Showing 50 open source projects for "obfuscation"

View related business solutions
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
  • 1
    Obfuscar

    Obfuscar

    Open source obfuscation tool for .NET assemblies

    Obfuscar is an open-source .NET obfuscator released under MIT license. It provides basic obfuscation features that help secure secrets in a .NET assembly. An obfuscation tool designed for most .NET developers. Hide everything private, while keep everything public. You can achieve such simply via default settings. Hide class/method/property/event names that you don't want to expose. This is irreversible. String contents can be compressed so that end users won't easily learn them. However...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 2
    Sliver

    Sliver

    Adversary Emulation Framework

    Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. Sliver's implants support C2 over Mutual TLS (mTLS), WireGuard, HTTP(S), and DNS and are dynamically compiled with per-binary asymmetric encryption keys. The server and client support MacOS, Windows, and Linux. Implants are supported on MacOS, Windows, and Linux (and possibly every Golang compiler target but we've not tested them all).
    Downloads: 23 This Week
    Last Update:
    See Project
  • 3
    Optimus id transformation

    Optimus id transformation

    Id obfuscation based on Knuth's multiplicative hashing method for PHP

    With this library, you can transform your internal IDs to obfuscated integers based on Knuth's integer hash. It is similar to Hashids but will generate integers instead of random strings. It is also super fast. If you will be running your code on a 32-bit system or will be working with large prime numbers it is suggested that you install the GMP extension.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Logbook

    Logbook

    An extensible Java library for HTTP request and response logging

    Logbook is an extensible Java library to enable complete request and response logging for different client- and server-side technologies. It satisfies a special need by a) allowing web application developers to log any HTTP traffic that an application receives or sends b) in a way that makes it easy to persist and analyze it later. This can be useful for traditional log analysis, meeting audit requirements or investigating individual historic traffic issues. Logbook is ready to use out of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Achieve perfect load balancing with a flexible Open Source Load Balancer Icon
    Achieve perfect load balancing with a flexible Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    Boost application security and continuity with SKUDONET ADC, our Open Source Load Balancer, that maximizes IT infrastructure flexibility. Additionally, save up to $470 K per incident with AI and SKUDONET solutions, further enhancing your organization’s risk management and cost-efficiency strategies.
  • 5
    APK Crypter
    ... Obfuscation Techniques**: Implements code obfuscation to complicate reverse engineering. - **Intuitive Interface**: User-friendly interface for smooth integration into your development workflow. - **Flexible Encryption Settings**: Customize encryption configurations to fulfill the specific requirements of your application. - **Quick Processing**: Fast encryption and decryption processes to maintain development productivity. - **Frequent Updates**: Ongoing updates to ensure compatibilit
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    MaddCrypt

    MaddCrypt

    MaddCrypt is a simple Protector for your .NET application

    MaddCrypt is a simple application that focuses on protection, encryption, and obfuscation for dotNET application. Designed with high-end features, MaddCrypt has a wide range of uses, from educational penetration testing to the protection of sensitive personal and legal data. The app is designed to meet a variety of security needs with an elegant look using the Guna Framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Advantages: Three-tier security system: The use of Tor, VPN, and data obfuscation creates a robust barrier for user data protection. This complex combination of technologies makes tracking user activities considerably more challenging. RAM Disk: All user activity is redirected to a RAM disk, ensuring high operational speed and guaranteeing that no data remains after the computer is rebooted. This ensures 100% deletion of all traces of use
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8
    ME.com

    ME.com

    Mathematical & engineering components for software development

    Mathematical & engineering components (abbreviation ME . com) for development of the software are the comprehensive collection of original fastest algorithms for scientific computing. Not based on any known software library. Used in AtteStat, StatAnt, Criterial projects and another with rights saved include in educational purposes. Registered 2003-03-21 with the Federal Service for Intellectual Property. Completely free. No donation required. Mathematical & engineering components come with...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    Naeon is a secure cloud storage solution that uses unbreakable military-grade encryption and zero-knowledge privacy to protect confidential data in an untrusted environment. The data are encrypted using the AES 256-bit encryption algorithm with a randomly generated 128-character passphrase. Then, it is split into small pieces called chunks, which are obfuscated by adding random data to each chunk to make them unreadable and indecipherable to unauthorized individuals or processes. The...
    Downloads: 1 This Week
    Last Update:
    See Project
  • The Secure Workspace for Remote Work Icon
    The Secure Workspace for Remote Work

    Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.

    Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
  • 10
    Mixin

    Mixin

    Mixin is a trait/mixin and bytecode weaving framework for Java

    ... #mixin on the Sponge Discord Server. For handling obfuscation tasks, Mixin provides an Annotation Processor which works at compile time to generate obfuscation mappings for your toolchain to apply. If using Gradle 5 or later, annotation processors are no longer automatically loaded from compile configurations and must be specified explicitly via annotationProcessor configurations.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    Swift Shield

    Swift Shield

    Obfuscator that protects iOS apps against reverse engineering attacks

    Don't use this tool for production apps. I gave up on keeping this tool updated because every Swift release breaks SourceKit in a different way. It's probably really broken and is only useful as a way for you to learn more about obfuscation and SourceKit. SwiftShield is a tool that generates random and irreversible encrypted names for your iOS project's types and methods (including third-party libraries). It uses Apple's SourceKit to mimick Xcode's indexing behavior, revealing a complete map...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    V2Ray

    V2Ray

    V2Ray is a set of tools for building your own private network

    Project V is a set of tools to help you build your own privacy network over internet. The core of Project V, named V2Ray, is responsible for network protocols and communications. It can work alone, as well as combine with other tools.
    Downloads: 646 This Week
    Last Update:
    See Project
  • 13
    BeaEngine 5

