12 programs for "delphi memory dump" with 1 filter applied:

  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • Real Time Accounts Payable Automation. Icon
    Real Time Accounts Payable Automation.

    Invoice capture and automation seamlessly integrated with your accounting software

    Yooz provides the smartest, most powerful, and easiest-to-use cloud-based E-invoicing and Purchase-to-Pay automation solution. It delivers unmatched savings, speed, and security with affordable zero-risk subscriptions to more than 5,000 customers and 300,000 users worldwide.
  • 1
    jCasbin

    jCasbin

    An authorization library that supports access control models

    An authorization library that supports access control models like ACL, RBAC, ABAC for Golang, Java, C/C++, Node.js, Javascript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter) and Elixir. In Casbin, an access control model is abstracted into a CONF file based on the PERM metamodel (Policy, Effect, Request, Matchers). So switching or upgrading the authorization mechanism for a project is just as simple as modifying a configuration...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    Alan Framework

    Alan Framework

    A C2 post-exploitation framework

    Alan Framework is a post-exploitation framework useful during red-team activities. You can run your preferred tool directly in-memory. JavaScript script execution (in-memory without third party dependency) Fully compliant SOCKS5 proxy. Supported agent types: Powershell (x86/x64), DLL (x86/x64), Executable (x86/x64), Shellcode (x86/x64). Server.exe can be executed in Linux (via dotnet core) The network communication is fully encrypted with a session key not recoverable from the agent binary...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Object-Relational Main-Memory Embedded Database system tightly integrated with C++ language. Use OS virtual mapping mechanism to access data. Provides subset of SQL language with OO extensions. Support of transactions, fault tolerance, replication.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 4

    Dynamic Arrays and Hashes (C++, Delphi)

    Useful classes for working with Dynamic Arrays in Delphi and C++

    New version 1.03 is released! Framework for manipulating with Dynamic Arrays in memory. Available for Delphi all latest versions and for C++. Powerful Hash and Double Hash classes to work with pairs of values (key and value) and with values that have two keys (key1, key2, value). Give it a try and let me know how it works.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Email and SMS Marketing Software Icon
    Email and SMS Marketing Software

    Boost Sales. Grow Audiences. Reduce Workloads.

    Our intuitive email marketing software to help you save time and build lasting relationships with your subscribers.
  • 5
    AL-IV

    AL-IV

    ALFOUR Programming language. Simple, safe, power, multi-platform.

    A programming language AL-IV (ALFOUR) is a high-level imperative object oriented programming language with minimal introduction level, easy porting to any platform claiming a very high level of safety and stability, with a controllable level of code protection, high efficiency of an executable code, full independence from a target platform, minimal enter level.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    MimiPenguin

    MimiPenguin

    A tool to dump the login password from the current linux user

    A tool to dump the login password from the current linux desktop user. Adapted from the idea behind the popular Windows tool mimikatz. Takes advantage of cleartext credentials in memory by dumping the process and extracting lines that have a high probability of containing passwords. Will attempt to calculate each word's probability by checking hashes in memory, and regex searches. 2.0 introduces a clean port that aims to increase the speed of execution and portability
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    General Knowledge Machine Project

    General Knowledge Machine Project

    Intellect Modeling Kit: assisting research, diagnostics, consulting

    We humans are bound by intellectual abilities. All knowledge is far beyond power of any person. The only way to apply knowledge is to build machines able to present it human way but not limited by volume. Intellect Modeling Kit (IMK) is intended to build knowledge machines (KM) assisting experts on the steps of activity: * Observation; * Producing propositions based on knowledge; * Elimination of impossible propositions; * Selection and verification of the most appropriate propositions; *...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Simple Dumping Monitor for Arduino

    Simple Dumping Monitor for Arduino

    Simple in use library to display dumps and debug Arduino sketches.

    Simple Dumping Monitor Library (DumpMon) for Arduino-compatible ATmega microcontroller based boards allow to display either memory, registers and timer dumps and also interrupt vectors table dump. Beginning since version 0.6 functions of simple symbolic debugger are added. Being compiled the library requires about 11 KBytes of program memory (15 KBytes for Arduino MEGA). Requirements to RAM memory don't exceed 1 KByte (277 Bytes for dumpmon.pde example, 377 Bytes for dumpmonDebug.pde).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    pljones TrapKAT Editor for .Net/MONO
    This program has been superseded by a JVM version. Source is on github: https://github.com/pljones/jTrapKATEditor For further details, click the web site link below.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build with generative AI, deploy apps fast, and analyze data in seconds—all with Google-grade security. Icon
    Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes.
  • 10
    Similar Image Search

    Similar Image Search

    Reverse image search your photos. Find duplicates. Find similars

    Similar Image Search is a desktop reverse image search app. Think Google's "search by image" but with your own photos on your computer. SiS can search for similar images in the library and return a list of matches. I can also compare ones outside the library to ones within. It's designed for photographers to sift through a memory card dump, searching for photos in batches for ease of sorting. Requires: Java 7
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    Ruby Serial

    Ruby Serial

    Optimized serialization library for Ruby objects.

    Library serializing Ruby objects, optimized in many ways: * Fast and small: use MessagePack (binary compact storage) and don't serialize twice the same object * Independent of Ruby version: dump and load data across different versions * Keep shared objects: if an object is shared by others, serialization still keeps the reference and does not duplicate objects in memory * Gives the ability to fine tune which attributes of your objects are to be serialized (defaults to all) * Keeps backward...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Trace2ip is to hold one trace of all connections IP, memory the information into the file. The file to have like unique key ip_source and like associate data header IP. Alternative Key:Audit, Trace, Monitor, Dump, IP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next