as modifying a configuration....
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    PHP-Casbin

    PHP-Casbin

    An authorization library that supports access control models

    An authorization library that supports access control models like ACL, RBAC, ABAC for Golang, Java, C/C++, Node.js, Javascript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter) and Elixir. In Casbin, an access control model is abstracted into a CONF file based on the PERM metamodel (Policy, Effect, Request, Matchers). So switching or upgrading the authorization mechanism for a project is just as simple as modifying a configuration....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Capstone

    Capstone

    Capstone disassembly/disassembler framework

    ...Implemented in pure C language, with lightweight bindings for D, Clojure, F#, Common Lisp, Visual Basic, PHP, PowerShell, Emacs, Haskell, Perl, Python, Ruby, C#, NodeJS, Java, GO, C++, OCaml, Lua, Rust, Delphi, Free Pascal & Vala (ready either in main code, or provided externally by the community).
    Downloads: 2 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    Screen Protector
    This application was developed to prevent data leaks such as screenshots and video recordings that can be made from systems without user permission. It does not require installation and is designed for portable use. The project is open source. Due to the techniques used to increase security, some security software (antivirus) may perceive it as a threat. Screen Protector Information ve Documents https://beytullahakyuz.gitbook.io/projects/screen-protector
    Downloads: 6 This Week
    Last Update:
    See Project
  • 6
    winPenPack

    winPenPack

    The portable software collection

    winPenPack is a project that aims at collecting the most frequently used and most popular open source applications made portable, so that they can be executed without installation from any USB Flash Drive or Hard Disk. The winPenPack suites offer a wide range of portable applications like office tools, internet tools, multimedia tools, development tools, security applications and other frequently used utilities. Everything you need, completely free, open source and portable!
    Leader badge
    Downloads: 495 This Week
    Last Update:
    See Project
  • 7
    KeyNote NF (New Features)
    Tabbed notebook with RichText editor, multi-level notes and strong encryption. This project is an evolution of Tranglos Keynote (of Marek Jedlinski), with new features like: - Unicode compliant - Improvement in image management - Improved Find All - Redesigned navigation history mechanism - New file format: compressed - Improved treatment of links, and new internal KNT links, vinculated to markers, not only to caret position - Improved Clipboard Capture / Web Clip - Alarms...
    Leader badge
    Downloads: 43 This Week
    Last Update:
    See Project
  • 8
    aBLhackPsw

    aBLhackPsw

    aBLhackPsw v7.0 - Password recovery tool

    Now with aBLhackPsw v7.0 you can see the password in x32 and x64 programs !!! aBLhackPsw v7.0 run on Wondows 11 !!! aBLhackPsw is a password recovery tool - utility for recovering forgotten or lost password. With this program you can see asterisks ***** password from ***** fields (Outlook Express, Total Commander (FTP) and other programs). There is no illegal password hacking technique involved, it only reads or uncovers hidden password character that are covered by asterisks. This...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    Seed Tag

    Seed Tag

    Hide your SEED phrase in a fake SEED phrase

    use only v5! ru: хотелось железный кошелёк, но у них один недостаток — кто его в держит в руках, того и деньги. Эта программа попытка сделать что-то вроде brainwallet, можно используя три ключа (число, пароль и адрес почты) превратить свою сид-фразу в бессмысленную сид-фразу, которую уже можно записать на железный кошелёк/армейский жетон(dog tag). Настоящего шифрования здесь нет, но от честных людей может помочь. Pack your seed phrase into fake phrase using three keys (some number,...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 10
    PeaZip

    PeaZip

    Free Zip software and Rar extractor

    PeaZip is a free archiver tool. The application provides an unified, natively portable, cross-platform file manager and archive manager GUI for many Open Source technologies like 7-Zip, FreeArc, PAQ, UPX. Create: 7Z, ARC, Brotl, BZip, GZip, PEA, TAR, WIM, XZ, ZPAQ, ZIP, Zstandard files and more Open and extract 200+ file types: ACE, CAB, DEB, ISO, RAR, ZIPX and more Features of PeaZip includes extract, create and convert multiple archives at once, create self-extracting archives...
    Leader badge
    Downloads: 1,490 This Week
    Last Update:
    See Project
  • 11
    Advantages: Three-tier security system: The use of Tor, VPN, and data obfuscation creates a robust barrier for user data protection. This complex combination of technologies makes tracking user activities considerably more challenging. RAM Disk: All user activity is redirected to a RAM disk, ensuring high operational speed and guaranteeing that no data remains after the computer is rebooted. This ensures 100% deletion of all traces of use
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    Bubbles

    Bubbles

    Bubbles the simple, easy to use HTTP web server, browser controlled

    Bubbles the simple, easy to use HTTP web server that is browser controlled, and capable of serving static files over the internet, either streamed from disk, or direct from RAM without lag. A GUI administration panel is accessed through your web browser (e.g. "http://localhost:1080/admin/" + default password of "admin"), which controls all her settings and vital functions, all in real time. Apart from serving files, she is capable of tracking site visits (site counters), receiving...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Electric Diagram ToolKit for C/C++, .NET