    BeaEngine 5

    BeaEngine disasm project

    BeaEngine is a C library designed to decode instructions from 16-bit, 32-bit and 64-bit intel architectures. It includes standard instructions set and instructions set from FPU, MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, VMX, CLMUL, AES, MPX, AVX, AVX2, AVX512 (VEX & EVEX prefixes), CET, BMI1, BMI2, SGX, UINTR, KL, TDX and AMX extensions. If you want to analyze malicious codes and more generally obfuscated codes, BeaEngine sends back a complex structure that describes precisely the...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14
    xUtils3

    xUtils3

    Android orm, bitmap, http, view inject

    xUtils includes orm, http(s), image, view annotations, but it is still very lightweight (251K), and has powerful features and is easy to expand. Efficient and stable orm tool, which makes it more convenient to support cookies and caching when the http interface is implemented. Based on UrlConnection, the bottom layer will be implemented by okHttp after Android4.4. The request protocol supports 11 predicates: GET, POST, PUT, PATCH, HEAD, MOVE, COPY, DELETE, OPTIONS, TRACE, CONNECT. Supports...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Hikari

    Hikari

    LLVM Obfuscator

    All releases prior to and including LLVM8 are signed using this PGP Key from Naville. Verifiable on his Keybase. Security is not now, and will never be based purely on Obscurity. The "Security Companies" might say so to sell more of their products. But no, binary obfuscation won't magically fix all your exploits and bugs, (If not introducing more). Designing an Obfuscator is hard, and keeping the source open definitely leaks the pattern to crackers which could potentially make the crackers...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    Simplify

    Simplify

    Android virtual machine and deobfuscator

    Simplify virtually executes an app to understand its behavior and then tries to optimize the code so that it behaves identically but is easier for a human to understand. Each optimization type is simple and generic, so it doesn't matter what specific type of obfuscation is used. Provides a virtual machine sandbox for executing Dalvik methods. After executing a method, it returns a graph containing all possible register and class values for every execution path. It works even if some values...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 17
    Miasm

    Miasm

    Reverse engineering framework in Python

    The Miasm intermediate representation is used for multiple task: emulation through its jitter engine, symbolic execution, DSE, program analysis, but the intermediate representation can be a bit hard to read. We will present in this article new tricks Miasm has learned in 2018. Among them, the SSA/Out-of-SSA transformation, expression propagation and high-level operators can be joined to “lift” Miasm IR to a more human-readable language. We use graphviz to illustrate some graphs. Its layout...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    TinyObfuscate

    TinyObfuscate

    A tool for strings obfuscation tool in c++ by Michael Haephrati

    When you need encrypt/obfuscate strings in your program so that they don't just show up with a strings or hex tool when your executable is examined, this tool can be useful. See Code Project article: https://www.codeproject.com/Articles/1210398/Small-String-Obfuscator by Michael Haephrati
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Cloud Filer

    Cloud Filer

    S3 file management tool with encryption

    Cloud Filer is a graphical cloud file management tool and S3 client. Cloud Filer allows you to upload and download files to cloud storage and can be used as part of your backup strategy. Cloud Filer includes pre-internet encryption and file name obfuscation making access to your cloud data useless without the right password. Download and install using pip install cloudfiler - see also https://pypi.org/project/cloudfiler/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Python HTML Calendar Generator

    Command line HTML calendar generator.

    Python 3 based HTML calendar generator. Generates either a single calendar month or a set of 12 calendar months for a given year. Adjust for leap year and system file separator differences.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    proten

    Makes the computer try keep the 10 commandments (Holy Bible'Exodus 20)

    Suite of Methods and Scripts which address the largely ignored tasks of "keeping" the oldest laws in civilization, the 10 commandments from Holy Bible's Exodus20. ======= Current implementation includes: ) the 2nd law against images, and this is done with a passive, non-destructive obfuscation of the jpg library path. ) the 4th law against working all 7 days of the week. ======= Proten's project has a list of ideas for implementation, and ofcourse implementation concerns only arbitrary...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Obclipse manage the obfuscation of an ready build eclipse product. It collects the necessary information of a product, configure a third party obfuscator, obfuscate the product and fixes the textual files of the plugins by the obfuscated class names.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    MoonSharp

    MoonSharp

    An interpreter for the Lua language, written entirely in C#

    A complete Lua solution is written entirely in C# for the .NET, Mono, Xamarin and Unity3D platforms. Support for the complete Lua standard library with very few exceptions (mostly located on the 'debug' module) and a few extensions (in the string library, mostly). Supports dumping/loading bytecode for obfuscation and quicker parsing at runtime. An embedded JSON parser (with no dependencies) to convert between JSON and Lua tables. Easy opt-out of Lua standard library modules to sandbox what...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    vHDL Obfuscator GUI

    vHDL Obfuscator GUI

    vHDL Obfuscator is an small GUI to obfuscate and reformat HDL files

    VHDL and Verilog HDL are standards languages for hardware description. Sometimes is necessary to share the source HDL file but maintaining a little level of control and protection of the intellectual property. This tool generate obfuscated code that is almost unreadable to humans, but is still readable to compilers and simulators. This tool use GHDL (https://sourceforge.net/projects/ghdl-updates/), HDLObf (https://sourceforge.net/projects/hdlobf/), Icarus Verilog...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    AntiLVL Reloaded

    AntiLVL Reloaded

    AntiLVL Android LVL Hack Remove License verification of Android

    .... It will not always work. However, it has been designed to get around obfuscation and to apply many variations. AntiLVL is a configurable Smali code patcher with rules defined in user-modifiable XML files stored inside the jar called fingerprints. Brief summary of how it works: Decompiles the Apk Perform regular expression matching Carrie out defined modifications Recompile, update classes.dex Resign and zipalign Remove Google Play Store Check
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next