Showing 153 open source projects for "windows key finders"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Deliver secure remote access with OpenVPN. Icon
    Deliver secure remote access with OpenVPN.

    Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

    OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
    Get started — no credit card required.
  • 1
    FreeRDP

    FreeRDP

    FreeRDP is a free remote desktop protocol library and clients

    ... such as encryption, compression, and the fact that these protocol features cannot always be disabled or worked around. One of the easiest way of decrypting RDP traffic is to configure the server with a self-signed certificate for which the private key is known, and then use this certificate with a network tracing tool to automatically decrypt the packets.
    Downloads: 63 This Week
    Last Update:
    See Project
  • 2
    OpenSSL Project

    OpenSSL Project

    TLS/SSL and crypto library

    OpenSSL is a robust, commercial-grade, full-featured Open Source Toolkit for the TLS (formerly SSL), DTLS and QUIC (currently client-side only) protocols. The protocol implementations are based on a full-strength general-purpose cryptographic library, which can also be used stand-alone. Also included is a cryptographic module validated to conform with FIPS standards. OpenSSL is descended from the SSLeay library developed by Eric A. Young and Tim J. Hudson.
    Downloads: 47 This Week
    Last Update:
    See Project
  • 3
    UACMe

    UACMe

    Defeating Windows user account control

    Run executable from command line, akagi32 [Key] [Param] or akagi64 [Key] [Param]. First parameter is a number of methods to use, second is an optional command (executable file name including full path) to run. The second parameter can be empty - in this case, the program will execute elevated cmd.exe from the system32 folder. Since 3.5.0 version all "fixed" methods are considered obsolete and removed altogether with all supporting code/units. If you still need them. This tool shows ONLY popular...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 4
    ImageMagick

    ImageMagick

    ImageMagick 7

    ... capabilities, make it a popular choice for a wide range of image-related tasks. ImageMagick includes a command-line interface for executing complex image processing tasks, as well as APIs for integrating its features into software applications. It is written in C and can be used on a variety of operating systems, including Linux, Windows, and macOS.
    Downloads: 9 This Week
    Last Update:
    See Project
  • Free CRM Software With Something for Everyone Icon
    Free CRM Software With Something for Everyone

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    Think CRM software is just about contact management? Think again. HubSpot CRM has free tools for everyone on your team, and it’s 100% free. Here’s how our free CRM solution makes your job easier.
    Get free CRM
  • 5
    kallisto

    kallisto

    Near-optimal RNA-Seq quantification

    ... index, that in itself can take more than 10 minutes to build. And since it uses pseudoalignment, it is robust to errors in the reads and preserves the key information needed for quantification. This makes kallisto not only fast but highly accurate as well. In many benchmarks, it even greatly outperforms existing tools.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 6
    libssh2

    libssh2

    the SSH library

    libssh2 is a client-side C library implementing the SSH2 protocol. The libssh2 offers a large amount of functions and this is an attempt to provide HTML versions of the man pages present in the source tree. These pages are updated automatically from the source code repository.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    qLibc

    qLibc

    qLibc is a simple and yet powerful C library

    qLibc is currently one of the most functionally-complete, publicly-licensed C/C++ libraries. The goal of the qLibc project is to provide a simple and powerful general-purpose C/C++ library that includes all kinds of containers and general library routines. It provides a ready-made set of common container APIs with a consistent API look.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    EJDB

    EJDB

    Embeddable JSON Database engine C library

    EJDB 2.0, Embeddable JSON Database engine C library. Simple XPath like query language (JQL). Websockets / Android / iOS / React Native / Flutter / Java / Dart / Node.js bindings. Docker image. Array elements are matched from start to end. In equal arrays all values at the same index should be equal. Lexicographically sort object keys in both maps. Do matching keys and its values starting from the lowest key. Database index can be build for any JSON field path containing values of number...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    pgsodium

    pgsodium

    Modern cryptography for PostgreSQL using libsodium

    pgsodium is an encryption library extension for PostgreSQL using the libsodium library for high-level cryptographic algorithms. pgsodium can be used a straight interface to libsodium, but it can also use a powerful feature called Server Key Management where pgsodium loads an external secret key into memory that is never accessible to SQL. This inaccessible root key can then be used to derive sub-keys and keypairs by key id. This id (type bigint) can then be stored instead of the derived key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Red Hat Enterprise Linux on Microsoft Azure Icon
    Red Hat Enterprise Linux on Microsoft Azure

    Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

    Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
    Learn More
  • 10
    Selfie

    Selfie

    An educational software system of a tiny self-compiling C compiler

    ... of compilers, libraries, operating systems, and even virtual machine monitors. The common theme is to identify and resolve self-reference in systems code which is seen as the key challenge when teaching systems engineering, hence the name. Selfie is implemented in a single (!) file and kept minimal for simplicity. There is also a simple in-memory linker, a RISC-U disassembler, a garbage collector, L1 instruction and data caches, a profiler, and a debugger with replay.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    TrustKit

    TrustKit

    Easy SSL pinning validation and reporting for iOS, macOS, tvOS

    TrustKit is an open-source framework that makes it easy to deploy SSL public key pinning and reporting in any iOS 12+, macOS 10.13+, tvOS 12+ or watchOS 4+ App; it supports both Swift and Objective-C Apps. Simple API to configure an SSL pinning policy and enforce it within an App. The policy settings are heavily based on the HTTP Public Key Pinning specification. Sane implementation by pinning the certificate's Subject Public Key Info, as opposed to the certificate itself or the public key bits...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Impetus

    Impetus

    A key remapping daemon for linux

    Linux lacks a good key remapping solution. In order to achieve satisfactory results a medley of tools need to be employed (e.g xcape, xmodmap) with the end result often being tethered to a specified environment (X11). keyd attempts to solve this problem by providing a flexible system-wide daemon that remaps keys using kernel-level input primitives (evdev, input).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Valkey

    Valkey

    A flexible distributed key-value datastore

    Valkey is an open source (BSD) high-performance key/value datastore that supports a variety of workloads such as caching, and message queues, and can act as a primary database. Valkey can run as either a standalone daemon or in a cluster, with options for replication and high availability. Valkey natively supports a rich collection of datatypes, including strings, numbers, hashes, lists, sets, sorted sets, bitmaps, hyperloglogs, and more. You can operate on data structures in-place...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Lenovo Legion Linux Support

    Lenovo Legion Linux Support

    Driver and tools for controlling Lenovo Legion laptops in Linux

    Lenovo Legion Linux (LLL) brings additional drivers and tools for Lenovo Legion series laptops to Linux. It is the alternative to Lenovo Vantage or Legion Zone (both Windows only). It allows you to control features like the fan curve, power mode, power limits, rapid charging, and more. This has been achieved through reverse engineering and disassembling the ACPI firmware, as well as the firmware and memory of the embedded controller (EC).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Themis

    Themis

    Easy to use cryptographic framework for data protection

    Cross-platform high-level cryptographic library. Themis helps to build simple and complex cryptographic features easily, quickly, and securely. It’s a perfect fit for multi-platform apps. Themis hides cryptographic details and eliminates popular mistakes. Themis provides ready-made building blocks (“cryptosystems”) for secure data storage, message exchange, socket connections, and authentication. Secure Cell is a multi-mode cryptographic container suitable for storing anything from encrypted...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Lexbor

    Lexbor

    Lexbor is development of an open source HTML Renderer library

    Lexbor is the development of a web browser engine available as a software library; it ships with a free license and has no extra dependencies. For us, speed is an absolute must-have. In our development process, we focus on fastest parsing techniques for HTML, CSS, and fonts, fastest data processing methods, and fastest ways to serve content to end users. Whether you are building a backend that handles millions of HTML documents or a UI-heavy user app, your software’s response rate always...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Redis for Windows