    Electric Diagram ToolKit for C/C++, .NET

    power system configuration and simulation, c/c++ and .NET

    Open Source Code power systems, wiring diagrams, distribution maps, geographic wiring diagram, the power system configuration and simulation, power dispatch, automatic control, C / C ++ and DELPHI and .NET, and web application examples and , 100% VC++ Source Code is Shipped. http://www.ucancode.net E-XD++'s full source code will help you to address all security concerns quickly and easily. It will saves you mo than 90% building time to build a very professional power system software and many OCX controls are also shipped for using with other platforms like C#, Delphi, Java, etc. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A-Radar

    A-Radar

    Remote Connection Manager and Monitor

    A-Radar supports already the following protocols and services: RDP (Remote Desktop/Terminal Server) VNC (Virtual Network Computing) ICA (Citrix Independent Computing Architecture) SSH (Secure Shell) Telnet (TELecommunication NETwork) HTTP/HTTPS (Hypertext Transfer Protocol) FTP (File Transfer Protocol) SFTP (Secure File Transfer Protocol) Raw Socket Connections OFS (Open and monitor Folders) BFS (Backup Folders) RFS (Open and...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Easy Keytrans

    Easy Keytrans

    Assign strings/functions to function keys and Password Management

    Simple tool to assign strings or functions to function keys and password manager
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    AAMDirect II
    A.A.M Direct (formerly NNTP A.A.M Client) is a type of email system whereby two or more people can communicate privately and/or anonymously with strong encryption . It uses the alt.anonymous.messages news group and does not require a usual email address setup. Messages are sent to the news group directly or through the Tor network. Note: If you have AAMDirect II already installed, just download the AAMDirect.exe and replace the old executable. Rename the old executable first and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    RandoPass

    RandoPass

    Random Password Generator

    Generate random passwords from 8 to 100 characters long. Toggle the use of upper case, lower case, numbers, and various special characters. One-click copy to clipboard.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This used to be a tool written for an article in The Delphi Magazine by Marcel van Brakel and myself in 2005. It basically attempts to do the same as WinObj, but is written in Delphi.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    .Net Core for Delphi/Lazarus

    .Net Core for Delphi/Lazarus

    The best library to work with the .Net Core from Delphi and Lazarus.

    The .Net Core for Delphi/Lazarus (dotNetCore4Delphi) is a .Net Core Runtime Library for Delphi which helps Delphi/Pascal developers work with .Net Core. It is designed to provide a way to interact with .Net Core applications from Delphi/Pascal. What dotNetCore4Delphi can do: - Access .Net Core Framework Class Library. - Access Third Party .Net Core Libraries. - Access Your .Net Core Libraries. - etc Competitive Advantages: - Cross-platform framework that runs on Windows, Linux and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    .Net Runtime Library for Delphi

    .Net Runtime Library for Delphi

    This is the best library to work with the .Net framework from Delphi.

    The .Net Runtime Library for Delphi (CNClrLibrary) is the best library to work with .Net framework and .Net libraries from Delphi. It is designed to provide a way to interact with applications written in anyone of the .Net languages (such as C#, Visual Basic.Net, Delphi.Net, JScript.Net, etc) from Delphi. CNClrLibrary allows Delphi to use .Net libraries without the need for registry entries, COM registrations, or changes to the .NET libraries. Competitive Advantages: - No extra dll...
    Leader badge
    Downloads: 7 This Week
    Last Update:
    See Project
  • 21
    Simple Encryption Engine encrypt / decrypt / change password for SQLite database for the future use with your Delphi project. [Using SQLite with FireDAC]
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Delphi Face Detection

    Delphi face detection

    Delphi Face Detection Live Web Camera Delphi Face Recognition: https://sourceforge.net/projects/delphi-face-recognition/ For Live: Face Attendance System, Facial Emotion, Gender Recognition Security Application. Ethnicity/Nationality Recognition(Maybe Soon) Age? Works on IP Camera using RTSP. Runs on Windows XP to Windows 10 Available on MsAcceSS or SQLite Dataface!
    Downloads: 5 This Week
    Last Update:
    See Project
  • 23
    A client-server multithreaded application for bruteforce cracking passwords. The more clients connected, the faster the cracking. Plugin-based. Supports only RAR passwords at the moment and only with encrypted filenames.
    Downloads: 48 This Week
    Last Update:
    See Project
  • 24
    Dont Hijack This

    Dont Hijack This

    DHT is an anti-hacker tool to fix all the damage caused by viruses.

    Dont Hijack This is an anti-hacker tool to fix all the damage caused by malware. It enables the disabled windows components. It completely removes all the bots/viruses/malware infections in 35 seconds. Fixes: registry editing has been disabled by administrator Task Manger has been disabled by your administrator Windows defender is turned off by group policy proxy settings hijack virus (unable to connect proxy server) unable to install antivirus and antivirus killer windows firewall...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB