Showing 192 open source projects for "chat source code"

View related business solutions
  • Build Secure Enterprise Apps Fast with Retool Icon
    Build Secure Enterprise Apps Fast with Retool

    Stop wasting engineering hours. Build secure, production-grade apps that connect directly to your company’s SQL and APIs.

    Create internal software that meets enterprise security standards. Retool connects to your business data—databases, APIs, and vector stores while ensuring compliance with granular permissions and audit logs. Whether on our cloud or self-hosted, build the dashboards and admin panels your organization needs without compromising on security or control.
    Learn More
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 1
    Enigma CS (Coding Software)

    Enigma CS (Coding Software)

    Create and use your own personalized, very secure, encoding script!

    Create and use your own personalized, yet very secure, encoding script!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Power Hasher is a program that allow you to get the hash code of multiple files at once, and export the results to a file, making easy for this file to be imported and the files checked. Currently it supports MD5, SHA1, SHA256, SHA384 and SHA512.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    C++ Source Code that grabs the Windows Serial from the registry. Works on Windows XP, Vista and 7 BETA. IMPORTANT NOTE: This project is for educational purposes only! The author is not liable for the damage this program might cause.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    fm (file masker) is an easy-to-use command line cryptographic tool that's small, portable across operating systems, quite secure for most purposes, and licensed to you along with its source code under the gpl.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    Netdeep Cop is a security network gateway. It features stateful packet filtering, proxies, content filtering, IDS/IPS and VPN. This project has been started with your code based in IPCop and Smoothwall project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A fork of WASTE 1.5.0.408 beta 3 starting form 1.5.1.412 beta 3
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    j!com is a secure instant messaging system, featuring a classical AIM-like interface, and providing AES encryption for conversations and login.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The goal of the AppCrack project is to allow users to decompile/disassemble .exe programs (allowing users to see the source code) using a simple program instead of long, tedious, unreliable solutions like debuggers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The Solitox Community system provides an integrated real-time chat service, web interface, and a scalable infrastructure for adding more services with common credentials. These interfaces allow a greater level of communication for your users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Say goodbye to broken revenue funnels and poor customer experiences Icon
    Say goodbye to broken revenue funnels and poor customer experiences

    Connect and coordinate your data, signals, tools, and people at every step of the customer journey.

    LeanData is a Demand Management solution that supports all go-to-market strategies such as account-based sales development, geo-based territories, and more. LeanData features a visual, intuitive workflow native to Salesforce that enables users to view their entire lead flow in one interface. LeanData allows users to access the drag-and-drop feature to route their leads. LeanData also features an algorithms match that uses multiple fields in Salesforce.
    Learn More
  • 10
    After installed on one computer, it captures MSN chat across all computers in the same LAN, analyze and save into database for future analysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    For system user to take backup of any confidential file(it may be code/important document)as it may contain content not meant for the others to view or the system may crash.We will be securing the backup of selected files at regular intervals of time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Brute is a brute force hash cracker, it allows the user to specify how many threads he want running simultaneously. It is fast, and modular, all the hash algorithm dependent code lies in a module (a shared library). Modules available: MD5; SHA256; SHA512
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The Memory Encryption and Transparent Aegis Library (METAL) functions as a shim library, allowing applications to transparently hide memory from rogue applications. It can be used with legacy applications without code modification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    TypeGrabber aggiunge la crittografia al tuo Messenger! TypeGrabber adds cryptography to your Messenger!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    The Secure Java Code Filter (SJCF) provides an ICAP-based filter mechanism for mobile Java code and the signatures applied to it. Administrators can define a centralized policy determining which applications and signatures respectively are allowed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A Cryptography php module very easy to use, could be used to protect databases, files, ad hash codes in every server that support php. Nowdays the most used hash algoritms are weak and there are many huge database with the hash code and the relative pass
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Libraries and tools written in .NET managed code (MS/mono) to interact with GRC's Perfect Paper Password system [https://www.grc.com/ppp.htm] Source moved to GitHub: http://github.com/ErebusBat/pppNET
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    This software is a set of tools that hides C source code in txt files. Also the software is able to restore the txt files to C source code again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Secure Gateway for ICQ
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Project Naranja will uses Padlock Security of VIA EPIA mini-ITX motherboards in order to provide a toolkit to set up and use encrypted filesystems with Linux. NOTE: Files are now hosted at Google Code: http://code.google.com/p/naranja/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    WASTE is a mesh-based workgroup tool that allows for encrypted, private communication between distant parties on the internet, independant of local network organization.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 22
    A plugin for the popular OS X IRC client Colloquy providing Blowfish-encryption
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    JFish is a simple Java implementation of the popular Twofish cryptography algorithm. It allows any application to easily implement powerful encryption, using a single small library and minimal code changes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A program to break the WWII Enigma code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The ELF-Encrypter program suite is a collection of programs to encrypt your ELF binaries using various algorithms. GnuPG is required in order to use some encryption techniques. The suite also contains programs to inject code into ELF binaries.
    Downloads: 1 This Week
    Last Update:
    See Project