Full access to Enterprise features. No credit card required.
What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
Try ServoDesk for free
Build Securely on Azure with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
The goal of the AppCrack project is to allow users to decompile/disassemble .exe programs (allowing users to see the source code) using a simple program instead of long, tedious, unreliable solutions like debuggers.
File Crypter is a Simple program, that is able to encrypt your files and decrypt them. A version of File Crypter is included as an example in the xCrypter Library and is called "ncrypter" which is short for "new crypter".
For system user to take backup of any confidential file(it may be code/important document)as it may contain content not meant for the others to view or the system may crash.We will be securing the backup of selected files at regular intervals of time.
Brute is a brute force hash cracker, it allows the user to specify how many threads he want running simultaneously. It is fast, and modular, all the hash algorithm dependent code lies in a module (a shared library). Modules available: MD5; SHA256; SHA512
#1 Solar Design & CRM Software for fast-growing solar businesses.
Solar businesses looking for a design and CRM solution to create compelling solar proposals
Create accurate proposals from anywhere in under 2 minutes using hi-res imagery, energy analysis and 3D shading tools in Pylon's intuitive design studio. Pylon is the only solar design software to give you high-resolution imagery in-app with no monthly fees. Identify dates of concern and track shading impact throughout the year using Pylon's award-winning 3D Solar Shading toolkit. Help your team better understand customer consumption patterns and maximize self-consumption using Pylon's load profile and interval data analysis. Analyze load profiles & interval data. Close more solar proposals with interactive Web & PDF proposals, native eSignatures and a payment processing gateway. Fully integrated solar CRM designed to integrate with your solar design software and convert proposals. Get 2-way SMS and email, communications with your team, lead management, and ready-made deal pipelines with Pylon Solar CRM.
The Memory Encryption and Transparent Aegis Library (METAL) functions as a shim library, allowing applications to transparently hide memory from rogue applications. It can be used with legacy applications without code modification.
Libraries and tools written in .NET managed code (MS/mono) to interact with GRC's Perfect Paper Password system [https://www.grc.com/ppp.htm] Source moved to GitHub: http://github.com/ErebusBat/pppNET
This software is a set of tools that hides Csourcecode in txt files. Also the software is able to restore the txt files to Csourcecode again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
For IT teams and individuals who want to learn new skills online at their own pace
Learning IT doesn’t have to mean boring lectures, the frantic pace of bootcamps, or lots of time away from your job or family. With CBT Nuggets, you can train anytime, anywhere, at your own pace — all from the comfort of your office chair or living room couch.
The ELF-Encrypter program suite is a collection of programs to encrypt your ELF binaries using various algorithms. GnuPG is required in order to use some encryption techniques.
The suite also contains programs to inject code into ELF binaries.
QUIPSTER is a little program to solve substitution ciphers (Cryptoquotes) automatically. It's based on the statistics of letter combinations (for example, NT is more likely than BT, and JV never seems to show up) and using stochastic local search.
KIside is a message digest computing and displaying tool. It computes and shows the hash code of any file as a string of hexadecimal numbers. KIside implements standard algorithms such as MD4, MD5, SHA1, SHA256, SHA384, SHA512, TIGER, RIPEMD160.
Adapdev.NET is an enterprise framework that builds on the Microsoft.NET framework, providing enhanced components for object caching, database access and querying, code generation, unit testing and encryption, among others.
"mASN1" - mini ASN.1 framework is a light ASN.1 framework written in C# for .NET
framework. It can be used for creating classes that model ASN.1 types and
are capable of encoding/decoding themselves to BER/DER codes. PER support is planned.
siggen is a cool email signature generator for encrypted ansi c (confused), brainf*ck, ... signatures. Use it in combination with vi(m), emacs, mutt, pine, or what ever. (tested on Solaris, Linux and Windoze). Optimized only for geeks :-)
Set of tools and libs for
managing structured data
in a very flexible way:
Imp./Exp. ASCII, XML, SQL,
PS, Tex/LaTex, RTF
GUI: X-Windows, MS-Windows
Interface to C++, DBs, Perl,
PHP, Java, TCP/IP
LISP-like interpreter
written in C++ using C-LIB
The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
Overcoat encrypts your projects exe file before distribution (for shareware authors for example), that limits the use of an exe file, and forces the user to purchase/registar after a certain developer defined period
bcrypt is a lightweight blowfish file encryption utility which aims for cross-platform portability of not only the actual code, but the encrypted files as well. In addition to providing 448-bit encryption, bcrypt overwrites input files with random garbage
DISCONTINUATION OF PROJECT. This project will no longer be maintained by Intel. Intel will not provide or guarantee development of or support for this project, including but not limited to, maintenance, bug fixes, new releases or updates. Patches to this project are no longer accepted by Intel. If you have an ongoing need to use this project, are interested in independently developing it, or would like to maintain patches for the community, please create your own fork of the...
Enkript is an user-friendly file ciphering program. It uses the popular algorithms MD5 and IDEA (used in PGP, for example). It detects automatically whether to encrypt or decrypt the given file, and badly deciphered files.
KomodoPGMP is a cryptographic protection and compression tool for executable files. The project takes malicious code enhanced privacy to the next level.