    Redis for Windows

    Native port of Redis for Windows

    Native port of Redis for Windows. Redis is an in-memory database that persists on disk. The data model is key-value, but many different kind of values are supported, Strings, Lists, Sets, Sorted Sets, Hashes, Streams, HyperLogLogs. This repository contains an unofficial port of Redis to Windows. At the moment win-4.0.14 branch provides a stable port of Redis 4.0.14 for Windows x64 and win-5.0 branch provides a stable port of Redis 5.0.14 for Windows x64, both merged with archived port of win...
    Downloads: 151 This Week
    Last Update:
    See Project
  • 18
    VeraCrypt

    VeraCrypt

    Open source disk encryption with strong security for the Paranoid

    .... This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data. All released files are PGP signed with key ID=0x680D16DE, available on key servers and downloadable at https://www.idrix.fr/VeraCrypt/VeraCrypt_PGP_public_key.asc VeraCrypt can mount TrueCrypt volumes. It also can convert them to VeraCrypt format. Documentation: https://www.veracrypt.fr/en/Documentation.html FAQ : https://www.veracrypt.fr/en/FAQ.html
    Leader badge
    Downloads: 2,122 This Week
    Last Update:
    See Project
  • 19

    UFTP

    Encrypted UDP based FTP with multicast

    ... receivers to share a common key. UFTP also has the capability to communicate over disjoint networks separated by one or more firewalls (NAT traversal) and without full end-to-end multicast capability (multicast tunneling) through the use of a UFTP proxy server. These proxies also provide scalability by aggregating responses from a group of receivers.
    Leader badge
    Downloads: 936 This Week
    Last Update:
    See Project
  • 20
    Endian Firewall Community
    Endian Firewall Community (EFW) is a "turn-key" linux security distribution that makes your system a full featured security appliance with Unified Threat Management (UTM) functionalities. The software has been designed for the best usability: very easy to install, use and manage and still greatly flexible. The feature suite includes stateful packet inspection firewall, application-level proxies for various protocols (HTTP, FTP, POP3, SMTP) with antivirus support, virus and spam-filtering...
    Leader badge
    Downloads: 524 This Week
    Last Update:
    See Project
  • 21
    Vidiot

    Vidiot

    Non-linear video editor targeted for home video editing.

    Vidiot is a non-linear video editor targeted for home video editing. It supports compositing (scaling/rotating/positioning), cropping, changing speed, adding transitions and titles, trimming, key frames, etc.
    Leader badge
    Downloads: 314 This Week
    Last Update:
    See Project
  • 22
    TCNOpen

    TCNOpen

    Components for IEC61375 standardised communication

    TCNOpen is an open source initiative which the partner railway industries created with the aim to build in collaboration some key parts of new or upcoming railway standards, commonly known under the name TCN. TCN (Train Communication Network) is a series of international standards (IEC61375) developed by Working Group 43 of the IEC (International Electrotechnical Commission), specifying a communication system for the data communication within and between vehicles of a train. It is currently...
    Leader badge
    Downloads: 51 This Week
    Last Update:
    See Project
  • 23

    recaps

    Switch Windows input language using any key.

    Easy to use Windows keybourad layouts switcher.
    Downloads: 33 This Week
    Last Update:
    See Project
  • 24
    XSCHEM

    XSCHEM

    Schematic circuit editor for VLSI and Mixed mode circuit simulation.

    Xschem is a schematic capture program, it allows to create a hierarchical representation of circuits with a top down approach . By focusing on interconnections, hierarchy and properties a complex system (IC) can be described in terms of simpler building blocks. A VHDL, Verilog or Spice netlist can be generated from the drawn schematic, allowing the simulation of the circuit. Key feature of the program is its drawing engine written in C and using directly the Xlib drawing primitives; this gives...
    Downloads: 27 This Week
    Last Update:
    See Project
  • 25

    DuplicadosEraser2

    Search, find and manage duplicate files and folders with this program

    It compares files and folders, even inside compressed archives. When done, you can send the duplicate files or folders to the recycle bin, another folder or erase them, or save the list to work later.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next